Top Banner
Solution to Black hole Attack in wireless Networks BY NARESH KUMMARI
26

Solution to Black Hole Attack

Nov 07, 2015

Download

Documents

Naresh K

Its about Black hole Attack in Network
and solution for how to resolve the problem.

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

PowerPoint Presentation

Solution to Black hole Attack in wireless NetworksByNaresh KummariContentsIntroductionWireless NetworksManetsRoutings In ManetsTypes Of Attacks

Blackhole AttackNetwork SimulatorAnalysisConclusion

Introduction Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multi-level security solution that achieves both broad protection and desirable network performance.Wireless network The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling.Wireless communication is used to transfer data among users without a wired infrastructure. Using electromagnetic waves, mobile users transmit and receive data over the air. Wireless communication spreads from home RF to satellites, from cellular phones to walkie-talkies.Types of the networkspersonal Area networksLocal Area networksWide Area networks

WLAN ModesInfrastructure NetworkAd-hoc NetworkAd-Hoc NetworkAd hocis aLatin word and meaning is For the specific purpose, case, or situation at hand and for no other

On wireless computer networks,Ad-hocmode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access pointsMOBILE Ad-hoc Network (MANET)Is a self-configuring network that is formed automatically by a collection of mobile nodes with out a centralised management.FeaturesMulti-hop communicationDynamic topologyConstrained resources No physical securityApplicationsMilitary and Rescue operationsCivilian application

Routing in MANET Network layerRouting: Route discovery and route maintenanceData forwarding

Intermediate nodesDestination nodeAODV ROUTING PROTOCOLAd-hoc On Demand Distance Vector Routing Protocol (AODV):Intermediate nodes are responsible for finding a fresh path to the destination.Offers quick adaptation to dynamic network conditions, low processing and memory overhead, low network bandwidth utilization.Uses a destination sequence number for each route entry.Makes sure the route to the destination does not contain a loop and is shortest path.

Route discovery

Route discovery

Attack in Networks Network attackis usually defined as an intrusion on your network infrastructure that will first analyses your environment and collect information in order to exploit the existing open ports or vulnerabilities - this may include as well unauthorized access to your resources.Attack typesPassive eavesdroppingSelective Existence (Selfish Nodes)Gray Hole Attack (Routing Misbehavior)Black Hole Attack

Black hole attackAn imaginary place in which things are lost.Malicious nodes responds immediately to source node with false information as though it has fresh enough path to destination.Source node sends data packets via malicious node assuming it is a true path.Finally malicious node absorbs all data packets it self. So data is lost.

MOTIVATIONThe main motivation of this project is to deal with black hole attack in wireless Adhoc network. Attack is defined as an attempt to overcome the security provisions of the network of a computer network.Active attack.Passive attack. Black hole attack comes under active attack.OBJECTIVESTo create the intruder in the network by manipulating the AODV routing protocol.To write the code for intrusion detection system that can detect the active attacks.IDS system for active attacks like Resource Consumption, Sequence Number and Packet Drop is to be developed.

SYSTEM REQUIREMENTS AND SPECIFICATIONSHardware RequirementsProcessor : Mobile Pentium III (750/600 MHz) processorRAM: 128Mb.Hard Disk: 5 GB.Input Device: Standard keyboard and Mouse.Output Device: VGA and High Resolution Monitor.Software RequirementsSoftware : NS-2.34Operating System: Ubuntu10.04.

NS NETWORK SIMULATORNS is an event driven network simulator programIncludes many network objects such as protocols, applications and traffic source behavior

simulationsSimulation Of Aodv ProtocolSimulation Of Black Hole Attack And Its EffectsSimulation Of Idsaodv And Evaluation Of Results

Simulation of AODV protocol

SIMULATION OF BLACK HOLE ATTACK AND ITS EFFECTS

Since the nodes behave as a Black Hole they have to use a new routing protocol

Cloning AODV protocol in this directory and change the name of directory as blackholeaodv.

To implement the black hole change the receive RREP function (recvRequest) of the blackholeaodv.cc file

Simulation of IDSAODV and Evaluation of results

ANALYSISAODV network has normally 3.21 % data lossBlack Hole Node is introducing in this network data loss is increased to 92.59 %. When we used IDSAODV protocol in the same network, the data loss decreased to 65 %. These two results show that our solution reduces the Black Hole effects by 24.38 % as packet loss in a network using