Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols

Lineo Mejaele, E. O. Ochola
{"title":"Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols","authors":"Lineo Mejaele, E. O. Ochola","doi":"10.1109/ISSA.2016.7802930","DOIUrl":null,"url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) features such as open medium, dynamic topology, lack of centralised management and lack of infrastructure expose them to a number of security attacks. Black hole attack is one type of attack that is more common in MANET reactive routing protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Black hole attack takes advantage of route discovery process in reactive routing protocols. In this type of attack, a malicious node misleads other nodes in the network by pretending to have the shortest and updated route to a target node whose packets it wants to interrupt. It then redirects all packets destined to a target node to itself and discards them instead of forwarding. This paper analyses the performance of AODV and DSR when attacked by black hole, by varying the mobility of the nodes in the network. The analysis is carried out by simulating scenarios of AODV based MANET and DSR based MANET using Network Simulator 2 (NS-2) and introducing the black hole attack in each of the scenarios. The different scenarios are generated by changing the mobility of the nodes. The performance metrics that are used to do the analysis are throughput, packet delivery ratio and end-to-end delay. The simulation results show that the performance of both AODV and DSR degrades in the presence of black hole attack. Throughput and packet delivery ratio decrease when the network is attacked by black hole because the malicious node absorbs or discards some of the packets. End-to-end delay is also reduced in the presence of a black hole attack because a malicious node pretends to have a valid route to destination without checking the routing table, and therefore shortens the route discovery process. The results also show that throughput decreases slightly when mobility of the nodes is increased in the network. The increase in the speed of the nodes decreases both end-to-end delay and packet delivery ratio.","PeriodicalId":330340,"journal":{"name":"2016 Information Security for South Africa (ISSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Information Security for South Africa (ISSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSA.2016.7802930","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Mobile Ad-hoc Networks (MANETs) features such as open medium, dynamic topology, lack of centralised management and lack of infrastructure expose them to a number of security attacks. Black hole attack is one type of attack that is more common in MANET reactive routing protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Black hole attack takes advantage of route discovery process in reactive routing protocols. In this type of attack, a malicious node misleads other nodes in the network by pretending to have the shortest and updated route to a target node whose packets it wants to interrupt. It then redirects all packets destined to a target node to itself and discards them instead of forwarding. This paper analyses the performance of AODV and DSR when attacked by black hole, by varying the mobility of the nodes in the network. The analysis is carried out by simulating scenarios of AODV based MANET and DSR based MANET using Network Simulator 2 (NS-2) and introducing the black hole attack in each of the scenarios. The different scenarios are generated by changing the mobility of the nodes. The performance metrics that are used to do the analysis are throughput, packet delivery ratio and end-to-end delay. The simulation results show that the performance of both AODV and DSR degrades in the presence of black hole attack. Throughput and packet delivery ratio decrease when the network is attacked by black hole because the malicious node absorbs or discards some of the packets. End-to-end delay is also reduced in the presence of a black hole attack because a malicious node pretends to have a valid route to destination without checking the routing table, and therefore shortens the route discovery process. The results also show that throughput decreases slightly when mobility of the nodes is increased in the network. The increase in the speed of the nodes decreases both end-to-end delay and packet delivery ratio.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
黑洞攻击分析中节点移动性变化对MANET被动路由协议的影响
移动自组织网络(manet)的特点,如开放介质、动态拓扑、缺乏集中管理和缺乏基础设施,使它们暴露在许多安全攻击之下。黑洞攻击是一种更常见的攻击类型,在MANET被动路由协议中,如Ad-hoc按需距离矢量(AODV)和动态源路由(DSR)。黑洞攻击利用了响应式路由协议中的路由发现过程。在这种类型的攻击中,恶意节点通过假装拥有到目标节点的最短且更新的路由来误导网络中的其他节点,从而中断目标节点的数据包。然后,它将所有预定到目标节点的数据包重定向到自己,并丢弃它们而不是转发。本文通过改变网络中节点的移动性,分析了AODV和DSR在受到黑洞攻击时的性能。利用网络模拟器2 (Network Simulator 2, NS-2)对基于AODV的MANET和基于DSR的MANET进行仿真分析,并在每种场景中引入黑洞攻击。通过改变节点的移动性,可以生成不同的场景。用于进行分析的性能指标是吞吐量、数据包传送率和端到端延迟。仿真结果表明,在存在黑洞攻击的情况下,AODV和DSR的性能都有所下降。当网络受到黑洞攻击时,由于恶意节点会吸收或丢弃部分报文,导致吞吐量和报文投递率下降。在存在黑洞攻击的情况下,端到端延迟也会减少,因为恶意节点在不检查路由表的情况下假装有一条到达目的地的有效路由,从而缩短了路由发现过程。结果还表明,当网络中节点的移动性增加时,吞吐量略有下降。节点速度的提高降低了端到端延迟和数据包分发率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment CDMA in signal encryption and information security Specific emitter identification for enhanced access control security Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern Context Aware Mobile Application for mobile devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1