Professional Documents
Culture Documents
net/publication/336232268
CITATIONS READS
0 168
2 authors, including:
Danista Khan
University of Lahore
6 PUBLICATIONS 3 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Danista Khan on 03 October 2019.
Abstract— Mobile Ad-hoc Networks (MANETs) are networks in All these routing protocols are defenseless against the
which nodes configure themselves in dynamic topology without network layer security attacks in MANETs such as black
any centralized system. MANET’s nodes communicate with each hole, wormhole, byzantine, selective forwarding and hello
other by forming a dynamic wireless link without using previous flood attack. Different techniques have been proposed to
infrastructure. In the MANETs any node can enter or leave a
secure MANETs from network-layered attacks. In this paper
network at any time. Nodes can send or receive the data by using
defined routing protocols and mobility models. Due to the we have studied how to detect and prevent MANETs from
unavailability of centralized system, MANETs are exposed to the black hole attacks
different network layer attacks. Worm Hole, Black Hole, Gray Rest of the paper is organized as follows. For understanding
Hole, Byzantine and Sybil Attacks are some of the examples of the background we discussed some network layer attacks of
network layer attacks, which destroys network topology resulting MANETs in section II. While black hole attacks and AODV
in data loss and network degradation. In the Black Hole Attack, protocols are discussed in section III. We summarized
a node proclaims itself as having closest paths to all the different preventive techniques against black holes in
destinations. This node absorbs all the data packets of network by section IV. Conclusion and future challenges are discussed
exploiting the routing protocol thus degrading network
in last section.
performance. In this Paper, we have discussed different
techniques that can be used to detect and prevent MANETs from
black hole attacks.
II. NETWORK LAYER SECURITY ATTACKS
Keywords— MANET, AODV protocol, black hole, security MANETs are vulnerable to attacks on different layers due to
attacks absence of central coordination system.
I. INTRODUCTION Attacks in MANETs can be divided into two categories:
Sybil Attacker generates Affects normal routing 1) Single node black hole
additional nodes with operation, as Sybil In this, only one node acts as a black hole between the
fake identities. nodes appears in various source and the destination
Fabricated identity can locations making it
be new or can belong to difficult to identify
2) Collaborative Black Hole
some legitimate node additional nodes In this, two or more malicious nodes combines
together to form a black hole in route.
A. Ad hoc on demand distance vector protocol (AODV) a) Single node black hole
1) Route discovery:
In this stage the source node broadcast Route Request
(RREQ) packet in network. Network nodes check route to B1 B2
destination node in their routing tables [14]. If the node
finds a fresh route, it sends Route Reply Packet (RREP)
to the source. If the source receives multiple path S D
requests, it selects the route having shortest path and starts
sending data in its direction. Information contained in
RREQ and RREP is shown in Fig 1. IN
.
Source Source Destination Destination Lifetime
IP sequence IP Sequence b) Collaborative nodes
No. No. Fig 2. Types of Black hole