{"title":"一种防止无线Ad Hoc网络黑洞攻击的强制路由信息修改模型","authors":"M. Raza, S. Hyder","doi":"10.1109/IBCAST.2012.6177591","DOIUrl":null,"url":null,"abstract":"The black hole attack in wireless Ad Hoc network is major issue that needs efficient solutions. In black hole attack more than one node can be malicious. Most of the time black hole attack occurs in large Ad Hoc networks. The black hole attacks in wireless Ad Hoc network creates misunderstanding in network by introducing error in routing information that leads the node to select wrong path hence data lose occur. We have proposed a novel architecture of FRIMM (A Forced Routing Information Modification Model) prevents black hole attacks in wireless Ad Hoc network by introducing automatic error correction in routing information that leads the node to select correct path thus secure transmission will take place between source and destination. In this model we assume that the network is centralized. In this model we have used the popular protocol AODV (Ad Hoc On-Demand Distance Vector). It is constructed on three basic devices such as server, access points and nodes. Server and access points are fixed and has permanent infrastructure with each other. But the connections of nodes with access points are on Ad Hoc bases. The node can be any device a laptop, mobile phone etc. We used two technologies for communication between sever and access points and the access points to nodes. We have used WiMax technology (IEEE standard 802.16 10 to 66 GHz range) for the communication between server and access point, other technology WiFi (IEEE standard of 802.11b/g 2.400 GHz to 2.487 GHz) for the communication between access point and node. No nodes can communicate with sever without having connection with an access point, because the server does not have the capability of WiFi technology. We have deployed three access points in this scenario. Suppose a node come and generates request to access point for connection. The node gets response from any of the access point near to it depending upon the strength of signal. Suppose access point 1 response its request. The access point will do two amendments in its routing table first adding its MAC address in its routing table then assigning ID (N) to node. Secondly sends the updated routing table to other access points and to the server. Now another node comes into the network broadcast request for accessing access point. Two responses reached to the node, first from access point 2 and other from a malicious node saying that I am the server. In this situation the node decides to communicate directly to the server. Here black hole attack occurs, because server has no capability to communicate directly to node. The access point waits for few minutes then scan the network weather the node has leave the network or become the victim of black hole attack. After scanning the network the access point detect that node is communicating with undetermined node (M), so that access point 2 will listen the traffic between victim node and the malicious node then fetch MAC address of that malicious node. The access point also collects the information about the requests sent by the node towards malicious node. In the mean time access point 2 alerts all other access points within the network and also update the server about the black hole attack and sends MAC address of that malicious node and also send the collected requests of node to malicious node. After having the MAC address of malicious node the server will attack the black hole by the help of access point by introducing jamming style DoS attack now server can force the node by the help of access point to divert its traffic towards access point. Node agreed to divert its traffic towards access point then the communication will be started between node and server through access point. This force leads the node to modify its routing table, so node will divert its traffic towards access point and the communication will be started between node and server through access point. Here the black hole attack has been encountered, by the help of automatic modification in the routing table of node.","PeriodicalId":251584,"journal":{"name":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"A forced routing information modification model for preventing black hole attacks in wireless Ad Hoc network\",\"authors\":\"M. Raza, S. Hyder\",\"doi\":\"10.1109/IBCAST.2012.6177591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The black hole attack in wireless Ad Hoc network is major issue that needs efficient solutions. In black hole attack more than one node can be malicious. Most of the time black hole attack occurs in large Ad Hoc networks. The black hole attacks in wireless Ad Hoc network creates misunderstanding in network by introducing error in routing information that leads the node to select wrong path hence data lose occur. We have proposed a novel architecture of FRIMM (A Forced Routing Information Modification Model) prevents black hole attacks in wireless Ad Hoc network by introducing automatic error correction in routing information that leads the node to select correct path thus secure transmission will take place between source and destination. In this model we assume that the network is centralized. In this model we have used the popular protocol AODV (Ad Hoc On-Demand Distance Vector). It is constructed on three basic devices such as server, access points and nodes. Server and access points are fixed and has permanent infrastructure with each other. But the connections of nodes with access points are on Ad Hoc bases. The node can be any device a laptop, mobile phone etc. We used two technologies for communication between sever and access points and the access points to nodes. We have used WiMax technology (IEEE standard 802.16 10 to 66 GHz range) for the communication between server and access point, other technology WiFi (IEEE standard of 802.11b/g 2.400 GHz to 2.487 GHz) for the communication between access point and node. No nodes can communicate with sever without having connection with an access point, because the server does not have the capability of WiFi technology. We have deployed three access points in this scenario. Suppose a node come and generates request to access point for connection. The node gets response from any of the access point near to it depending upon the strength of signal. Suppose access point 1 response its request. The access point will do two amendments in its routing table first adding its MAC address in its routing table then assigning ID (N) to node. Secondly sends the updated routing table to other access points and to the server. Now another node comes into the network broadcast request for accessing access point. Two responses reached to the node, first from access point 2 and other from a malicious node saying that I am the server. In this situation the node decides to communicate directly to the server. Here black hole attack occurs, because server has no capability to communicate directly to node. The access point waits for few minutes then scan the network weather the node has leave the network or become the victim of black hole attack. After scanning the network the access point detect that node is communicating with undetermined node (M), so that access point 2 will listen the traffic between victim node and the malicious node then fetch MAC address of that malicious node. The access point also collects the information about the requests sent by the node towards malicious node. In the mean time access point 2 alerts all other access points within the network and also update the server about the black hole attack and sends MAC address of that malicious node and also send the collected requests of node to malicious node. After having the MAC address of malicious node the server will attack the black hole by the help of access point by introducing jamming style DoS attack now server can force the node by the help of access point to divert its traffic towards access point. Node agreed to divert its traffic towards access point then the communication will be started between node and server through access point. This force leads the node to modify its routing table, so node will divert its traffic towards access point and the communication will be started between node and server through access point. Here the black hole attack has been encountered, by the help of automatic modification in the routing table of node.\",\"PeriodicalId\":251584,\"journal\":{\"name\":\"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBCAST.2012.6177591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2012 9th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBCAST.2012.6177591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
摘要
无线自组织网络中的黑洞攻击是一个亟待解决的重大问题。在黑洞攻击中,不止一个节点可能是恶意的。黑洞攻击大多发生在大型Ad Hoc网络中。无线Ad Hoc网络中的黑洞攻击通过在路由信息中引入错误,导致节点选择错误的路径,从而造成网络中的误解,从而导致数据丢失。我们提出了一种新的结构FRIMM(一种强制路由信息修改模型),通过在路由信息中引入自动纠错,引导节点选择正确的路径,从而在源和目的之间进行安全传输,从而防止无线Ad Hoc网络中的黑洞攻击。在这个模型中,我们假设网络是中心化的。在这个模型中,我们使用了流行的协议AODV (Ad Hoc On-Demand Distance Vector)。它建立在三个基本设备上:服务器、接入点和节点。服务器和接入点是固定的,并且彼此具有永久的基础设施。但是节点与接入点之间的连接是基于Ad Hoc的。节点可以是任何设备,如笔记本电脑、移动电话等。我们使用了两种技术来实现服务器和接入点之间以及节点接入点之间的通信。我们已经使用WiMax技术(IEEE标准802.16 10至66 GHz范围)用于服务器和接入点之间的通信,其他技术WiFi (IEEE标准802.11b/g 2.400 GHz至2.487 GHz)用于接入点和节点之间的通信。由于服务器不具备WiFi技术的能力,没有接入点连接,任何节点都无法与服务器进行通信。我们在这个场景中部署了三个接入点。假设一个节点来了,并生成了对接入点的连接请求。该节点根据信号的强度从靠近它的任何接入点获得响应。假设接入点1响应了它的请求。接入点将对其路由表进行两次修改,首先在其路由表中添加其MAC地址,然后为节点分配ID (N)。其次,将更新后的路由表发送到其他接入点和服务器。现在另一个节点进入网络广播请求访问接入点。到达节点的两个响应,第一个来自接入点2,另一个来自恶意节点,说我是服务器。在这种情况下,节点决定直接与服务器通信。这里发生黑洞攻击,因为服务器没有能力直接与节点通信。接入点等待几分钟,然后扫描网络是否节点已经离开网络或成为黑洞攻击的受害者。在对网络进行扫描后,接入点检测到该节点正在与未确定的节点(M)通信,接入点2将监听受害节点与恶意节点之间的流量,然后获取该恶意节点的MAC地址。接入点还收集节点向恶意节点发送的请求信息。同时,接入点2向网络内的所有其他接入点发出警报,并更新服务器关于黑洞攻击,并发送该恶意节点的MAC地址,并将收集到的节点请求发送到恶意节点。服务器在获得恶意节点的MAC地址后,通过接入点对黑洞进行攻击,通过引入干扰式DoS攻击,服务器可以通过接入点迫使节点将流量转向接入点。节点同意将其流量转向接入点,然后通过接入点开始节点和服务器之间的通信。这种力量导致节点修改其路由表,因此节点将其流量转向接入点,并通过接入点开始节点与服务器之间的通信。在这里遇到了黑洞攻击,通过自动修改节点的路由表。
A forced routing information modification model for preventing black hole attacks in wireless Ad Hoc network
The black hole attack in wireless Ad Hoc network is major issue that needs efficient solutions. In black hole attack more than one node can be malicious. Most of the time black hole attack occurs in large Ad Hoc networks. The black hole attacks in wireless Ad Hoc network creates misunderstanding in network by introducing error in routing information that leads the node to select wrong path hence data lose occur. We have proposed a novel architecture of FRIMM (A Forced Routing Information Modification Model) prevents black hole attacks in wireless Ad Hoc network by introducing automatic error correction in routing information that leads the node to select correct path thus secure transmission will take place between source and destination. In this model we assume that the network is centralized. In this model we have used the popular protocol AODV (Ad Hoc On-Demand Distance Vector). It is constructed on three basic devices such as server, access points and nodes. Server and access points are fixed and has permanent infrastructure with each other. But the connections of nodes with access points are on Ad Hoc bases. The node can be any device a laptop, mobile phone etc. We used two technologies for communication between sever and access points and the access points to nodes. We have used WiMax technology (IEEE standard 802.16 10 to 66 GHz range) for the communication between server and access point, other technology WiFi (IEEE standard of 802.11b/g 2.400 GHz to 2.487 GHz) for the communication between access point and node. No nodes can communicate with sever without having connection with an access point, because the server does not have the capability of WiFi technology. We have deployed three access points in this scenario. Suppose a node come and generates request to access point for connection. The node gets response from any of the access point near to it depending upon the strength of signal. Suppose access point 1 response its request. The access point will do two amendments in its routing table first adding its MAC address in its routing table then assigning ID (N) to node. Secondly sends the updated routing table to other access points and to the server. Now another node comes into the network broadcast request for accessing access point. Two responses reached to the node, first from access point 2 and other from a malicious node saying that I am the server. In this situation the node decides to communicate directly to the server. Here black hole attack occurs, because server has no capability to communicate directly to node. The access point waits for few minutes then scan the network weather the node has leave the network or become the victim of black hole attack. After scanning the network the access point detect that node is communicating with undetermined node (M), so that access point 2 will listen the traffic between victim node and the malicious node then fetch MAC address of that malicious node. The access point also collects the information about the requests sent by the node towards malicious node. In the mean time access point 2 alerts all other access points within the network and also update the server about the black hole attack and sends MAC address of that malicious node and also send the collected requests of node to malicious node. After having the MAC address of malicious node the server will attack the black hole by the help of access point by introducing jamming style DoS attack now server can force the node by the help of access point to divert its traffic towards access point. Node agreed to divert its traffic towards access point then the communication will be started between node and server through access point. This force leads the node to modify its routing table, so node will divert its traffic towards access point and the communication will be started between node and server through access point. Here the black hole attack has been encountered, by the help of automatic modification in the routing table of node.