Professional Documents
Culture Documents
in AODV of MANET
Asif Uddin Khan , Rajesh Puree , Bhabendu Kumar Mohanta , Sangay Chedup
1 2 3 4
3
Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram-500502, Andhra Pradesh, India
Department of ECE, Jigme Namgyel Engineering College, Bhutan.
4
sangaychedup@jnec.edu.bt 4
Abstract—One of the most dynamic network is the Mobile scope nodes are routed through intermediate nodes.
Adhoc (MANET) network. It is a list of numerous mobile nodes. However, the MANET system is designed to set up a system
Dynamic topology and lack of centralization are the basic
characteristics of MANET. MANETs are prone to many attacks where necessary [2]. Each mobile node acts in such a
due to these characteristics. One of the attacks carried out on the network not only as a host, but also as the router, transmitting
network layer is the black- hole attack. In a black-hole attack, by packets to other mobile nodes in the network that can not be
sending false routing information, malicious nodes interrupt data directly wireless [3].
transmission. There are two kinds of attacks involving a black-
hole, single and co-operative. There is one malicious node in a
single black-hole attack that can act as the node with the highest
sequence number. The node source would follow the direction of
the malicious node by taking the right direction. There is more
than one malicious node in the collaborative black-hole attack.
One node receives a packet and sends it to another malicious
node in this attack. It is very difficult to detect and avoid black-
hole attacks.Many researchers have invented black-hole attack
detection and prevention systems. In this paper, We find a
problem in the existing solution, in which validity bit is used.This
paper also provides a comparative study of many scholars. The
source node is used to detect and prevent black hole attacks by
using a binary partition clustering based algorithm. We compared
the performance of the proposed solution with existing solution
and shown that our solution outperforms the existing one.
Index Terms—MANET, AODV, Black hole attack, rout- ing
protocols, clustering.
MANET is a short term for Mobile Ad-hoc Network. It is One of MANET's recent applications is a sensor net- work
also called wireless adhoc network, an unbroken net- work of consisting of several thousand small, low-powered sensing
mobile devices connected without using cables and without nodes [4]. Example of MANET implementations are shown in
any infrastructure setup. Devices can travel in any direction in Figure 1. Security in these areas clearly is a critical problem.
a MANET architecture independently and thus often change Secure communication is essential in any wireless network
their ties with other devices. Wireless communications, from [5] and [6] to make the system more trustworthy to the end
satellite transmission to home wireless personal area users.
networks, have increased exponentially in recent years [1]. In MANET several attacks can be performed by the
malicious node that prevents the operation of MANET.
Blackhole attack and Grayhole attack are the most important
978-1-6654-4067-7/21/$31.00 ©2021 IEEE attacks that needs to be investigated.In this paper we
investigated the blackhole attack and proposed a solution to
solve the issue.The organization of the paper is as follows.
The wireless media communicates between a fixed node
In section-II literature survey is done. Section-III presents the
and a mobile node within its range. However, a permanent
motivation. In section-IV, we present the solution
fixed infrastructure is required. The MANET system is a
approach.Section-V discusses the performance analysis.
different model, however the broadcasting range of each
Section-VI presents the simulation results. Fi- nally in section-
node is restricted to the closeness of each other, and out-of-
VII, we conclude and discuss the future work.
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
II. LITERATURE SURVEY detect a black-hole attack and sends data packets to that
In paper [7] Ashish Kimar Jain et al. proposed a method to route assuming that the destination is reached by this route.
detect black hole attack through first route reply mechanism The attacker would then drop data to the destination node
in AODV protocol of MANET. without forwarding it.
In paper [8] J. V. Vadavi et al. try to detect the black hole The abbreviations used in this paper is described in
attack and avoiding them in participating in the network by TABLE IV.
enhancing the AODV protocol by making it delay aware.
A. Flowchart of Existing Solution
Sushama Singh et al. try to enhance the performance of
The above Fig.2 is the flowchart of existing solution from
the AODV protocol by introducing a trusted AODV routing
which we drew the motivation. The proposed work is the
algorithm (tangent hyperbolic function is used to calculate the
method to overcome the limitations of the above strategy.
trust value) to detect the collaborative black hole attack. [9]
In paper [10] Heerendra Mahore et al. focused on agent IV. SOLUTION APPROACH
based AODV protocol which means some sender nodes are In our proposed approach SOURCE node is used for the
assigned a task of the agent to check the RREP coming from detection of black hole attack. After generating a route
the destination nodes to check and avoid the black hole request, broadcast it and wait for RREPs. Source receive
attack. RREPs from k1+k2 no. of nodes. After receiving RREPs from
In paper [11] Vidya Kumari Saurabh et al. proposed a k1+k2 no. of nodes store them in a list [15].
clustering based AODV routing protocol in which each single Make two groups of RREPs and store them in the list using
node of the cluster in ping once to the cluster head to detect a binary partition clustering algorithm such as k-means [16]
the difference between the data packets received and sent by based on destination sequence number. Then the average
the exact node to detect the black hole attack. destination sequence number(ADS) is calculated for both the
Sathish M. et al. in [12] proposed a method to detect the cluster that is (ADS1, ADS2). If ADS1 is greater than ADS2
single as well as collaborative black hole attack by sending and the difference is greater
fake RREQ and Destination Sequence Number and when
receives RREQs from nodes with higher DSN it will collect
them in a list and inform all the other nodes that these are the
malicious nodes.
III. MOTIVATION
The method for the MANET black hole detection,
proposed in [1] says that the validity of the message RREP is
attached and stored on each node of the active path in an
itinerary table. Whenever a route request is received for a
node, the route response message is created by setting a
value for a validity bit in RREP, whether that route is the
target or if it has a legit route. This RREP will then return to
the next hop it got RREQ from. The proposed route reply
message varies from the basic AODV route reply message in
terms of validity. The RREP message incorporates the
validity mechanism. AODV RREP will have an additional
header in a validity bit.
This new field is used to validate the route validity.
Whenever a Route reply is received from a node, it is
processed only if the RREP 's validity bit is specified. Only if
the validity bit is set will an entry be made for this path. As an
assailant, this mechanism is not known; it reacts without
looking into its route table. This implies that the validity bit in
the RREP sent by the attacker node would have a null value.
A node with a validity value not identified will simply drop the
RREP without entering the routing table [13].
The above technique is a great way to detect blackhole
attacks [14], and a negligible overhead would be applied to
the overhead network when a single bit is used in this
strategy to detect attacks. However, if the attacker looks at
the attackers' routing table and sets the validity value, and
sends RREP to the source, then the source node does not
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
n2k2 nodes respectively we can see it in TABLE II and
TABLE III.
In TABLE II it can be seen that cluster-1 contains the
number of nodes n11 to n1k1 having destination sequence
number ds11 to ds1k1. Similarly in TABLE III cluster-2
contains the number of nodes n21 to n2k2 having destination
sequence number ds22 to ds2k2.
After that average destination sequence number is
calculated for cluster-1 (ads1) and cluster-2 (ads2) by the
equations given below.
ads1 (1)
ki
k ds
2 kj
ads2 k2 (2)
hole nodes otherwise source node selects the best node from
cluster-1, check the validity bit, if set, then send data through
the node to the destination.
Similarly, the average destination sequence of cluster-
1 and cluster-2 is calculated and check for cluster-2. If the
average destination sequence of cluster-2 (ads2) is greater
than the average destination sequence of cluster- 1 (ads1)
and their difference i.e. (ads2-ads1) is greater than a
threshold value then cluster-2 is suspicious and may contain
a set of black-hole nodes otherwise source node selects the
Fig. 2. Flowchart of existing solution best node from cluster-2, then check the validity bit is set or
not, if set, then send data to destination through the node.
than a threshold value then cluster-1 may contain a set of B. Proposed Algorithm
black-hole nodes otherwise source node selects the best 1. Start.
node from cluster-1, check validity bit, if set, send data [17]. 2. Broadcast RREQ (source).
If ADS2 is greater than ADS1 and the difference is greater 3. Received RREP from k1+k2 nodes.
than a threshold value then cluster-2 may contain a set of 4. Store it in list.
black-hole nodes otherwise source node select the best node 5. Make 2 clusters using partition clustering
from cluster-2 and check validity bit if set, send data through algorithm(based on destination sequence number).
that node. TABLE I
CLUSTER-1 CLUSTER-2 TABLE WITH DESTINATION SEQUENCE
NUMBER
A. Proposed Method
Cluster 1 1 Cluster 2
The source generates RREQ for the establishment of a nu “““ ‘ n^ĩ
path to send data. The explanation of our solution approach ni2 n22
is described as follows.
ni3 n23
The source node generates RREQ and broadcast it
through the network and waiting for the RREPs. Source node ni4 n34
after receiving the RREPs from k1+k2 number of nodes
stores it in a list.
TABLE II
The source node makes two groups using a binary CLUSTER-1 TABLE WITH DESTINATION SEQUENCE NUMBER
partition clustering algorithm such as k-means [16] based on number of nodes destination sequence number
destination sequence number. Here cluster-1 and cluster-2 nii dsi 1
are having n11, n12... , n1k1 nodes and n21, n22, n23...,
ni2 ds 2 1
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
ni3 dsi3 and send data. In step 9 If ads2>ads1 and ((ads2- ads1)>ds-
ni4 ds 4
1
threshold) Cluster-2 is suspicious. In step 10 it goes to step 9
niki dsiki and in 12 it ends.
C. FLOWCHART
The below Fig. 3 is a flowchart that shows how a black-
TABLE III
CLUSTER-2 TABLE WITH DESTINATION SEQUENCE NUMBER hole attack occurs with respect to time. It is further described
number of nodes destination sequence number with the timing diagram in Fig. 4.
n2i ds2l
D. TIMING DIAGRAM
n22 ds 2
2
where
ads1= average destination sequence number of cluster-1
ads2= average destination sequence number of cluster-2 ds-
threshold= threshold difference of average destination
sequence number.
TABLE IV
ACRONYMS AND THERE MEANING USED IN THIS PAPER
Acronyms meaning
AODV Ad hoc On Demand Distance Vector
MANET Mobile Ad hoc Network
RREP Route Reply
RREQ Route Request
ADS Average Destination Sequence Number
ADS1 Average Destination Sequence Number of cluster-1
ADS2 Average Destination Sequence Number of cluster-2
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
Fig. 4. timing diagram of black-hole attack
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
namely cluster-1 and cluster-2. The cluster table is given in VI. SIMULATION RESULTS
TABLE V and TABLE VI.
The Proposed solution is simulated using ns-2.35 and
TABLE V compared with Validity bit based approach [1].The simulation
CLUSTER-1 TABLE WITH DESTINATION SEQUENCE NUMBER parameters are listed in table-VII. In figure- 5, we plotted the
Number of nodes 1 Destination sequence number
graph of packet delivery ratio and in figure-6, we plotted the
-----------ĩ---------------------------- 10--------------------- graph of routing overhead with the increasing no of attacker
5 40 nodes from 1 to 5. From the figure-5, It is observed that
2 45 packet delivery ratio is close to 1 and then decreases with the
48 increasing no of attacker nodes but at all the points it is better
8
than the validity based approach. Similarly in figure-6, it is
3 46
observed that the proposed solution gives better result in
terms of routing overhead with increasing no of attackers.
TABLE VI
CLUSTER-2 TABLE WITH DESTINATION SEQUENCE NUMBER
Number of nodes 1 Destination sequence number
-----------4---------------------------- “Ĩ0--------------------
6 15
7 14
9 ĩĩ
ĩo 12
ĩĩ 13
TABLE VII
SIMULATION PARAMETERS
Parameters Values 1
Simulator ns-2.35 1
Simulation Time 200 secondsl
No of Nodes ĩoo 1
No of attacker ĩ, 2, 3“ 4, 5|
Maximum Speed 30 m/s ị
Protocol AODV 1
Packet Size Ĩ024 Bytes 1 Fig. 6. Routing Overhead Vs No of Attacker Nodes
Traffic Model TCP 1
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.
REFERENCES
[1] S. R. Deshmukh, P. Chatur, and N. B. Bhople, “Aodv-based secure
routing against blackhole attack in manet,” in 2016 IEEE International
Conference on Recent Trends in Electronics, Infor- mation & Communication
Technology (RTEICT). IEEE, 2016, pp. 1960-1964.
[2] A. Baadache and A. Belmehdi, “Avoiding black hole and coop- erative
black hole attacks in wireless ad hoc networks,” arXiv preprint arXiv:1002.1681,
2010.
[3] R. Lakhwani, V. Jain, and A. Motwani, ““detection and preven- tion of
black hole attack in mobile ad-hoc networks,” Interna- tional Journal of
Computer Applications, pp. 0975-8887.
[4] P. N. Raj and P. B. Swadas, “Dpraodv: A dyanamic learning system
against blackhole attack in aodv based manet,” arXiv preprint arXiv:0909.2371,
2009.
[5] U. Satapathy, B. K. Mohanta, S. S. Panda, S. Sobhanayak, and D. Jena,
“A secure framework for communication in internet of things application
using hyperledger based blockchain,” in 2019 10th international conference on
computing, communication and networking technologies (ICCCNT) . IEEE, 2019, pp.
1-7.
[6] S. S. Panda, D. Jena, and B. K. Mohanta, “A remote de- vice
authentication scheme for secure communication in cloud based iot,” in 2019
2nd International Conference on Innovations in Electronics, Signal Processing and
Communication (IESC). IEEE, 2019, pp. 165-171.
[7] A. K. Jain and V. Tokekar, “Mitigating the effects of black hole attacks
on aodv routing protocol in mobile ad hoc networks,” in 2015 International
Conference on Pervasive Computing (ICPC), 2015, pp. 1-6.
Authorized licensed use limited to: California State University Fresno. Downloaded on June 24,2021 at 00:55:25 UTC from IEEE Xplore. Restrictions apply.