Secure Routing in DSR to Mitigate Black Hole Attack Ashutosh Bhardwaj Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee - 247667, Uttarakhand, India ashu9pec@iitr.ac.in AbstractMobile adhoc networks (MANETs) consist of mobile nodes with no fixed infrastructure. Dynamic Source Routing (DSR) which is on-demand routing protocol is a widely accepted mobile adhoc network routing protocol used to provide connectivity to mobile nodes. However, DSR and other on- demand routing protocols are vulnerable to different types of security attacks and black hole attack is one of them. In black hole attack, malicious node sends a fake route reply in response of route request to source node claiming for an optimal route to the destination. Thus, node which starts route discovery process establishes a path through malicious node and starts sending data packet on this route. Malicious node drops the data packet which reduces packet delivery ratio. To secure DSR, we propose a scheme which confirms the authenticity of route with the help of verification packet. This packet is generated by first intermediate hop in the route of route reply. Simulation results show improvement in packet delivery ratio and throughput. Keywords MANET, DSR, Routing, Black hole, Security I. INT RODUCT ION A mobile adhoc network contain number of mobile nodes, which plays an important role in routing. Mobile nodes which are in same radio communication range communicate directly otherwise requires cooperation of other nodes and perform multi-hop communication [1]. In multi-hop communication, nodes communicate without infrastructure and provide connectivity by forwarding packet to neighbor. For this connectivity node uses routing protocol. Network topology in MANET change frequently and changes are distributed among nodes. Nodes may join or leave network and are required to work with collaboration due to absence of central control in network operation. A node acts as host and router simultaneously. Routing decision has great importance in security concerns. The network can be broken if routing is misdirected. The problem is enlarged because routing rely on trust of all nodes that participate in routing. Since nodes in adhoc network are mobile, they are free to move in any direction. Therefore any security solution which takes static value would not be applicable in such dynamically changing topology. In MANET, due to absence of central coordinator, most routing algorithms are based on cooperative participation of all nodes. Thus in this situation we cannot apply centralized solution because malicious node could block or modify traffic by denying cooperation to break cooperative algorithms. Because to absence of central coordinator authentication based on certification authority and public key cryptography may be difficult, therefore nodes are easy to hijack, capture and compromise. Due to such flexibility of mobile nodes, developing a secure routing protocol in MANET is hard as compared to a wired network A Lot of research has been done to overcome the vulnerabilities of security in routing protocols like intrusion detection techniques, authentication techniques [2], [3], [4]. Among various issues in MANET, we focused on secure routing in this paper. There is a possibility of several types of attacks in many on demand routing protocols and black hole attack is one of them. During this attack intermediate node sends fake route information in response of route requests to source node and claiming for optimal route to destination. Thus a source node establishes a route through malicious node and sends data packet through this route. A malicious node drops the data packet which reduces the packet delivery ratio. II. RELATED WORK A. Routing in MANETs Routing in MANETs is different from traditional routing on infrastructure network. Main aim behind routing is to provide efficient route between nodes so that message can be delivered. Routing in mobile adhoc networks is a challenging area because regular change in topology and frequent disconnections are common as nodes moves from one place to another. Routing in MANETs depends upon several features like topology, route selection, initiation of request and specific underlying features. Many routing schemes are present in mobile adhoc network to provide optimal routing which is necessary due to low resource availability. On the basis of time of route discovery, these schemes are divided into proactive routing [5] and reactive routing [6]. In proactive routing, nodes maintain a routing table which contains entries for all possible destinations so that it can be forwarded immediately when required. As a result node experiences a minimum delay. However proactive routing continuously uses fraction of network bandwidth to maintain current routing information. Reactive routing uses lazy technique, where node discovers route to destination only on demand or when requires. Node never store route until required and before sending packet node first apply approach for finding route and consumes less bandwidth as compared to proactive routing but 985 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 978-1-4799-4190-2/14/$31.00 ©2014 IEEE