# INTRODUCTION obile ad hoc network (MANET) is one of the recent active fields and has received spectacular consideration because of their selfconfiguration and self-maintenance. Early research assumed a friendly and cooperative environment of wireless network. As a result they focused on problems such as wireless channel access and multihop routing. But security has become a primary concern to provide protected communication between mobile nodes in a hostile environment. Although mobile ad hoc networks have several advantages over wired networks, on the other side they pose a number of non-trivial challenges to the security design as they are more vulnerable than wired networks [1]. These challenges include open network architecture, shared wireless medium, demanding resource constraints, and, highly dynamic network topology. In this paper, we have considered a fundamental security problem in MANET to protect its basic functionality to deliver data bits from one node to another. Nodes help each other in conveying information to and fro and thereby creating a virtual set of connections between each other. Routing protocols play an imperative role in the creation and maintenance of these connections [4,5]. In contrast to wired networks, each node in an ad-hoc networks acts like a router and forwards packets to other peer nodes. The wireless channel is accessible to both legitimate network users and malicious attackers. As a result, there is a blurry boundary separating the inside network from the outside world. Author ? : Department of Electronics and Communication, Sri Satya Sai Institute of Science and Technology,Sehore M.P. India. E-mails : yatin.dd@gmail.com, jksingh81@yahoo.co.in Many different types of routing protocols have been developed for ad hoc networks and have been classified into two main categories by Royer and Toh (1999) as Proactive (periodic) protocols and Reactive (on-demand) protocols. In a proactive routing protocol, nodes periodically exchange routing information with other nodes in an attempt to have each node always know a current route to all destinations [2]. In a reactive protocol, on the other hand, nodes exchange routing information only when needed, with a node attempting to discover a route to some destination only when it has a packet to send to that destination [3]. In addition, some ad hoc network routing protocols are hybrids of periodic and on-demand mechanisms. Wireless ad hoc networks are vulnerable to various attacks. These include passive eavesdropping, active interfering, impersonation, and denial-of-service. A single solution cannot resolve all the different types of attacks in ad hoc networks. In this paper, we have evaluated MANET with and without black hole attack. In Section II of this paper, we summarize the basic operation of AODV (Ad hoc On-Demand distance Vector Routing) protocol on which we base our work. In Section III, we describe the effect of blackhole attack in AODV. Section IV presents the performance evaluation based of MANET with and without black hole attack on simulation experiments. Section V presents conclusion and future work. # II. # AODV One of the typical routing protocols for MANET is called Ad hoc On-Demand Distance Vector (AODV) [4]. In this protocol, if a source node wants to send data packets to a certain destination node, the source node broadcasts a Route Request (RREQ) packet. Every node that receives the RREQ packet checks whether the node is the destination for that packet and if it is the case, the node sends back a Route Reply (RREP) packet. If it is not the case, then the node checks with its routing table to determine if it has a route to the Destination. If it does not have such a route, it relays the RREQ packet by broadcasting the packet to its neighbours. If it has a route to the destination, then the node compares the destination sequence number in its routing table with that in the RREQ packet. The number in the RREQ packet was obtained by the source node from the packet transmitted by the destination to the than that In the RREQ packet, the route is fresher and the data packets can be sent through this route. Then this node becomes an intermediate node and sends back a RREP packet to the source node along the route through which it received the RREQ packet. The source node then updates its routing table and starts to send its data packets through this route. However, this protocol is highly susceptible to routing attacks especially the black hole attack [6] because of the dynamic topology and lack of any infrastructure in the network. # III. # BLACK HOLE ATTACK An ad-hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile adhoc network. Being one of the category of ad-hoc routing protocols, on-demand protocols such as AODV (Ad-hoc On demand Distance Vector) and DSR (Dynamic Source Routing) establish routes between nodes only when they are required to route data packets. AODV is one of the most common adhoc routing protocols used for mobile ad-hoc networks. As its name indicates AODV is an on-demand routing protocol that discovers a route only when there is a demand from mobile nodes in the network. In an ad-hoc network that uses AODV as a routing protocol, a mobile node that wishes to communicate with other node first broadcasts an RREQ (Route Request) message to find a fresh route to a desired destination node. This process is called route discovery. Every neighbouring node that receives RREQ broadcast first saves the path the RREQ was transmitted along to its It subsequently checks its routing table to see if it has a fresh enough route to the destination node provided in the RREQ message. The freshness of a route is indicated by a destination sequence number that is attached to it. If a node finds a fresh enough route, it unicasts an RREP (Route Reply) message back along the saved path to the source node or it re-broadcasts the RREQ message otherwise. The same process continues until an RREP message from the destination node or an intermediate node that has fresh route to the destination node is received by the source node. Route discovery is a vulnerability of ondemand ad-hoc routing protocols, especially AODV, which an adversary can exploit to perform a black hole attack on mobile ad-hoc networks. A malicious node in the network receiving an RREQ message replies to source nodes by sending a fake RREP message that contains desirable parameters to be chosen for packet delivery to destination nodes. After promising (by sending a fake RREP to confirm it has a path to a destination node) to source nodes that it will forward data, a malicious node starts to drop all the network traffic. An ad hoc network is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. However, none of them deal with the issues of security. The presence of malicious nodes in an ad hoc network deteriorates the network performance. IV. # PERFORMANCE EVALUATION Some assumptions, which are considered realistic, are presented. First of all, the MANET is based on IEEE 802.11 standards. We consider a rather large scale MANET which is deployed in a hostile environment. Nodes are limited in their storage and computational and communication resources. Every node has the same transmission range and nondirectional antenna. The nodes are battery-powered, and hence it is crucial to conserve energy to prolong the lifetime of the network. Due to the wireless communication, each node can overhear the message broadcasted by other nodes in the transmission range. Every node locates randomly and moves randomly, which means the immediate neighboring nodes of any nodes are not known by each other without exchanging any messages. The network is rather dense so that a message in general could be overheard by multiple nodes. We assume that neither source node nor destination node is malicious and the adversary who plays black hole attack is an intermediate node. In addition, we assume there are one or more nodes that perform the black hole attack in the MANET. Moreover, a malicious node has knowledge of other malicious nodes' ID and is able to cooperate with these other malicious nodes. Table summarizes the simulation parameters for our simulation. One of the basic assumptions for the design of routing protocols in MANETs is that every node is honest and cooperative. That means, if a node claims it can reach another node by a certain path or distance, the claim is trusted/true; similarly, if a node reports a link break, the link will no longer be used. While this assumption can fundamentally facilitate the design and implementation of routing protocols, it meanwhile introduces a vulnerability to several types of denial of service (DoS) attacks [4], particularly packet dropping attack. To launch such attack, a malicious node can stealthily drop some or all data or routing packets passing through it. Due to the lack of physical protection and reliable medium access mechanism, packet dropping attack represents a serious threat to the routing function in MANETs. A foe can easily join the network and compromise a legitimate node then subsequently start dropping packets that are Fig. 2 Expected to be relayed in order to disrupt the regular communications consequently, all the routes passing through this Node fails to establish a correct routing path between the source and destination nodes. Figure 1 and 2 shows the results (snapshots) of our simulation which is performed with NS-2.34 [7]. Different nodes are numbered which are written in circles. Blue circles show the coverage area of nodes. Blue Colored Square is packet drop from node. Node 2 is implemented as malicious node. So more packets are dropped by it. Figure 3 shows the packet drop by node when there is black hole attack in Mobile Adhoc Network. As packets are sent constantly, they will reach after some time delay to destination and some number of packets is between nodes. As mobility of node increase the packet dropping is also increase. In figure the packet received and drop for nodes for different mobility of node is shown. between them was then conducted to highlight their respective effectiveness and limitations. We concluded that the packet drop is more in MANET with black hole attack than without black hole attack. We believe it is an interesting and significant topic for further exploration with more evaluation of performance of MANET. As well as detection and prevention of black hole attack is also an area of future research. ![Global Journal of Researches in EngineeringVolume XII Issue v v v v III Version I](image-2.png "M") 1![Fig. 1](image-3.png "Fig. 1") 3![Fig. 3 : With Black hole In the case when there is no black hole attack in Mobile Adhoc network, the performance is improved as shown in fig. 4. The packet dropping is very less as shown in figure.](image-4.png "Fig. 3 :") 4![Fig. 4 : Without Black hole](image-5.png "Fig. 4 :") -32Volume XII Issue v v v v III Version ID D D D )(Global Journal of Researches in EngineeringParameter Simulator MAC Layer Protocol Mobility Model Node Placement Terrain Range Examined ProtocolValue NS-2.34 IEEE 802.11 Random Way Point Random Uniform 1200 × 1200 m 2 AODVNumber of Mobile Nodes25Simulation Time500 sChannel Bandwidth2 MbpsMaximum Speed10 -500 m/sApplication TrafficCBRPacket Size400 & 512 BytesMaximum Connection29© 2012 Global Journals Inc. (US) © 2012 Global Journals Inc. (US) source node. If the number in the routing table is larger © 2012 Global Journals Inc. (US) * A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks MElizabeth Chai-KeongRoyer Toh April 1999 IEEE Personal Communications * CEPerkins S RDas ERoyer RFC 3561 Ad-I-Ioe on Demand Distance Vector(AODV) * A study of different types of attacks on multicast in mobile ad hoc networks H LanNguyen U TrangNguyen No. I 6 2007 Ad Hoc Network * Securing Ad Hoc Networks LZhou Z1Haas IEEE Network Magazine 13 6 November/ Deeember 1999 * Routing security in wireless ad hoc network HDeng WLi DP 2002 IEEE Communications Magazine * Black Hole Attack in Mobile Ad Hoc Network Ai-ShurrnanMohanmmad ACMSE' 04 April 2004 * Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Network by Dynamic Learning Method SatoshiKurosawa HidehisaNakayama NeiKato AbbasJamalipour YoshiakiNemoto International Journal of Network Security 5 November, 2007 * The Network Simulator-ns-2