International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 05 | May 2022
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
Detection and removal of multiple black hole attacks through sending forged packet in MANETs Kheeramani1, Prof. Sangeeta Thakur2 1Student
Master of Technology, Department of Electronics and Communication Engineering SIRDA Group of Institution H.P. Technical University Hamirpur India. 2Asst. Professor, Department of Electronics and Communication Engineering SIRDA Group of Institution H.P. India -------------------------------------------------------------------***--------------------------------------------------------------------Abstract A heterogeneous network is a Mobile Ad-hoc network. They have unique characteristics like as high mobility, multi-hop routing, an open platform, and no fixed infrastructure. An ad-hoc system is vulnerable to a variety of security threats. Authors discuss implementation of the AODV protocol extension, notably the sequence number variation technique, in this paper. The AODV demonstrated good AODV behaviour. The protected field of the RREQ and RREP packet formats was employed in the sequence number variation technique. In AODV, the SNV technique provides security against black-hole and gray-hole assaults. Simulations using the NS 2.35 simulator were used to conduct analyses based on PDR, throughput, and latency of the selected node. In comparison to a previously suggested methodology, the simulation outcomes show that the suggested technique enhances network performance in the presence of attackers.
An adversary could use the fact that the nodes are routers to undertake a variety of malicious behaviors in order to stifle communication among them. Because traditional routing technologies lack security safeguards, typical legitimate nodes may fall under the sway of attackers and become compromised. Privacy protection is also a concern in infrastructure-free networks such as MANETs [4]. Several researchers have worked to develop answers to these varied problems [5]. Different secure routing strategies are designed to counteract the adversary's negative impacts in order to permit seamless communication in the presence of such adversary nodes. The cryptographic techniques are employed informally to achieve network confidentiality .The employment of a hashing algorithm is also employed to address privacy concerns in transmission of data among mobile nodes and cars . In addition, cluster management and classification-based strategies are employed to mitigate the negative consequences of a MANET's dynamic topology [6]. Furthermore, numerous safe routing systems have been suggested to accomplish quality-ofservices (QoS) by solving the eligibility presented by DoS attacks.
Key Words: WSN, MANET, AODV ,Black hole attack , Sequence Number variation approach,NS2.
1. INTRODUCTION Because nodes are not required to be physically stationary, the utilization of wireless networks has skyrocketed [1]. MANETs are such infrastructure-free wireless networks in which nodes communicate with each other via multihop pathways [2]. Because to qualities like as dynamic topology, simple node deployment, distributed administration, MANETs have acquired appeal in a variety of sectors including military operations, natural calamities, maritime communications, automotive computing, distantweather prediction. Given their popularity, MANETs' qualities expose them to a variety of problems.
The sequence number attack (also known as the grayhole or blackhole assault) is a DoS attack in which the attacker attempts to prevent the benign node from receiving data packets. Sequence number attacks generate packet forwarding errors throughout data transfer with the sole purpose of lowering network performance. During the initial phase, the adversary node makes an effort to join the route. The adversary accomplishes this by sending a forged route reply packet (RREP) claiming to have a faster path to the destination [7]. The adversary node does this by delivering an RREP packet with a fictitious destination sequence number, indicating that the route is relatively fresh. As a consequence, the source node believes that the adversary node transmitting the RREP has a more recent route to the destination. As a result, the adversary node begins packet dropping behaviour after joining the route between the sender and recipient.
Every node in a MANET is responsible for routing packets [3]. In MANET, routing protocols are grouped into two types: proactive routing protocols and reactive routing protocols. The proactive protocols generate per-defined pathways among network nodes, whereas the reactive protocols establish on-demand routes, that is, they are established only when communication enables is required. If no communication happens over the preset routes, network packets may be wasted. As a consequence, reactive routing techniques for such networks have grown in favour. Reactive routing systems, on the other hand, are vulnerable to a variety of attacks.
© 2022, IRJET
|
Impact Factor value: 7.529
This paper is organized as follows: Section II describes the literature survey of proposed work. Section III illustrates the proposed objectives and Section IV shows the experimental results obtained by using the proposed approach. Finally ,the paper concludes with Section V.
|
ISO 9001:2008 Certified Journal
|
Page 140