CFP last date
20 December 2024
Reseach Article

Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Published on January 2012 by Nidhi Purohit, Richa Sinha, Hiteishi Diwanji
Wireless Communication and Mobile Networks
Foundation of Computer Science USA
WCMN - Number 1
January 2012
Authors: Nidhi Purohit, Richa Sinha, Hiteishi Diwanji
3e197b74-dff6-4577-bb26-0cbc073ccf01

Nidhi Purohit, Richa Sinha, Hiteishi Diwanji . Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3. Wireless Communication and Mobile Networks. WCMN, 1 (January 2012), 42-46.

@article{
author = { Nidhi Purohit, Richa Sinha, Hiteishi Diwanji },
title = { Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3 },
journal = { Wireless Communication and Mobile Networks },
issue_date = { January 2012 },
volume = { WCMN },
number = { 1 },
month = { January },
year = { 2012 },
issn = 0975-8887,
pages = { 42-46 },
numpages = 5,
url = { /specialissues/wcmn/number1/5457-1009/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Wireless Communication and Mobile Networks
%A Nidhi Purohit
%A Richa Sinha
%A Hiteishi Diwanji
%T Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3
%J Wireless Communication and Mobile Networks
%@ 0975-8887
%V WCMN
%N 1
%P 42-46
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless networks are gaining popularity to its peak today, as the user’s wants wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). The attacks studied in this paper are against the routing protocols in Mobile ad hoc network. We have used AODV for simulating this attacks using NS3. Black hole attack is one of the security threat in which the traffic is redirected to such a node that drops all the packets or the node actually does not exist in the network. Black holes refer to places in the network where incoming traffic is silently discarded or dropped. Jellyfish (JF) attack is a type of selective black hole attack. When JF node gets hold of forwarding packet it starts delaying/dropping data packets for certain amount of time before forwarding normally. Since packet loss is common in mobile wireless networks, the attacker can exploit this fact by hiding its malicious intents using compliant packet losses that appear to be caused by environmental reasons

References
  1. Perkins, Charles E, “Ad Hoc Networking,” Addison-Wesley, 2001.
  2. Suma R, Sridevi K N, Mozil M , Mungara J.N ,Sethi P, “Random-Cast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks,” European Journal of Scientific Research,2011
  3. T. Karygiannis and L. Owens, “Wireless Network Security, 802.11, Bluetooth and Handheld Devices,” NIST Publication, p. 800(48), November 2002
  4. Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz,“A review of routing protocols for mobile ad hoc networks”, Technical report, Telecommunication and Information Research Institute, University of Wollongong, Wollongong, NSW 2522; Motorola Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia, 2003.
  5. C. Perkins and P Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing DSDV for mobile computers”, In ACM SIGCOMM’94 Conference on Communication Architectures, protocols and applications, 1994
  6. C.E. Perkins, E. Belding Royer, and S.R. Das, “Ad hoc On demand distance vector (AODV) routing”, IETF RFC 3561, July 2003
  7. D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007
  8. Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker,
  9. “Mitigating routing misbehavior in mobile ad hoc networks”, International Conference on Mobile Computing and Networking, Proceedings of the 6th annual international conference on Mobile computing and networking, 2000, Boston, Massachusetts
  10. P. Sankareswary, R. Suganthi, G.Sumathi, “Impact of selfish nodes in multicast Ad hoc on demand Distance Vector Protocol”, in Wireless Communication and Sensor Computing, 2010
  11. A. Babakhouya, Y. Challal, and A. Bouabdallah, "A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks", in Proc. of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, September 2008
  12. V. Gupta, S. Krishnamurthy, and M. Faloutsos, .Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks,. in Proc. of IEEE MILCOM ’02, 2002
  13. NS -3 manual (Release ns-3.11)
  14. Irshad Ullah and Shoaib ur Rehman, “ Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols”
  15. B. B. Jayasingh and B. Swathi, “A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network”, BVICAM’S International Journal of Information Technology
  16. Satyanarayana Vuppala, Alokparna Bandyopadhyay, Prasenjit Choudhury and Tanmay De, “A Simulation Analysis of Node Selfishness in MANET using NS-3”
  17. Fei Xing Wenye Wang, “Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks”
  18. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007
  19. Moitreyee Dasgupta, S. Choudhury, N. Chaki, “Routing Misbehavior in Ad Hoc Network”, International Journal of Computer Applications,2010
  20. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”
  21. Imad Aad,y JeanPierre ,Hubaux,y and Edward W. Knightly, “Denial of Service Resilience in Ad Hoc Networks”
  22. RFC 3561: Ad hoc on demand Routing protocol
  23. E. A .Mary Anita and V. Vasudevan “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining”, International Journal of Computer Applications.
Index Terms

Computer Science
Information Sciences

Keywords

AODV protocol Black hole & Jellyfish attack Mobile ad hoc networks (MANETs) Network Simulator-3