Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Dear SirI need research paper topics to choose one of them but I need good paper because I want to publication this paper in IEEE journal .regards

1 answer below »
Dear SirI need research paper topics to choose one of them but I need good paper because I want to publication this paper in IEEE journal .regards
Answered Same Day Dec 26, 2021

Solution

Robert answered on Dec 26 2021
115 Votes
Black Hole Attack in Mobile Ad Hoc Network and its Avoidance
Author Name
Affiliation
Email Address
Abstract: Mobile Ad Hoc Network is a infrastructure less wireless network where the mobile
nodes leaves and joins the mobile network very frequently. The routing of the packets from
source node to destination node, the routing protocol is used. On Demand Distance Vector
Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to
handle the operations of packet routing from by any node as a source node to destination
node. In this paper prevention of black hole attack by modifying the On Demand Distance
Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and
oute sequence packet
oadcast to determine the request reply from black hole node under
the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing
protocol are integrated with a mechanism to find the Request Reply of message containing
outing information from source to destination node in Mobile Ad Hoc Network.
Keywords: MANET – Mobile Ad Hoc Network, DSR – Dynamic Source Routing, DSSR –
Destination Sequence Routing, DoS – Denial of Service, AODV – On Demand Distance
Vector Routing.
1. Introduction
Mobile ad hoc network (MANET) is very popular category of computer network at present
scenario of communication network. It is a non infrastructure based network where the
communicating nodes have the capability to self configure with respect to the cu
ent
mobility. This category of network is also called wireless ad hoc network. The number of
communication nodes in mobile ad hoc network is not fixed, it can increase and decrease
with respect to time and mobility. MANET is composed by the mobile devices under the
mobile wireless communication technology. Mobility is primary core requirement of this
category of network.
Mobile ad hoc network provides the facility for nomadic computing interface with dynamic
changing topology of wireless network. The network devices such as routing system device,
switching device are also mobile under the mobile ad hoc networks. The dynamic topology of
the network gives the flexibility to the computing nodes to join and leave the network
anytime. In geographic location it is not possible to setup the infrastructure network,
therefore, mobile ad hoc network removes this problem by establishing the communication
system via computing devices with wireless networking infrastructure. Nodes of the mobile
ad hoc network directly forwards the packet to each other.
Dynamic connectivity of mobile ad hoc network is supported by Dynamic Source Routing
(DSR) and Destination Sequence Source Routing (DSSR) protocols. In mobile ad hoc
network the node work as a host as well as a router to forwards the packets from incoming
source to intermediate node or destination node. Due to lack of the infrastructure a Mobile Ad
Hoc Network (MANET) is more prone to be attacked. Non infrastructure of MANET opens
the opportunity to attacker to launch different categories of attacks in the network. With
variety of network attacks, black hole attack is considered as inside attack for a MANET.
Black hole attack disrupts the service of MANET and causes vary Sevier problem. The major
problem associated with black hole attack with MANET is that the confidentiality of data
contained under the packets are disclosed and network bandwidth consumed. This attack also
exploits the routing protocol working with MANET.
Basic scenario of black hole attack is that an attacker node or system creates its validity in
MANET by advertising itself as a valid node. It advertises its router path for nodes to ca
y to
send the packets from source node to destination node. Whenever the attacker node register
itself with MANET it becomes able to listen all the
oadcasted Route Request packets of the
different nodes. Once it gets the Router Request packet, it replies to the
oadcasting node
eply by its own path as the least cost path. The sender node updates its route path in routing
table and follows that path to send the packet. Packets that go through that malicious path is
intercepted by malicious node and also be dropped on it. The packet data also be intercepted
and confidentiality of data is being
oken by the malicious node.
The intelligent concept behind the attacker node is that it advertises the route to all other
nodes in MANET by indicating that it is shortest router path. Black hole attack is generally
considered as a type of Denial of Service (DOS) attack. It is one of the common security
threat for a network such as MANET or any other categories of infrastructure and non
infrastructure network.
Nodes of MANET is able to respond the Route Request (RRequest) message as this is
functional aspect of ON Demand Distance Vector Routing (AODV) protocol. The concept
ehind the black hole attack and its scenario are presented under figure 1.
Figure 1. Black hole attack scenario in MANET
Let A, be the source node and F be the destination node of MANET presented under figure 1.
A,
oadcasts the Router Request packet into the network to all cu
ent active nodes to get the
oute of node F. Now, consider that Node C is malicious node introduced itself in the
MANET. This malicious node is attacker node under the MANET. Node C listens the
oadcasted packet by A, and immediately reply the Route path to A via its own route to F.
After reply by C a updates its routing table and follows the path to send the packets to F.
Node C becomes able to get all the packets which are sent from A to F. Thus, C intercepts all
the packets sent by A to F and dropped them. This consumes the network bandwidth and also
confidentiality problems with the data packet which are sent from A to F and intercepted and
dropped by C. This is termed as the black hole attack.
It is also true that there is not any existing mechanism for node A to find out the black hole
attack launched in the MANET by malicious node. In case of large MANET where there are
thousands of nodes the black whole attack creates very critical situation. In the process of
outing a packet travels many nodes in MANET to reach the destination node. This is done
y the help of routing protocol at each of the node of the network. The node in MANET plays
outing function by the help of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here