Professional Documents
Culture Documents
Blackhole Detection and Prevention Strategies in DTN
Blackhole Detection and Prevention Strategies in DTN
in
International Journal Of Engineering And Computer Science ISSN: 2319-7242
Volume 5 Issues 8 Aug 2016, Page No. 17386-17391
ABSTRACT: Delay Tolerance Network (DTN) is a network which is used for sparse networks where
network connectivity is not possible between two nodes so for this number of intermediate nodes is
used to transfer messages. These intermediate nodes may cause network so security in DTN is a very
difficult task. In this paper blackhole attack and its various detection techniques are presented with
literature review of different research papers that covers black hole detection and prevention
mechanism. A blackhole node behaves maliciously in network and provides wrong data routing
information or may drop the messages receives from other nodes. So it is difficult to find black hole
attack and prevent network from them. These techniques are used in the prevention of network from
blackhole attack.
Keywords: DTN, Security, Blackhole Attack, Reputation, Routing and Movement model etc.
1
Rakhi Sharma, IJECS Volume 05 Issue 08 Aug 2016 Page No.17386-17391 Page 17387
DOI: 10.18535/ijecs/v5i8.06
ii. Spray and Wait: In SAW routing source accessibility in answering to the course demand
messages in two phases. In first phase it and accordingly block the information bundle and
replicate messages and waits for a time for hold it.
the acknowledgement from any other
intermediate nodes which are in the range
of destination node. In second phase
source sends messages only to those
intermediate nodes through which it
receives acknowledgment. In this routing
delivery ratio and overhead ratio is slightly
lower than epidemic routing [6].
iii. Prophet routing: In prophet routing source
node sends messages through the node
having highest chances of message
delivery to next node. This intermediate
node is chosen by computing the
probability of message delivery of node. In
this routing mechanism delivery ratio is Fig 2: Black Hole Attack in DTN
constant while overhead ratio decreases
Black Hole attack has two properties:
[7].
IV. Black Hole Attack • First, it sends the wrong directing data to
the source node.
Black hole is a network layer attack [8]. At the
point when a source node sends a Route Request • Second, it blocks or drops the bundles
(RREQ) to its neighbour nodes, then all nodes which are bound to destination node through
node answers with smallest metric quality. Source II. Literature Review
node supposes this node has the most restricted
Fu et al. [9] utilized an information steering data
path to the destination. In black hole attack, an
(DRI) table at every node and cross checking
attacker node utilizes its directing convention to
strategy to recognize the helpful black hole nodes
advertise that it has the most limited path from
in the system. The adjusted AODV directing
source to the destination node or to the bundle it
convention was utilized to accomplish this
needs to capture. This antagonistic node promotes
approach. The analysis results demonstrate that
its accessibility of new and briefest paths without
this arrangement performs superior to anything
looking in its directing table. Along these lines
different arrangements.
attacker node will dependably have the
1
Rakhi Sharma, IJECS Volume 05 Issue 08 Aug 2016 Page No.17386-17391 Page 17388
DOI: 10.18535/ijecs/v5i8.06
Tao and Bharat [10] displayed the most vital types help techniques which are regularly utilized as a
of attacks and talk about conceivable cooperation part of existing secure strategy. On the premise of
among different attackers and show how different theoretical investigation, the reports so framed
sign preparing and neural learning can help in between BC assailants have the most significant
discovery and barrier of collective attacks in such likenesses amount. They proposed a calculation to
situations. They similarly demonstrated how check irregularity discovery and to distinguish BC
collective attacks can bring about a more terrible attackers. The Numerical results demonstrate that
impact on remote than on a wired system. the proposed method can without much of a
Analysis results show the acceptance and viability stretch recognize and discover BC aggressors
of the model proposed by minimizing the obviously.
communitarian attacks and vaccinating the
III. Existing techniques
portable specially appointed systems.
i. Reputation Based System: In this system
Yi Hu et al. [11] tended to the issue of cooperative
every node gives response of its neighbour
insider attacks where basic information inside the node by checking its reputation value and
data frameworks is traded off by two or more order whether it is deadly node or normal
insiders cooperating. Authors initially talked node. The disadvantage of this technique
about different relations among illegal data stream was that measuring reputation of node is a
outline and data framework parts. At that point difficult assignment as a result of element
after, different attributes of information gets to nature of nodes [14].
outlined by the common get to record's likelihood ii. CORE: In this strategy, node advances the
regard and the exchange separation to information bundle by monitoring different nodes and
thing are displayed. Subsequently the calculation their development. Drawback of technique
is presented for distinguishing community was that the sender node relies on upon
oriented insider attacks. another node and if another node is
Sanjay et al. [12] proposed a system to keep it by destructive then transmission is modified
occupying movement from the Black Hole nodes. [15].
The MANETs so talked about make utilization of iii. Buddy System: This strategy depends on
the AODV steering convention and the strategy so social structure, implies how one node
proposed depends on sending confirmation relies on upon another node. In light of this
messages that are confirmed by the destination to it is to be chosen whether node advances
check for the Black Hole nearness in the GAODV the bundles or not. Disadvantage of this
directing convention so proposed. technique was measuring the contact
between two nodes as a result of aspect
Liu et al. [13] proposed a theory that adjusted
nature of nodes [16].
Collaborative attackers can pass trusted nodes
1
Rakhi Sharma, IJECS Volume 05 Issue 08 Aug 2016 Page No.17386-17391 Page 17389
DOI: 10.18535/ijecs/v5i8.06
[1] K.Fall, “A Delay-Tolerant Network [8] Sonika Gandhi, A.N. Jaiswal, “A Method for
Architecture or Challenged Internets,” In Detecting Attacks on Delay Tolerant
Proceeding of ACM SIGCOMM, 2003, Pp. 27– Network”,International Journal of Advanced
34. Computational Engineering and Networking,
Issn: 2320-2106, Volume-2, Issue-6, June-
[2] F. Warthman, “Delay-Tolerant Networks
20.
(DTNs): A Tutorial,” 2003, Version13 Mar 2013.
[9]S. Ramaswamy, H. Fu, M. Sreekantaradhya, J.
[3] Maurice J. Khabbaz, Chadi M. Assi and
Dixon, and K. Nygard, “Prevention of
Wissam F. Fawaz,“Disruption-Tolerant
Cooperative Blackhole Attack in Wireless Ad-hoc
Networking. A Comprehensive Survey on Recent
Networks”, International Conference on Wireless
Developments and Persisting Challenges”, IEEE
Networks (ICWN), 2003.p.1-7.
Communications Surveys & Tutorials, Vol. 14,
[10]Tao Gong1 and Bharat Bhargava,
No.2, Second Quarter 2012.
“Immunizing mobile ad-hoc networks against
[4] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson,
collaborative attacks using cooperative immune
R. Durst, K. Scott, E. Travis and
model”, article published in Wiley Online Library
H.Weiss,“Interplanetary Internet (IPN):
(wileyonlinelibrary.com), Issue: Security and
Architectural Definition,” Available Online:
Communication Networks, 2013.p.58-68.
1
Rakhi Sharma, IJECS Volume 05 Issue 08 Aug 2016 Page No.17386-17391 Page 17390
DOI: 10.18535/ijecs/v5i8.06
1
Rakhi Sharma, IJECS Volume 05 Issue 08 Aug 2016 Page No.17386-17391 Page 17391