Академический Документы
Профессиональный Документы
Культура Документы
ORG
20
1 INTRODUCTION
mobile ad hoc network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of any centralized administration or network infrastructure. The routing protocols in an ad hoc network should be able to cope well with dynamically changing topology, and nodes should exchange information on the topology of the network in order to establish routes. This brings about the issue of security in an ad hoc network. Using the wireless links in MANETs, any security gained because of the difficulty of tapping into a wired network is lost since the topology of MANETs is highly dynamic and traditional routing protocols can no longer be used. Due to the dynamic network topology, different packets exchanged between the same two nodes may go through different routes, among which there may be attackers waiting. It is also difficult to authenticate each node of a MANET unlike in a wired network, because of the absence of online servers [1]. Common security attacks include replay attack, denial of Service (DoS), modification, masked, routing table overflow, impersonation, energy consumption, and so on [2]. Some secure routing protocols have been proposed to protect routing messages and prevent attackers from either modifying these messages or injecting harmful routing messages into the network [4][5][8][11]. A simulation-based analysis of security exposures in MANETs was carried out by Michiardi and Molva [6] where it was assumed that a node may misbehave under the above security attacks. Three types of
routing misbehaviour have been classified and simulated within the dynamic routing protocol (DSR) [3]. Their simulation results showed that network operation and maintenance can be easily exposed and network performance can be severely affected. In the rest of the paper, Section 2 presents related works on the detection of wormhole attacks. Section 3 briefly describes DSR routing protocols. In section 4, we describe the wormhole attack in routing protocols. Section 5 explains proposed scheme. Simulation & results are presented in section 6 and finally conclusion is given in section 7.
2 RELATED WORK
For detection of wormhole attack various techniques have been suggested. One of the technique is packet leashing [7][16] i.e., in each of the packet ,packet leashing is inserted and on its basis expiration time of packet is determined.Another technique is geographical leash, in which the position of the sender and its sending time is used to determine the distance between them. Directional antennas [10] is another technique for wormhole detection in which nodes use specific sectors to communicate with each other.So a neighbour communicating with the other node has some prior knowledge of its location. For detection of [13] wormhole attack an approach is used in the delay tolerant network for exploiting forbidden topology.At the time of detecting wormhole link in this ap proach,during short period of time the transmission Rajib Das is with the Dept. of Computer Science, Assam University, Silrange of the node is reduced.Exchange of encrypted char, Pin 788011, India. packets is used for [15] wormhole link detection among Bipul Syam Purkayastha is with the Dept. of Computer Science, Assam the neighbours,this technique uses 4-way handshaking University, Silchar, Pin 788011, India. message exchanging among two suspended neighbours 2012 Journal of Computing Press, NY, USA, ISSN 2151-9617 and verifies the neighbours.In wireless sensor nethttp://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
21
works,the anti -jamming techniques have been proposed [18] as an application of wormhole.After analysing all these techniques a novel wormhole detection technique is presented which authenticates the intermediate nodes as well as provides a secure path to destination. A defence mechanism is also provided by Liteworp [19] against wormhole attack; it uses secure two hop neighbor discovery and local monitoring of traffic by using guard node. It has additional features that provide techniques for isolation of malicious node from the network. But in Liteworp, there are some restrictions, it requires extremely accurate clock, without any delay in network apart from propagation delay and also it requires exact measurement of angle of reception. For defending against worm-hole attack containing two phase: One suspicious and the other confirmation, Womeros [20] is the framework. The first phase utilizes the information available during the normal operation of wireless nodes by applying inexpensive techniques. In the second phase advance techniques are adapted only when wormhole attack is suspected. After application of suspicious phase technique if there is no malicious node present in the network then there is no need for wasting consumption and communication resources by applying conformation technique.
edgment. If, after a limited number of local retransmissions of the packet, a node in the route is unable to make this confirmation, it returns a ROUTE ERROR to the original source of the packet, identifying the link from itself to the next node as broken. The sender then removes this broken link from its Route Cache; for subsequent packets to this destination, the sender may use any other route to that destination in its Cache, or it may attempt a new Route Discovery for that target if necessary. In the following figure 1, a source node 1 sends a special route request packet to all neighboring nodes, and it propagates through the network. Upon receiving the RREQ, the destination node 6 sends a special route reply packet to the originating node announcing the newly discovered route.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
22
against an on-demand routing protocol such as DSR or AODV, a powerful application of the wormhole attack can be mounted by tunneling each ROUTE REQUEST packet directly to the destination target node of the REQUEST. When the destination node's neighbors hear this REQUEST packet, they broadcast the copy of that REQUEST following the normal routing protocol and then the ROUTE REQUEST packets that it receives from the same Route Directory; it discards them without even processing. This attack thus prevents discovery of any new routes other than the wormhole and also this attack can even prevent routes more than two hops long from being discovered if the attacker is near the initiator of the Route Discovery. For exploiting the wormhole the attacker can discard the packets rather then forwarding them all or can selectively discard or modify certain data packets, also it can create a permanent Denial-of-Service attack (no other route to the destination can be discovered as long as the attacker maintains the wormhole for ROUTE REQUEST packets).
vertise itself regarding the information that it has shortest route to the destination with the intention of dropping the packets or intercepting packets in the routing protocols like DSR, AODV. Intercepted packets are then consumed by the node: this is the second characteristics. For the simulation of the Wormhole attack, our research works on the misbehaving nodes simulation on the DSR protocol and prevention of it. Next paragraph shows our research model for the same: MANET DSR routing protocol has two main functions such as data forwarding function and routing function. The routing function is regarding the discovery of routes and maintenance of the route while the forwarding function is concerned with the packet transmission from source to destination through the established route. Presence of the misbehaving nodes affects both the data forwarding and routing functions of the MANET routing algorithm. Misbehaving nodes redirect the MANET network into the malfunction, because such node does not allow performing the data forwarding and routing functions properly. There are many kinds of misbehaving nodes present in the MANET networks, in our research we are considering two kinds of misbehaving nodes such as selfish nodes and malicious nodes along with the parameters which may govern the attack severity which we are considering: 1) Time, such as start time and stop time. 2) Degree, misbehaviour probability. 3) Target, victims nodes. A. Algorithm used Here we assume that all the nodes in a network are communicating with one another via encrypted message using secret key. Step 1: Send the Route Request Packet i.e. RRP. Step 2: Add the node information i.e. node id in Route Request table. Step 3: Set hop_count = 1 Step 4: If any malicious node is found in the network, add the information of the malicious node. Step 5: Broadcast the RRP by using modified DSR protocol, here it is WDSR. Step 6: Call WDSR protocol. Step 7: If Route Reply ack is received check the secret key of all nodes which used Route Reply. Step 8: If all the secret keys are valid, establish a path for data transfer. Step 9: If any malicious node is present as intermediate or destination node, then add the information in routing table and again rebroadcast the Route Request. Step 10: If there is any intermediate node present and received the RRP while broadcasting, add node id in routing table and increment the hop count by 1. Step 11: Again verify the secret key of the previous node. If it is valid, then add its secret key to the secret key column. Step 12: If the key of two previous nodes is identical, discard the packet RRP and inform the neighbours about the presence of malicious node.
Fig. 2: 6 nodes with wormhole link In figure 2, the wormhole link exists between the two malicious nodes 3 and 5. When node 1 wants to send data to node 6, it will broadcast a RREQ packet to all its neighbors. The malicious node 3 on receiving this RREQ will immediately forward to the malicious node 5 through the tunnel. The node 5 forwards the RREQ packet to the destination 6 and to node 4, the node 4 will now discard the RREQ packet arriving from the normal multihop route. This prevents nodes from discovering legitimate paths that are more than two hops away. The two colluding malicious nodes thus give a false illusion that the route through them is the shortest, even though they may be many hops away. Thus the route through the malicious nodes is selected and the data packets are forwarded through 3 and 5 as shown in figure 2.
Research methodologies for the work are related to the analysis of the misbehaving nodes which are responsible for the black hole attacks in the MANET. Mainly in the Wormhole attack, traffics for the network are redirected to the mobile node in the network which does not exist in the network. Thus in this case the network traffic is disappeared into one of the special mobile node; such node is called as Wormhole node. The Wormhole attack has misbehaving node adtwo characteristics: first one, the2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
23
Step 13: If received a packet RRP at destination, select a path for RREP. Step 14: If the average hop count is greater than the root which have less hop count, there may be a tunnel between the malicious node, then add its secret key to the secret key coulumn of the routing table and send the RREP message to the source using the same path which was created in step 13 and establish a path for the same. After implementing the above algorithm we maintain the Routing table like Fig 3: Jitter for proposed approach RREQ SQN# Node Id Secret Key Hop Count
Fig 5: Delay for proposed system Following are overall scenario for this proposed approach Average End to end delay: 0.0012 Average Throughput: 375 packets/ TTL Average Jitter: 0.00015 Sec Now in the following section, we are computing the graphs for the existing DSR without having the mechanism of Wormhole detection and prevention.
A. Performance Analysis In this section we will present the three performance metrics for the proposed approach such as throughput, delay, jitter etc. Following are the graphs for the network with the DSR protocol which is having the functionality of detecting and preventing the wormhole attack. of Computing Press, NY, USA, ISSN 2151-9617 for Existing DSR 2012 Journal Fig 6: Jitter
http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
24
No. of nodes 30 30
Table 3: Tables of Reading Thus, on the basis of our conducted results for both existing and proposed DSR algorithm, we claim that our modified DSR provide the security while maintaining the performance level and overall system lifetime. As shown in the above table, throughput, delay and jitter performances for the existing DSR and modified DSR i.e. WDSR are showing slight difference. As the number of nodes and network sizes grows this performance crosses the same equal performance for both existing DSR and modified DSR systems. Thus our approach showing security enhancement while maintaining network performance.
Fig 8: Delay for Existing DSR Following are overall scenario for the this proposed approach Average End to end delay: 0.0011 sec Average Throughput: 380 packets/TTL Average Jitter: 0.00026 Sec Thus finally we are preparing their comparisons in following graph 0.0016
0.0014
Jitter
0.0004 0.0002
0 Existing DSR Wormhole-DSR
REFERENCES
Priyanka Goyal, Sahil Batra and Ajit Singh. A Literature Review of Security Attack in Mobile Ad-hoc Networks, International Journal of Computer Applications (0975 8887), Volume 9 No.12, November 2010 [2] J. Broch, D. A. Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols, In MobiCom 98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pages 8597, New York, NY, USA, 1998. ACM. 2012 Journal of Computing [3] H. Deng, W. 2151-9617 Comparison graphs (throughput)Press, NY, USA, ISSN Li, and D. P. Agrawal. Routing security wireless http://sites.google.com/site/journalofcomputing/ [1]
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
25
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17] [18]
[19]
[20]
Rajib Das received his MCA degree from IGNOU, New Delhi, ad hoc networks, IEEE Communications Magazine, 2(1), 2002. M.Phil. degree from Annamalai University, Chidambaram, T.N. and D. B. Johnson. Routing in ad hoc networks of mobile hosts, In pursuing Ph.D from Assam University, Silchar in the field of Ad Hoc IEEE Workshop on Mobile Computing Systems and Applica- Network. His research interests are Mobile Computing and Image tions, pages 158 163, December 1994. Processing. He is a member of IEEE Computer Society, ACM and H. Li and M. Singhal, A secure routing protocol for wireless IACSIT. ad hoc networks, In HICSS06 Proceedings of the 39th Annual Bipul Syam Purkayastha received his B.Sc. degree from NEHU, Hawaii International Conference on System Sciences, page Shillong, in 1982. He received his M.Sc., M. Phil. and Ph.D. degrees 225.1, Washington, DC, USA, 2006. IEEE Computer Society. from NEHU, Shillong in 1985, 1987 and 1997 respectively. He is P. Michiardi and R. Molva. Simulation-based analysis of secu- currently working as a Professor in the Department of Computer rity exposures in mobile ad hoc networks, In Proceedings of Science, Assam University, Silchar. His research interests include soft computing, combinatorial optimization and Computer Network. European Wireless Conference, 2002. He has published lots of paper in National & International journals. Y.-C. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks In Wireless Networks," IEEE J. Selected Areas In Comm., Vol. 24, No. 2, Feb. 2006, Pp. 370380. C. E. Perkins and E. M. Royer, Ad hoc on-demand distance vector routing, In IEEE WMCSA99, pages 90100, New Orleans, 1999. B.Prasannajit, B.; Venkatesh; S. Anupama, K. Vindhykumari, S. Subhashini, and G. Vinitha, "An Approach Towards Detection of Wormhole Attack in Sensor Networks," Integrated Intelligent Computing (ICIIC), 2010 First International Conference on , vol., no., pp.283-289, 5-7 Aug. 2010. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. M.Alam and K. Chan, "RTT-TC: A topological comparison based method to detect wormhole attacks in MANET," Communication Technology (ICCT), 2010 12th IEEE International Conference on, vol., no., pp.991-994, Nov. 2010. G. Wei, X. Wang, and Y. Mao, "Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission," Multimedia Information Networking and Security (MINES), 2010 International Conference on , pp.496-500, Nov. 2010. Yanzhi Ren; Mooi Choo Chuah; Jie Yang; Yingying Chen. Detecting Wormhole Attacks in Delay-Tolerant Networks [Security and Privacy in Emerging Wireless Networks]. IEEE Journal on Wireless Communications. 2010 , Page(S): 36 42. E. Anita, V.Vasudevan, A. Ashwini, "A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs," Communication Control and Computing Technologies (ICCCCT), 2010 IEEE International Conference on , vol., no., pp.407-412, Oct. 2010. Nait-Abdesselam, F. Detecting and Avoiding Wormhole Attacks In Wireless Ad Hoc Networks. IEEE Communications Magazine, Publication Year: 2008, Page(S): 127 133. Yih-Chun Hu, Adrian Perrig, David B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, September 2002. L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W. Chang, Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach, University of Washington, 2003. Cagalj, M.; Capkun, S.; Hubaux, J.-P. Wormhole-Based Antijamming Techniques in Sensor Networks. IEEE Transactions on Mobile Computing. Publication Year: 2007 , Page(S): 100 114. I. Khalil, S. Bagchi, N.B. shroff, LiteWorp: Detection and isolation of the wormhole in static mulihop wireless network, ACM: The international Journal of Computer and Telecommunications Networking Archive, Vol. 51, Issue 13, September 2007. H. Vu, A. Kulkarni, N. Mittal, WOMEROS: A new framework for defending against wormhole attacks on wireless ad hoc networks, in WASA 2008, LNCS 5258, pp. 491-502, 2008. 2012 Journal of Computing Press, NY, USA, ISSN 2151-9617 http://sites.google.com/site/journalofcomputing/