A new packet trap based algorithm to detect black hole attack in ad hoc networks

Number of pages: 113 File Format: word File Code: 31090
Year: 2014 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of A new packet trap based algorithm to detect black hole attack in ad hoc networks

    Dissertation for Master Degree in Computer Engineering (M.Sc.)

    Trend: Software

    Abstract

    Nowadays, moving ad hoc networks are more widely used and popular than in the past. Therefore, paying attention to the category of security in such networks is of great importance to the point where it has become one of the important topics in scientific and research circles in the fields of information exchange. The presence of malicious attacks is one of the things that have seriously challenged the security of private networks. Black hole attack is one of these attacks. In this research, a new algorithm for detecting black hole malicious nodes has been presented for the demand-based routing protocol [1] in mobile ad hoc networks. This algorithm identifies malicious nodes by sending empty packets (traps) to frequently used nodes in the network and checking the input and output of these nodes. The proposed method will have the ability to run in parallel on several processors, which will increase the speed of the algorithm execution. The results of the simulation of the proposed algorithm show the ability of the proposed method to detect malicious black hole nodes. Also, the amount of packet loss will be reduced by using this method and the operational capacity of the network will increase to a favorable ratio.

    Key words: black hole attack;  moving case networks;  security; intrusion detection; trap package; AODV routing protocol

    Chapter 1

    Research overview

    Introduction

    Mobile ad hoc networks [2] include sets of nodes that can freely communicate with each other without having any network infrastructure and through radio frequencies. The speed of setting up and the unstructured nature of these networks has made them play a very important role in various fields, especially military and emergency applications [22], [5] The topic of security in these networks is one of the important research topics today. Mobility of nodes, mobility of communication, dynamic change of network structure, lack of centralized management to check behaviors and functions, lack of specific defense lines and limitation in consumption power of nodes provide a suitable platform for various attacks against these networks. The attacks that exist in these networks are somehow different from the attacks in other networks, and of course the systems used to detect attacks in these networks are different from those in common wired networks. [5]

    Mobile ad hoc networks are sets of mobile nodes that can be formed dynamically anywhere and anytime without using any network infrastructure. Most of these nodes act as a router[3] and as a host[4] at the same time. This feature has made it possible to use these networks in emergency cases where it is not possible to form a network with a fixed and predefined structure, such as military cases or floods and such. Communication between nodes in these networks is done through radio waves, and if a node is in the radio range of another node, it is considered a neighbor of that node, and otherwise, if there is a need for communication between two nodes that are not in the radio range of each other, the help of other nodes can be used in this case. Therefore, the communication between nodes in these networks is somehow based on trust and cooperation between nodes. What needs to be paid special attention in the applications of these networks is the limitation of the resources used in it. Therefore, the evaluation criteria of these networks are different from those in wired networks. Some examples of these criteria are as follows: [22]

    Energy consumption

    Route stability despite its mobility

    Security

    Identifying the routing protocols of mobile ad hoc networks is necessary to understand the security problems of these networks. The routing protocols of these networks are different from those in wired networks due to high route updates, node mobility, and limited communication range. Therefore, the routing protocol used in these networks needs to keep the following in mind: [16]

    Considering that centralized routing involves a lot of overhead and is not scalable as a result, it is necessary for its routing algorithm to be completely distributed.

    It should be compatible with the large change in network alignment [5] that occurs due to the large movement of nodes.

    The calculation and maintenance of routes should include the minimum number of routes and the existing nodes are required to have the fastest access to the routes.

    The demand-based distance vector protocol, which is defined as an on-demand protocol, has route request [6] and route response [7] packets. This protocol is not based on routing from the source and uses a routing table for intermediate nodes [27]. The general working method is as follows: When a source node needs a route to a destination node and there is no valid route in the routing table, the source node broadcasts a route request packet to the destination node [8]. When each node receives the route request packet, it creates or updates a reverse route to the source node in the routing table, and if it does not have a valid route in the routing table to the destination node, it rebroadcasts the route request packet. When the route request packet arrives from the source node to the destination node via broadcast, the destination node creates or updates the reverse route and sends a route response packet that has an increased sequence number [9] in the unicast reverse route [10]. When the route response packet reaches the source node along the reverse route, it creates or updates a forward route to the destination and communication starts [24].

    1-2 statement of the problem

    Because of the routing structure of mobile ad hoc networks, which is based on a kind of trust between nodes, it provides a good opportunity for attackers to participate in the routing process, cause routing deception and ultimately disrupt the routing. The self-structuring feature [11] of mobile ad hoc networks will also cause a series of attacks [16]. The structure of this network is such that when a node enters, it is necessary to assign an ID to it by obtaining information from other nodes. A malicious node [12] can disrupt this or take the ID assigned to the node for itself [22].

    The use of attack prevention methods in these networks faces more limitations. For example, encryption [13] and authentication [14] methods are used in these networks for defense purposes. But according to the structure of these networks, there is a possibility that a node will be stolen and if there is a private key [15] for it, this key will be revealed, so these methods will be useless. Considering that there is no centralized structure for nodes in mobile ad hoc networks, nodes cannot trust the security facilities of the network and each node needs to consider its own security [5]. This firewall causes only nodes with physical address [17] to connect to the network. The absence of this option for mobile ad hoc networks makes it easy for attackers to enter the network. In the case of an attack on the network, in the best case, the attacking node can find out the existence of confidential information by checking the network information, and in the worst case, it can cause a disconnection between the nodes. Due to the lack of a specific access point to control the entry and exit of packets in mobile ad hoc networks, there is no suitable place to install a firewall in a way that checks the entire network traffic. Mobile nodes can easily enter or leave the network without any restrictions being imposed on them. Routing algorithms that operate on mobile ad hoc networks require complete trust between nodes, which reduces the security factor in these networks. Also, not having a centralized structure prevents the existence of a central supervisor in the system[22].

    Black hole attack[18] is one of the most well-known attacks in mobile ad hoc networks. This attack is applied through one of the nodes in the network. Because an attacking node from outside the network introduces itself as a node inside the network. This node sends a favorable route response to each received route request, regardless of its routing table and whether this node has a route to the destination node or not. This shortens the sending of route response packets compared to other nodes, and the network nodes find this node as a suitable and short path for sending packets and send their packets from this node's route.

  • Contents & References of A new packet trap based algorithm to detect black hole attack in ad hoc networks

    List:

    Abstract.. 1

    Chapter One: General Research

    1-1 Introduction 3

    1-2 Statement of Problem 5

    1-3 Importance and necessity of research. 7

    1-4 research objectives. 7

    1-5 Hypotheses 7

    Chapter Two: Review of Research Literature and Research Background

    2-1 Intrusion Detection Systems 9

    2-1-1 History of Intrusion Detection Systems 9

    2-1-2 Architecture of Intrusion Detection Systems 12

    2-1-3 Information Receiving Methods. 13

    2-1-4 Analysis methods. 14

    2-1-5 Timing. 15

    2-1-6 Response methods. 15

    2-1-7 System control. 16

    2-1-8 Information sources. 17

    2-1-8-1 Network-based system information sources. 19

    2-1-9 analysis and intrusion detection techniques 20

    2-1-10 response techniques. 21

    2-2 mobile networks 23

    2-2-1 networks with infrastructure. 25

    2-2-2 networks without infrastructure. 26

    2-3 mobile ad hoc network 27

    2-3-1 history of mobile ad hoc networks 28

    2-3-2 features and characteristics of mobile ad hoc networks. 29

    2-3-2 routing in mobile ad hoc networks 33

    2-3-2-1 routing protocols. 34

    2-3-3 Applications of mobile ad hoc networks 40

    2-3-4 Security in mobile ad hoc networks 42

    2-3-4-1 Characteristics of a secure system. 42

    2-3-4-2 cycle of security. 43

    2-3-4-3 security problems in mobile ad hoc networks 44

    2-3-4-4 types of attacks in mobile ad hoc networks 45

    2-4 Research background. 54

     

    Chapter Three: Research Implementation Method

    Introduction.. 60

    3-1 First Phase.. 61

    3-2 Second Phase 63

    3-3 Third Phase 66

     

    Chapter Four: Data Analysis

    4-1 NS software. 68

    4-2 characteristics of the simulated network. 69

    4-3 evaluated parameters. 70

    4-4 Results.. 71

    4-5 Data Analysis. 75

    4-5-1 Average packet loss rate 75

    4-5-2 Network throughput. 76

    4-5-3 total network delay 77

    4-5-4 normal routing times. 78

     

    Chapter Five: Conclusions and Suggestions

    5-1 Conclusion. 81

    5-2 suggestions. 86

    Resources and sources.. 87

    Appendices 91

    English abstract. 104

     

     

    Source:

    Persian sources

    [1] Hafizpour, Hadith. (2011). Presenting a new algorithm to detect black hole attack in AODV routing. Master's thesis in computer engineering, software orientation. Faculty of Technical Engineering. Islamic Azad University. Science and Research Unit.

    [2] Kargar, H.R. Tasgardi, M. b. and Akbari, M. 2019. Comprehensive guide for ns-2 emulator software.  Tehran: Naqos

    English sources

    [3] Alem Y.F, Xuan Z.C. (2010). "Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection". in: proc. IEEE Of the International Conference on Communication. 978-1-4244-5824-0.

    [4] Anita, E.A.M., Vasudevan, V. (2010). "Blackhole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining". Intl. Journal of Computer Applications.

    [5] Basagni, S., Conti, M., Giordano, S. (2004). "Mobile Ad Hoc Networking". IEEE Press. ch10. ISBN: 0471373133.

    [6] Clausen, T., Jacquet, P. (2003). "Optimized Link State Routing Protocol (OLSR)". IETF RFC3626.

     [7] Djahel, S., Nait-Abdesselam, F., Khokhar, A. (2008). "An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol".  Proc. of the IEEE International Conference on Communications (ICC), pp. 2780–2785.

    [8] Guardo, E., Morabito, G., Catania, G., Mursia, A., Battiati, F. (2014). "BRAVO: A Black-hole Resilient Ad-hoc on demand distance Vector routing for tactical communications". IEEE International Black Sea Conference on Communication and Networking.

    [9] Gurley Bace, R. (2000). “Intrusion Detection”, Macmillan Technical Publishing.

    [10] Hu, Y.C., Perrig, A. (2004). "A Survey of Secure Wireless Ad Hoc Routing". IEEEIEEE Security and Privacy. 2(3),28-39.

    [11] Hu, Y.C., Perrig, A., Johnson, D.B. (2005). Ariadne: "A secure On-Demand Routing Protocol for AdHoc Networks". In Wireless Networks Journal. 11(1,2), 21-38

    [12] Jain, S., Jain, M., Kandwal, H. (2010) “Advanced Algorithm for Detection and Prevention of Cooperative Black and Grayhole Attacks in Mobile Ad Hoc Networks”. Intl. Journal of Computer Applications 1(7):37–42.

    [13] Kaur, J., Singh, B. (2014). "Detect and Isolate Black Hole Attack in MANET using AODV Protocol". International Journal of Advanced in Computer Engineering & Technology (IJARCET). [14] Kim, H., Eugene, H., Spafford, G. (1995). "The Design and Implementation of Tripwire: A File System Integrity Checker". Purdue University. [15] Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y. (2007). "Detecting blackhole attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method".  International Journal of Network Security 5 (3) 338–346.

    [16] Larsson, T., Hedman, N. (1998). "Routing Protocols in Wireless Ad-hoc Networks A Simulation Study". Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm. [17] Lundberg, J. (2000). Routing Security in Ad Hoc Networks. Seminar on Network Security". pp. 1-12.

    [18] Luo, J., Fan, M., Ye, D. (2008). "Black Hole Attack Prevention Based on Authentication Mechanism".  Proc. of the IEEE Singapore International Conference on Communication Systems (ICCS), pp. 173–177.

    [19] Lu, S., Li, L., Lam, K-Y., Jia, L. (2009). "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack". Proc. of Intl. Conference on Computational Intelligence and Security (CIS '09), Dec. 11-14, Beijing, China, pp. 421-425.

    [20] Momen, A.M.A., Hamza, H.S., Saroit, I.A. (2010). "A Survey on security enhanced multicast routing protocols in Mobile Adhoc Networks". IEEE Conference. pp-262-268

    [21] Mohanapriya, M., Krishnamurthi, I. (2013). "Modified DSR protocol for detection and removal of selective black hole attack in MANET". Elsevier Ltd. doi:10.1016-j.

    [22] Murthy,  S.R., Manoj,  B.S. (2007). "Ad hoc Wireless Networks: Architectures and Protocols". Pearson Education. ISBN: 9788131759059.

    [23] Papadimitratos, P., Zygmunt, J. (2002). "Secure Routing for Mobile Ad Hoc Networks". Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS).

    [24] Perkins, C.E., Beliding-Royer, Das, S.E. (2004). "Ad hoc on-demand distance vector (AODV) routing". IETF Internet Draft.  MANET working group.

    [25] Perkins, C.E., Das, S.R., Royer,  E.M.   (2000). "Ad-Hoc on Demand Distance Vector (AODV)".  http://www.ietf.org/internet-drafts/draft-ietf -manet-aodv-05.txt.

    [26] Perkins, C.E., Belding-Royer, E.M., Das,  S.R.  (2003). Mobile Ad Hoc Networking Working Group. http://www.cs.ucsb.edu/Internet Draft/draft-ietf -manet-bcast-02.txt

    [27] Perkins, E.C.,  Bhagwat,  P. (1994). "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers". SIGCOMM .

    [28] Person, M. (2000).“Mobile Agent Architectures”, Defense Research Establishments.

     [29] Qabajeh, L.K., Kiah, L.M., Qabajeh, M.M. (2009). "A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks". IJCSN  International Journal of Computer Science and Network Security.

    [30] Raja Mahmood,  R.A., Khan, A.I. (2007). "A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks". in: Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 1–6.

    [31] Roesch, M. (1999). "Snort - Light Weight Intrusion Detection for Networks". USENIX Association.

    [32] Shurman, M.A., Yoo, S.M., Park, S. (2004).

A new packet trap based algorithm to detect black hole attack in ad hoc networks