+ All Categories
Home > Documents > A New Approach to Enhance Security against Mischievous Nodes ...

A New Approach to Enhance Security against Mischievous Nodes ...

Date post: 03-Feb-2017
Category:
Upload: duongdien
View: 215 times
Download: 0 times
Share this document with a friend
9
INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015. 1 A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme MANJEET SINGH, MTech Student 1 GGSCMT, Kharar Mr. Rajan Sachdeva, Assistant Professor 2 GGSCMT, Kharar ABSTRACT In our approach, with the help of AODV protocol, we intend an attack detection method called the CBDS (Cooperative Bait Detection Scheme), which help in detecting and averting malicious nodes which are produced in different attack in MANET(Gray hole, collaborative, black hole attack). In this paper, it uses the concept of threshold time and hope limit which randomly cooperates with an adjacent node. Here we send a false request to neighboring nodes as bait Request for revert tracking, where malicious nodes reply as acknowledgement (RREP) to acknowledge the route with the node and it is detected. So in CBDS the reverse tracing technique ensures security. Keywords: MANET, AODV, RREQ, RREP, CBDS, security. I. INTRODUCTION An ad-hoc network is a local area network that is formed spontaneously to connect different devices as a one network, connected to each other in place of relying on a base station to flow messages in the network. Ad hoc networks have no infrastructure i.e. Nodes are free to join and left the network at any moment. Nodes in network are connected with each other through the wireless link shared by all devices formed as single network. A node or any node can serve itself as router to forward data to the neighbors, so we can call this kind of network as infrastructure less networks. These networks have no centre administration, means there is no base station between nodes which manage them so they can communicate directly with each other. Ad hoc networks have the ability to handle any error in the nodes or network that it experiences due to topology changes. Whenever a node in the network cause error which causes the connection between other nodes broken then affected nodes will requests new route and new links are established. It is a network without the aid of any established infrastructure or centralized admin so in such an environment it is necessary for one mobile host to join the aid of other hosts in forwarding a packet to its destination due to the narrow range of each mobile node’s wireless transmissions and security and privacy becomes big concern for such networks. IJTC.ORG
Transcript
Page 1: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

1

A New Approach to Enhance Security against Mischievous

Nodes Using Cooperative Bait Detection Scheme

MANJEET SINGH, MTech Student1

GGSCMT, Kharar

Mr. Rajan Sachdeva, Assistant Professor2

GGSCMT, Kharar

ABSTRACT

In our approach, with the help of AODV protocol, we intend an attack detection method called the

CBDS (Cooperative Bait Detection Scheme), which help in detecting and averting malicious nodes

which are produced in different attack in MANET(Gray hole, collaborative, black hole attack). In this

paper, it uses the concept of threshold time and hope limit which randomly cooperates with an

adjacent node. Here we send a false request to neighboring nodes as bait Request for revert tracking,

where malicious nodes reply as acknowledgement (RREP) to acknowledge the route with the node

and it is detected. So in CBDS the reverse tracing technique ensures security.

Keywords: MANET, AODV, RREQ, RREP, CBDS, security.

I. INTRODUCTION

An ad-hoc network is a local area network that is formed spontaneously to connect different

devices as a one network, connected to each other in place of relying on a base station to flow

messages in the network. Ad hoc networks have no infrastructure i.e. Nodes are free to join

and left the network at any moment. Nodes in network are connected with each other through

the wireless link shared by all devices formed as single network. A node or any node can

serve itself as router to forward data to the neighbors, so we can call this kind of network as

infrastructure less networks. These networks have no centre administration, means there is no

base station between nodes which manage them so they can communicate directly with each

other. Ad hoc networks have the ability to handle any error in the nodes or network that it

experiences due to topology changes. Whenever a node in the network cause error which

causes the connection between other nodes broken then affected nodes will requests new

route and new links are established. It is a network without the aid of any established

infrastructure or centralized admin so in such an environment it is necessary for one mobile

host to join the aid of other hosts in forwarding a packet to its destination due to the narrow

range of each mobile node’s wireless transmissions and security and privacy becomes big

concern for such networks.

IJTC.O

RG

Page 2: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

2

Fig. 1: Attacks in MANET

CBDS - In mobile ad hoc networks, the most important is to establish the connection between

the nodes and those nodes should cooperate with each other. In the vicinity of noxious nodes,

this necessity may prompt genuine security concerns; for occasion, such nodes may disrupt

the routing procedure. In this connection, anticipating or recognizing malevolent nodes

dispatching gray hole or collective black hole assaults is a test. This paper include to

determine this issue by planning a dynamic source directing (DSR)-based steering

instrument, which is alluded to as the agreeable goad identification plan that coordinates the

benefits of both proactive and responsive protection architectures. Our CBDS technique

executes a converse following system to help in accomplishing the expressed objective. Thus

results are given, demonstrating that in the vicinity of pernicious hub assaults, the CBDS

outflanks the DSR, 2ACK, and best-exertion issue tolerant steering (BFTR) conventions

(picked as benchmarks) as far as parcel conveyance proportion and directing overhead

(picked as execution measurements).

Fig. 2: CBDS Process

Cooperative Bait Detection Scheme diminishes the questionable way information of

malicious nodes and the trusted nodes in that malicious nodes answer to each RREP, as

opposed to watching whether malicious nodes would drop packets. Presently, the extent of

IJTC.O

RG

Page 3: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

3

packets dropping was dismissed, and with the help of CBDS Techniques the malicious nodes

of gray hole attack and black hole attack would be detected.

II. Proposed System Architecture Overview

This paper endeavors to determine collaborative attacks issue by planning an AODV routing

presently DS Routing, known as CBDS (Cooperative Bait Detection Scheme). The CBDS

coordinates the upsides of both proactive and receptive barrier architectures. In my

methodology, the source hub automatically chooses a contiguous/ neighbor node with which

to build up collaboration, the location of this node is utilized as bait destination address to

cheat malicious node to send a RREP answer message. Malicious nodes are in this manner

identified and forestalled against routing operation, utilizing a converse following strategy i.e.

reverse tracing technique.

Fig. 3: Proposed System Architecture

Existing System - DSR includes two primary procedures: route discovery and route

maintenance. To accomplish the route discovery stage, the source node shows a Route

Request (RREQ) parcel through the system. In the event that a halfway node has directing

data to the destination in its route cache, it will answer with a RREP to the source node. At

the point when the RREQ is sent to a node, the node includes its address data into the course

record in the RREQ bundle. When destination receives the RREQ, it can know each

intermediary node’s address among the route. The destination node relies on the collected

routing information among the packets in order to send a reply RREP message to the source

node along with the whole routing information of the established route.

III. Problem Formulation

Mobile Ad Hoc Networks can be established in a brutal situation where it may impractical to convey a

conventional network infrastructure. On the second hand ad hoc networks have vast potential; still

there are many challenges left to overcome. Security is such a critical element, to the point that it

could focus the achievement and wide sending of data. The wormhole attack is a sort of attack that

performs the malicious action by making own connection and dodges genuine connection i.e. the

actual path for data delivery. The general thought of this calculation is to distinguish malicious nodes

propelling attacks and making trouble connections to keep them from correspondence system. This

security plan gives the assurance against wormhole assault and hinders the exercises of aggressor hub.

IJTC.O

RG

Page 4: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

4

In the event of assault just about the system execution is totally down however proposed IPS plan

enhances execution almost equivalent to ordinary directing. This work investigates an enthusiastic and

an extremely straightforward thought, which can be actualized and tried in future for more number of

assaults, by expanding the quantity of hubs in the system.

IV. Proposed Approach

Objectives:

▪ Connection between the nodes.

▪ Find out the delivery hop limit with threshold

▪ Establishing connection with bait scheme.

▪ Broadcasting the malicious node matrix on the network

There are lots of attacks in wireless network system. In which malicious node erroneously

guaranteeing it as having the crisp and shortest way to the destination pull in traffic towards

itself and after that drops it. The proposed methodology endeavors to determine this issue by

planning a dynamic source routing (DSR) based directing instrument, which is alluded to

right now draw recognition plan to CBDS that coordinates the benefits of both proactive and

responsive resistance architectures. Our CBDS technique actualizes an opposite following

strategy to help in accomplishing the expressed objective.

i) Initial Bait Step - The objective of the bait stage is to tempt a malicious node to send an

answer RREP by sending the bait RREQ that it has used to promote itself. At this very

moment shortest way to the node that confines the packets that were changed over. To

accomplish this objective, the accompanying system is intended to create the destination

location of the bait RREQ. The source node automatically chooses a nearby node.

Fig. 4: Random Selection of cooperative bait

On the off chance that REP intentionally gave no answer RREP, it would be

straightforwardly recorded on the black hole list by the source hub. If the REP node had sent

an answer RREP, it would imply that there was no different malicious node in the system,

aside from the course that is had gave; for this situation, the course revelation period of DSR

will be begun. The course that REP gives won't be recorded in the decisions gave to the route

discovery phase.

IJTC.O

RG

Page 5: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

5

ii) Reverse Tracing Step - The converse following step is utilized to identify the behaviors of

malicious nodes through the route answer to the RREQ' message. On the off chance that a

noxious node has gotten the RREQ, it will answer with a false RREP. Likewise, the reverse

tracing operation will be directed for node accepting the RREP, with the objective to deduce

the dubious information and the incidentally trusted zone in the route.

Fig. 5: Reverse Tracking

iii) Pseudo Code

Send RREQ1

if ( RREP1 == D true) \\ Here confirmation of the destination

system=1; \\ If found node then establishing the link.

else

if (Time > T1) \\ search till threshold time

end process;

else

send RREQ1 again;

end if

end if

if (W < T1) \\ w = packet delivery ratio drops

Send Bait RREQ2

else

end process

end if

if (RREP1 == true)

race Mech =1 ; \\ Starting the mechanism

IJTC.O

RG

Page 6: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

6

else

end process;

end if ;

Initiate System;

DN detected;

DN = black listed; \\ malicious is black listed

iv) Description of Proposed Algorithm - Each node sends a route request signal (RREQ). The

neighbour nodes receive the RREQ signal and reply with a RREP signal. If the RREP signal

is received back by the transmitting node, the system is judged as normal and data

transmission can begin. Once the system starts transmitting data signal normally, packet

delivery ratio is scanned. If the packet delivery ratio is above threshold limit, then no

malicious nodes are present and the process terminates However if the transmitting node does

not receive back RREP signal delivery hop limit is checked. If the delivery hop limit has not

exceeded the threshold, RREQ is resend. Otherwise, the RREQ sending is terminated.

Fig. 6: CBDS Flow

Once the system begins transmitting information flag (signal) typically, the delivery status of

the packet proportion is also checked. If the delivery status ratio is above the limit (threshold

value) then no malicious nodes are available and the procedure ends. However in the event

that bundle conveyance proportion drop is identified, a bait RREQ is sent and reaction is

anticipated.. If there is no response then the packet delivery ratio drop may be due to

inefficient routing and so CBDS is terminated. But if the transmitting node receives a RREP

response to the bait RREQ, reverse tracing program is triggered and test packets and recheck

messages are sent to confirm malicious node detection. On confirmation of malicious node,

source node updates its list of malicious node with this new entry and broadcasts an alarm

signal inside the network for all the nodes to follow suit. When all the nodes have updated

their list of malicious nodes, the detected node is blacklisted and further communication to

IJTC.O

RG

Page 7: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

7

the node is stopped. In a randomly deployed node topology source node chooses the

cooperative bait address randomly from its one hop neighbor nodes and sends the bait RREQ

v) Processed Results:

Fig. 7: Calculating Shortest Path

Fig. 8: Result Graph

V. Conclusion

In this paper, we have dissected the security dangers a specially appointed system confronts

and displayed the security target that should be accomplished. On one hand, the security-

sensitive application used in Ad Hoc Network is needs rich quality of protection. Or secure

connection, specially appointed system is intrinsically powerless against security attacks.

Consequently, there is a need to make them more secure and powerful to adjust to the

requesting necessities of these systems. The adaptability, straight forwardness and velocity

with which these systems can be set up suggest they will increase more extensive application.

This leaves Ad-hoc networks wide open for research to meet these demanding application.

The research on MANET security is still in its early stage. The existing proposals are

typically attack-oriented in that they first identify several security threats and then enhance

the existing protocol or propose a new protocol to thwart such threats. Because the solutions

are designed explicitly with the CBDS technique combines both proactive and reactive

detection schemes which enhance its efficiency of detection. It can be deployed for both self

IJTC.O

RG

Page 8: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

8

deployed node topologies as well as randomly deployed node topologies. It is a network wide

detection scheme wherein on detection of malicious node the entire network is informed

about the detection by Alarm signal. CBDS has been successfully implemented on black hole

and grey hole attacks before and has proved to be equally efficient in case of DoS attacks and

Sleep deprivation attacks in our experiment too. Simulation result have shown an enhanced

response and increased detection for CBDS. In future we would also like to examine the

behavior of other attacks like Gray hole attack and Black hole attack and try to make the

protection schemes on it and also try to enhance the performance of routing protocol that has

consider in this dissertation to improves their routing capability.

REFERENCES

[1] A.Agalya, C.Nandini, S.Sridevi, “DETECTING AND PREVENTING BLACK HOLE ATTACKS

IN MANETS USING CBDS (Cooperative Bait Detection Scheme)” , International Journal of Modern

Trends in Engineering and Research (IJMTER), Volume 02, Issue 04, 2015.

[2] Akshita Rana,Deepak shrivastava, “A defending of wormhole attack in wireless mesh network

based on epigraph relay method and cooperative threading technique”, International Journal of

Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 9,

November 2012.

[3] Manjeet Singh, Apurva Sharma, Security in MANET Using ECBDS on Resource Consumption

Attack and Byzantine Attack, IJITKM Volume 8 • 2015 pp. 4-7.

[4] C.Krishna Priya1, Prof.B.Satyanarayana, A REVIEW ON EFFICIENT KEY MANAGEMENT

SCHEMES FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS, International Journal of

Computer Engineering and Applications, Volume V, Issue I, Jan 14.

[5] Anshika Garg, Shweta Sharma , “A Study on Wormhole Attack in MANET”, International Journal

of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 3 Issue 2,

May 2014.

[6] Muskan Sharma, Chander Prabha,” Combating Resource Consumption and Byzantine Attacks in

MANET through Enhanced CBDS Technique”, American International Journal of Research in

Science, Technology, Engineering & Mathematics AIJRSTEM 14-543; © 2014.

[7] C. Deepika Shiny *, I. Muthumani, “Detection and Recovery of Packet Drop under Network Layer

Attack in MANET”, International Conference on Electrical, Information and Communication

Technology, 28 February 2015.

[8] Aditya Bakshi, A.K.Sharma, Atul Mishra, “Significance of Mobile AD-HOC Networks

(MANETS)”, International Journal of Innovative Technology and Exploring Engineering (IJITEE)

ISSN: 2278-3075, Volume-2, Issue-4, March 2013.

[9] Dr.V.Egaiarasu, D.Kailashchandra, “Detection of Black Hole and Worm Whole Attacks in

MANETS”, SSRG International Journal of Mobile Computing & Application (SSRG-IJMCA) –

volume 2 Issue 3 May to June 2015.

[10] Akinlemi Olushola O., K. Suresh Babu , “ Cooperative Bait Detection Scheme (CBDS) To Avoid

the Collaborative Attacks of Nodes in MANET”, Volume 3 Issue 4, April 2014.

[11] M. Ahmed Usmani1, Manjusha Deshmukh , “Defending Against Attacks in MANETs using

Cooperative Bait Detection Approach”, Cooperative Bait Detection Scheme (CBDS) To Avoid the

Collaborative Attacks of Nodes in MANET” , International Journal of Advanced Research in

Computer and Communication EngineeringVol. 4, Issue 4, April 2014.

[12] Navdeep Kaur and Mouli Joshi, “Implementing MANET Security using CBDS for Combating

Sleep Deprivation & DOS Attack”, International Journal for Science and Emerging, 2014.

[13]Ramandeep Kaur, Jaswinder Singh, “Towards Security against Malicious Node Attack in Mobile

Ad Hoc Network”, International Journal of Advanced Research in Computer Science and Software

Engineering, Volume 3, Issue 7, July 2013.

[14] Rishikesh Teke, Prof. Manohar Chaudhari ,” A Survey on Security Vulnerabilities And Its

Countermeasures At Network Layer In MANET”, Rishikesh Teke et al, / (IJCSIT) International

Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014,

IJTC.O

RG

Page 9: A New Approach to Enhance Security against Mischievous Nodes ...

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC) ISSN-2455-099X, Volume 1, Issue 1, OCTOBER 2015.

9

[15] R. Mehala, S.Sathya, M.Sc., M.Phil. ,” DETECTING MALICIOUS ATTACKS USING

DYNAMIC THRESHOLD OPTIMIZATION ALGORITHM”, IJCSMC, Vol. 3, Issue. 11, November

2014, pg.212 – 222.

[16] H. B. Chauhan, Prof. B. A. Tanawala,” Comparative Study of MFCC And LPC Algorithms for

Gujrati Isolated Word Recognition” IJCSMC, Vol. 3, Issue 2, February 2014.

[17] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai “

Defending Against Collaborative Attacks byMalicious Nodes in MANETs: A Cooperative Bait

Detection Approach” in Natural Sciences and Engineering Research Council of Canada (NSERC),

Taiwan, Dec 2013–Mar 2015, pp. 65–75.

[18] S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol

Performance Issues and Evaluation Considerations,Jan. 1999. (Last retrieved March 18, 2013).

[19] C. Chang, Y.Wang, and H. Chao, “An efficientMesh-based core multicast routing protocol on

MANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229–239, Apr. 2007.

[20] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile

Comput., pp. 153–181, 1996.

[21] I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone protocol

for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727–2740.

[22] A. Baadache and A. Belmehdi, “Avoiding blackhole and cooperative blackhole attacks in

wireless ad hoc networks,” Intl. J. Comput. Sci. Inf Security, vol. 7, no. 1, 2010.

[23] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc”.

Volume 3, 2014.

IJTC.O

RG


Recommended