You are on page 1of 6

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Project Objective

Black hole attack is a attack in wireless sensor network in which malicious node falsely claiming itself as having the fresh and shortest path to the destination attract traffic towards itself and then drops it. In this project, we implement a protocol for avoiding blackhole attack without the constraint of special hardware and dependency on physical medium of wireless network.

Proposed Solution
We propose a protocol called BAAP. BAAP uses Adhoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery. When intermediate nodes reply to source node, few nodes in the path may have multiple path to the destination but it eventually chooses only one path to destination node. In BAAP, every node maintains the legitimacy of their neighbor nodes to form the correct path to destination node. In the path discovery of BAAP, an intermediate node will attempt to create a route that does not go through a node whose legitimacy ratio crosses the lower threshold level. Therefore, malicious nodes will be gradually avoided by other nonmalicious nodes in the network. In BAAP, each node maintains a legitimacy table to choose the most legitimate node (among the multiple backward disjoint link to source node and next hop to destination) while sending RREP back to source node. Legitimacy table contains three fields: , Node ID, Path Count and Sent count field stores the IP address of the node whose legitimacy is being recorded. Path count field specifies the number of times the node has been chosen in the route and the Sent count field describes the number of times connection to destination have been successfull node through the Node ID. These two count field are also used to define the Legitimacy Ratio LA = sent count / (pathcount +1) which indicates the confidence of node in performing its intended function of correct routing. A higher legitimacy ratio means higher possibility of a node being non-malicious.

Software Architecture
The software architecture of the project is shown below

Config

Start/stop

Node id,pos

BHNode

Node

Simulator

Find Route

Base Station

BAAP Routing Agent

The Node uses the BBAP Routing Agent to find the route the base station.

NS2 Simulator is used for simulation. In the NS2 simulator Node object is already available. We will add a new variable in to make certain Nodes as Black Hole Node. If the node is Black hole, the packet will be dropped in this node. We will develop a new Routing Agent called BAAP Routing Agent and add to NS2 protocol stack.

Functional Requirement
1. 2. 3. 4. 5. 6. MANET network is created with configurable number of nodes Certain nodes can be made as black holes Packet can be sent from any one node to base station node The BAAP routing is used to find the route the base station We will vary the node speed and measure the delay in finding the route. We will vary the node speed and measure the packet loss.

Use case Diagram

Data Flow Diagram

Level 0 Data Flow Diagram

Level 1 Data flow Diagram

Class Diagram

Sequence Diagram

Hardware Requirements
We need one machine will following minimal configuration

CPU Memory Disk Display

: Intel 2.1 GHZ : 4GB : 40 GB : 15 inch color monitor

Software Requirements
Coding Platform OS Graphing tool : C++/TCL : NS2.34 : Ubuntu linux : GNUPLOT

You might also like