Keywords

1 Introduction

Mobile ad hoc network (MANET) [1] is constituted of dynamically self-orienting mobile nodes, making it an infrastructure-less model of network design. These nodes may function as servers as well as clients, as required, demolishing the demand of a dedicated server or router in the network [2]. This provides autonomity to the system, boosting its performance. These nodes have the ability to create a suitable path for the communication channel to form and function. However, MANETs are not a good choice if seen from the point of view of security and integrity of data. The absence of a dedicated server or router may also produce serious security breaches as there is nearly no authentication or encryption available.

MANET as a network arrangement is also much cost effective than the conventional ones, although they cannot be scaled up to a large scale, as despite having undeniably excellent features, have never been a preferable choice as the data in the communication channels are left exposed to tons of security threats and other limitations that are associated with MANETs.

Figure 1 presents a pictorial portrayal of the arrangement of the nodes in the network and their configuration to form a bigger communication channel. We have a total of 7 nodes participating in the channel with no dedicated router or a similar central medium to act as a bridge to connect the nodes. The individual nodes have one or more transceivers between them [3]. The application of MANETs is not as popular in small or medium-sized business or personal/home networks, as compared to a conventional router-driven setup.

Fig. 1
figure 1

Overview of MANET

Although MANETs have tons of advantages to count on [4], the flip side of the coin has some serious demerits of MANETs, which are mostly security oriented. These types of networks are mostly prone to Grayhole attack, especially when operating under the AODV protocol.

2 Literature Study

We are presenting an elaborative study on MANET and its characteristics (Sect. 3), its overview (Sect. 3.1) and its working principle and the AODV routing protocol (Sect. 3.2). In Sect. 4, we have presented the problem statement, i.e., about the risks that MANETs are exposed to. Section 5 gives an account on Grayhole attacks and its functional mechanism. For generating a real-like attack on a dummy network arrangement have used NS-2 (network simulation environment), via Linux Fedora. We have discussed the attack environment in Sect. 6, while Sect. 7 contains results and comprehension of our simulation.

We have tried to stress on the risks that MANETs come packaged with, which will facilitate us and also other researchers to come up with better solutions against this kind of attacks and be able to fix those issues, resulting in making MANET a safer communication environment than before.

In this section, we discuss some related and underlying research works by different researchers/authors in the field of wireless networks and Grayhole attacks. Over time, a considerable number of researchers have shared their ideas, findings and conclusions in this subject and also suggested several defense techniques to detect and diffuse Grayhole attacks on ad hoc networks based on intrusion detection systems (IDS) and related mechanisms.

Gupta [5] et al. discuss about sensor networks with regards to load-based routing schemes. Through their work on MANET, Jha et al. [6] shed light on the loss of performance and other security breaches associated with Wormhole attacks. Many authors have worked on Grayhole being launched on ad hoc wireless networks, which itself highlights its severity. Sharma [7] has done a survey on Grayhole attacks on MANETs, which makes it crystal clear that Grayhole attacks can prove deadly in terms of compromising with the network. Dhaka et al. [8] proposed a method to detect Grayhole attacks and Blackhole attacks in MANETs. Later on, Aarti et al. [9] and Mittal [10] have proposed an enhanced multipath approach to deal with the threat of Grayhole attacks on MANETs.

Researchers in this field have made noteworthy breakthrough in this area, but unfortunately, we are yet to have a high-accuracy defense system against Grayhole attack. With regards to the scope for development that we have in this area, we are properly visualizing the attack scenario in a detailed fashion through this paper for (we researchers) being able to develop an enhanced fighting mechanism against Grayhole attacks.

3 Brief Study of Mobile Ad hoc Networks:

  1. i.

    Dynamic topology: MANET’s multi-hop network topology is capable of sudden and spontaneous reorganization in both unidirectional and bi-directional routing architecture.

  2. ii.

    Cost effective: Being hardware-less and peer-to-peer in nature, MANETs are considerably cheaper for small to medium level business as well as residential networks.

  3. iii.

    Power supply constraint: Battery led (or similar energy source) power supply being incorporated here is not a reliable or promising source of power per se, and it is the reason why the mobile nodes in the network have light weighted features, low power and storage capacity.

  4. iv.

    Autonomous/self-configuring: The prime feature of MANETs is the ability of its components (participating nodes) to re-role themselves into routers and hosts themselves.

  5. v.

    Mediocre throughout: As MANET is a wireless form network arrangement, it struggles against factors like noise, multi-access, interference condition, etc., which dramatically reduces its productivity based on efficiency, throughput and reliability.

  6. vi.

    Lack of data security: Being infrastructure-less by design, MANETs have no dedicated routers, because of which a standard host configuration or firewall rule-set cannot be enforced. This gives rise to potential threat to the data present in the channel [11] as well as the quality of service (QoS) [12] of the network.

3.1 MANET—Highlights

Wireless ad hoc networks are fairly popular with its users at a mass level. Being a ‘plug and play’ kind of network setup, MANETs do not require a dedicated router. Although MANET is an awesome mode of network, but it also has some flaws attached with it when implemented at a large scale. Below are some of the forward most ins and outs of MANETs:

  1. i.

    Infrastructure-less mode of design.

  2. ii.

    No central administration.

  3. iii.

    Human intervention independent, as each node can re-purpose themselves as a router or host as needed.

  4. iv.

    Vulnerable to security threats.

  5. v.

    Intercommunication interferences causes poor throughput.

  6. vi.

    Cost effective.

3.2 MANET—Working Principle

MANETs are mostly developed using a table-driven network protocol. AODV protocol [13] is one of the foremost protocols in this matter which enables its nodes to be follow a dynamic, self-configuring and multi-hop routing method. This proves to be a key element in route maintenance. Maintaining routes with inactive nodes are not required because of the dynamic re-routing in AODV.

If there are 5 nodes in a channel and only three of them are participating in an active communication and the remaining two are merely present in the network, then the working nodes need not preserve a route with them. To promote optimal load balancing, AODV supports real-time re-routing and re-orientation of the nodes and avoid any disruption in the channel.

Each node has a specific range till which it can establish communication. This is much similar to a scenario of a classroom where a student from the first bench wants to pass a notebook to their friend at the last bench. Here, the notebook will be passed to the recipient student via many students acting as intermediate sender. If the destination node in MANET is unreachable from the sender, then the nodes use a similar strategy of sending it via multiple intermediate senders. This process is known as multi-hopping in AODV routing premises.

These nodes are designed to be able to re-design the network topology as a response to a security breach, when detected. Once a malicious activity is reported in any node, it is denied permission to perform any action in the communication channel. Again, since this whole process may require some time and until then some sensitive data might already have been compromised; hence, it cannot be accepted as a fail-safe mechanism.

AODV strictly follows a request-reply technique to verify the authenticity of the participants in the network. It contains a few message type definitions such as route requests (RREQs), route replies (RREPs), route errors (RERRs) and acknowledgment (ACK). For every transfer of a data packet, the source generates a route request (RREQs) toward the recipient node and the receiving node replies with an acknowledgment (ACK) of receiving the data in order to prove its authenticity. In case if this process fails, a breach is assumed to have taken place and it leads to broadcasting an error message (RERRs), which immediately suspends all transactions until the node is verified.

AODV routing involves of a couple of episodes:

  1. i.

    Discovery: Discover new paths using RREQ and RREP.

  2. ii.

    Maintenance: Report an error when found, using RERR.

AODV protocol maintains a separate routing table per node. Each node’s route table contains information about the distance to other nodes in the channel, which is measured in terms of hop-counts. The route table contains the following details gathered while the route discovery phase:

  1. i.

    Source/previous node

  2. ii.

    Next node/hop

  3. iii.

    Time to leave (TTL)

  4. iv.

    Hop-count to reach destination

  5. vii.

    Destination IP address.

4 Problem Statement

MANET has many challenges when scaling out on large scale, but it becomes worth a little more concern from the security hotspot as it is vulnerable a plethora of attacks [14, 15]:

  1. i.

    Session hijacking [16]

  2. ii.

    Wormhole attack [17]

  3. iii.

    Blackhole attack [18]

  4. iv.

    Jamming [19]

  5. v.

    Eavesdropping [20]

  6. vi.

    Denial of service [21]

  7. vii.

    Grayhole attack [22].

Grayhole attack is one of the deadliest attacks against MANETs with regards to:

  1. i.

    Throughput: The ability of the network to transfer a particular quantity of information per unit time is known as throughput. In other terms, it is the measure of a network’s efficiency.

  2. ii.

    Quality of service (QoS): It is the maximum bandwidth attaining capacity of a network, which affects other parameters such as latency, error rate and uptime [23]. Thus, higher QoS translates to a healthier performance.

  3. iii.

    Data rate: Also knows as data transfer rate, it is the measure of the number of bits of data transmitted per second over a network. In simpler terms, it is the speed of data transfer over the network, conveyed as bytes per second (Bps or B/s)

  4. iv.

    Integrity: It enforces that a dataset MUST only be accessed by an authorized and intended user, i.e., if a data is not meant for a particular entity, it must be forbidden for them and it should be private to the legitimate user only [24].

For the sake of analyzing the effects of Grayhole attack on the performance of MANET, we are simulating a dummy network with a number of nodes against a Grayhole attack scenario using AODV routing protocol.

5 Grayhole Attack

Grayhole attack [25, 26] is basically a packet drop attack, which is an extension of Blackhole attack. Here, the routing packets and control are forwarded by the malicious or Grayhole node, but the data packets are completely dropped. This attack uses the method of selective data packet dropping to disguise the compromised node as a legitimate one. This node tries to take part in the data transfer window, and then by advertising a false route, it lures the legitimate nodes to establish the active route through itself. The Grayhole node responds with a route reply after receiving a route request packet and thereby passes a false information that of having the shortest path, which creates an illusion for the source node that the optimum route is through the malicious node and the data packets are redirected toward the malicious node. This series of incidents gives rise to a confusion in the detection and prevention mechanism as packets may as well sometimes drop due to genuine reasons like: congestion, overload, etc. The following are the two ways how Grayhole attacks work:

  1. i.

    Strictly dropping all the incoming UDP packets.

  2. ii.

    Randomly/selectively dropping some UDP packets.

Due to its ability to act both as a normal node and switch over to malicious node as needed, a Grayhole node changes its behavior from a legitimate node to a sinkhole, which fools the system to identify whether it is indeed a genuine node or a compromised one. The Grayhole attack takes place in two phases, as below:

  1. i.

    In this stage, the malicious node exploits the AODV routing protocol table by diverting all the data packets to itself rather than genuine route; thus claiming itself as the shortest route in next hop column.

  2. ii.

    The attack is launched in this phase where malicious node starts dropping the data packets using a probabilistic method for packet selection. The attacker node changes its behavior rapidly and the malicious node also forward some packets to create an illusion of legitimacy. Hence, this type of attack is pretty difficult to detect.

6 Simulation Environment

For the purpose of simulation, we are using Network Simulator 2 (NS-2) on a Linux Fedora distribution, which is quite a familiar and popular simulator in MANET research community due to its ease of access and because it supports a variety of network routing protocols. NS-2 is an object-oriented network simulator written using C++ as its backend and object Tcl (OTcl) as its front-end and runs on top of UNIX environment. Below are the details of our attack environment and the parameters at which the system was tuned in to (see Table 1).

Table 1 Configuration details of the simulation environment

Initially, the network is simulated under normal and stable conditions, i.e., without any attack and its throughput is recorded. Later on, we generated an attack of Grayhole nature on the same setup to record and analyze its throughput in order to be able to comprehend the aftermaths of the attack on the network. Here, we noticed that the network throughput drops to zero immediately as soon as the channel in under the attack (Fig. 2).

Fig. 2
figure 2

Simulation information of our dummy network

Throughput: The average amount of data transferred between the sender and receiver nodes per unit time within a network is called throughput. It is expressed in terms of kilobytes per second (kbps) and calculated using the following equation (see Eq. 1).

$${\text{Throughput}} = \frac{{{\text{Data~transferred~}}\left( {{\text{in~bytes}}} \right){\text{*~}}8}}{{{\text{Time~taken~}}\left( {{\text{in~seconds}}} \right)}}$$
(1)

7 Attack Simulation and Results

Scenario 1: Without Attack

  1. I.

    Deploying the mobile of nodes

As shown in Fig. 1, we started deploying nodes to participate in the network. There are no dedicated routers or a similar central administration device present in the network (Fig. 3).

Fig. 3
figure 3

Deploying the nodes

  1. II.

    A self-arranged ad hoc networks by the deployed nodes

Now as we have deployed a total of 10 nodes in the network (Fig. 4), namely 0 till 9, we observe the nodes interacting with each other as per the AODV protocol.

Fig. 4
figure 4

Individual nodes forming an ad hoc network

  1. III.

    Identifying the source, destination and forwarder nodes

MANETs are dynamic and self-organizing in nature, i.e., it decides the communication path, thus as seen in Fig. 5, we have a source, a destination and an intermediate node to facilitate the communication as the source and destination are not reachable to each other directly. Whenever there is a scenario like this where the source and destination nodes are unreachable (as their reachable zone is limited), MANETs adapt a multi-hop mechanism to transfer data.

Fig. 5
figure 5

Identifying sender, receiver and intermediate nodes

  1. IV.

    Communication via the established path

In the previous step, we already had our source, node and intermediate nodes identified. In this step, we can actually see the data transfer in action (Fig. 6). There is no loss of data and the communication is happening smoothly. This is an ideal case, without any attack, characterized by a stable throughput and QoS.

Fig. 6
figure 6

Data transfer under normal circumstances

Scenario 2: Network under attack

  1. V.

    Malicious node starts dropping packets

Until now, we were simulating the best case for data transfer with optimum throughput. At this point of time, we launched a Grayhole attack on the network with node ‘2’ dropping the data packets. It is pretty obvious from Fig. 7 that the communication is still happening but the data rate is considerably lower than before, as a lot of data is being drained by the malicious node.

Fig. 7
figure 7

Malicious node starts dropping data

  1. VI.

    Loss in throughput

Evident from Fig. 8, we can confirm what we saw in the previous step. The channel’s throughput spikes fall miserably, and at the same moment, we launched attack and that continued until the attack persisted.

Fig. 8
figure 8

Network throughput during attack

  1. VII.

    Trace file of the network scenario at the moment

Figure 9 shows the network trace of the above attack simulation of MANET. From the simulation presented above, it is clear as a mirror that Grayhole attack is indeed a prominent vulnerability to MANETs. These kinds of attacks not only put the data integrity at stake because of the possible leakage in the communication channel, but also pose great threat to the network as a whole, in terms of overall productivity.

Fig. 9
figure 9

Network trace while the attack

8 Conclusion

After a detailed analysis of the performance of MANETs under the effects of a Grayhole attack using AODV protocol via NS-2 simulator, our final inference is that these kinds of ad hoc networks have a strictly linear throughput trend which starts deteriorating dramatically under an attack. Along with throughput, other factors like data rate, QoS, etc., parameters of the network were also affected at an alarming level to be considered as abnormal and concerning. The data transfer within the network kept on falling as long as the attack was kept alive on the network.

From the above analysis, it is clearly understandable how a Grayhole attack cannot only hamper the network QoS and throughput, but bully privacy as well. Grayhole attacks are difficult to detect also because the data rate does not drop to zero at once, i.e., the communication keeps on taking place, but it degrades slowly and steadily which also might be misunderstood as a usual network glitch such as channel noise or interference. Until one smells anything fishy, a lot of data might already have been leaked. However, with further advancements in the MANET’s immune system and an improved intrusion detection system, it can be guarded against Grayhole attacks.