1
PREVENTING BLACK HOLE ATTACK
Abstract: MANETs system made out of remote portable device that communicates by transferring on
wireless medium. This system & portrayed by absence of infrastructure, without focal facilitator and
central assets. Communication is conceivable by device in a system are helpful; however it is not generally
valid in disseminated compelled asset condition. Hacker can play out the malicious exercises by not
following directing convention of network layer protocols, one such attack is black hole attack. In which
black hole device control the routing messages and pull in the correspondence data towards it and after that
drop the data. Earlier works identifies and prevent black hole attack by observing the nodes in a network,
which is not practical arrangement in hostile environment. The proposed technique mitigates Black hole
Attack from routing path in MANETs by Secret Key and Hashing. Analysis of our results demonstrates
that our proposed technique precisely remove the black hole attack and extend the performance of network.
Keywords: MANET, Black Hole, Secret Key and NS-2 Simulator.
to end loop free path with ensure the necessary
1.INTRODUCTION1 QoS parameters like bandwidth, delay, jitter,
availability and resources has met .Depending up
Wireless mobile ad-hoc network technology is on the application QoS parameter varies.
designed for the establishment of a network Real Time Traffic :- Bandwidth, Delay
anywhere and anytime, characterized by lack of Group Communication :- Battery Life
infrastructure, clients in a network free to move
Emergency Services :-Network
and organize themselves in an arbiter fashion.
Communication may have multiple links and Availability
heterogeneous radio, can operate in a stand-alone Security
fashion, with self configured & self maintenance.
It is a wireless network consist of collection of Routing, QoS & security is challenging in
heterogeneous mobile devises (nodes) which are MANETs compared to infrastructure network due
connected by a dynamically varying network to its characteristics like dynamic network
topology without fixed infrastructure and absence topology, absence of pre established
of central coordinator or base station where infrastructure for central administration, mobility
network intelligence placeless inside every node of nodes, resource constraint, error prone
thus nodes in a network act as a router as well as channels and hidden , expose node problem.
host which means MANETs behave as a peer to Routing in MANETs is an active research area in
peer network. The connectivity between nodes recent years; number of routing protocols has
may have a multiple links and heterogeneous been developed. Routing protocols are useful
radio and can operate in a standalone fashion. when they offer acceptable communication
Due to characteristics of MANETs well suited a services like route discovery time,
situation where infrastructure is difficult to setup, communication throughput, end to end delay, and
cost or time effective. packet loss
The design, development, performance of Energy-Efficient routing is another effective
MANETs majorly include in routing, QoS, factor for MANETs routing due to its energy
Security, multicasting, service discovery, Constraint characteristic so as to reducing the
scalability & Resource management (energy, energy cost during data communication. Routing
bandwidth, delay and battery power). The QoS protocol aim is to just finding energy
design issue is inherently related with MANET’s consumption during end to end packet travelling
applications. Qos is the performance level of is not reliable routing but it also consider reliable
service which is offered by the network to user in links and residual energy of nodes which not only
case of QoS routing process it has to provide end improve QoS but also improve life time of
1
network. Various routing protocols have been
proposed which aim to improve reliability, node can easily remove or ignored [3]. Provide
energy efficiency and life time of network. methods to detect malicious nodes but that is not
In any MANET’s application secure sufficient to solve the black hole problem and the
communication is important; especially in more detection method should be initiated to
military application security is mandatory. Many solve the black hole attack.[6] the traffic
security protocols have been proposed which involving in a destination node, itsDst Seq may
mainly focus on the security issues related to data change. As the last in the black holeat-tack, the
integrity, confidentiality and other focus on Specifically investigate the effects of the attack
availability. when the number of connections to the number
As MANETs is specifically designed for of connection from the destination are changed.
military application and disaster recovery [8]
operations, Just resource reservation to achieve message. In order to get integrity of route replay
QoS is not enough but also robust against security message, destination node needs to replay the
threats. Hence the proposed research will mainly route reply by using proposed algorithm.
focus on Improving QoS in MANETs .The
research will be carried out using analytical and
mathematical modeling along with simulations.
The research objective is to improvement of QoS
in MANETs. The research objective is to develop
a method to mitigate the Blackhole attack in
MANETs in an efficient way. The proposed
research will mainly focus
1. Improving the Network
performance by mitigating Attacks
2. Secure communication by assuring
trust
3. To develop a security mechanism
to mitigate attacks.
This will improve overall scalability, throughput,
transmission overhead and Security of mobile ad
hoc networks. We have investigated research
problem by creating a network of number of
mobile nodes and transmit the data packets to
each other and verify the simulation results with
the help of appropriate simulation technique.
Black Hole Attack is a sort of negation of service
attack. when a malicious node can attract all
packets by false pretences a fresh route until
destination , then soak up them without for-
warding them to the destination and seggast to as
a node dropping every packet and sending
counterfeit routing packets to route packets over
itself. The sink node (the destination) to attract
additional traffic to the malicious node and then
drops them [1]. Also implemented on the AODV
protocol. Also find the malicious node. Based on
the trust value of node& define which path is
most suitable for routing the packet and untrusted