Detection of Sybil Attack in Mobile Ad-hoc Network

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
Detection of Sybil Attack in Mobile Ad-hoc Network
(MANET) Using Routing Protocols: A Survey
Ruchika Sharma#1 and Satbir Singh*2
M-tech scholar , Department of Electronics and Communication, Guru Nanak Dev university, RC - Gurdaspur,
Punjab, India
ABSTRACT-Mobile ad-hoc system (MANET) is one of the broad
specially appointed system (MANETs). When contrasted with wired
and productive fields which have licensed exceptional criticalness.
systems, MANETs are more at danger to security assaults because
All Wireless portable ad-hoc systems are described as systems with
of the absence of a trusted unified power and constrained assets.
no physical associations. A Mobile ad-hoc system (MANET) is a
This paper will study the most well-known Sybil assault with its
makeshift remote system made out of remote versatile hubs, with no
past connected work and condition of workmanship.
altered framework. There are no devoted switches, servers, access
KEYWORDS: Mobile ad-hoc network (MANET), Sybil Attack and
focuses, and so forth. Security is a crucial prerequisite in versatile
Security.
I.
INTRODUCTION
Remote sensor system is an exceptionally appropriated
gathering of spatially circulated independent hubs that
utilize a large number of little, cheap sensors for checking
our physical surroundings [1]. They are termed as specially
appointed systems as they oblige no foundation and can
suit themselves to any current base. Versatile Ad hoc
Network (MANET) has been the point of enthusiasm
among specialists for most recent two decades [2]. A
MANET is an accumulation of portable hubs that are
joined together by means of remote connections without
any kind pre-requisite of any framework or incorporated
organization. The topology of the MANET is dynamic in
nature because of the consistent development of hubs. A
Sybil assault [1] is one in which a malevolent hub on a
system illegitimately claims to be a few separate hubs all
the while. On the off chance that a substance on a system
does not have physical learning of alternate substances, it
will see them absolutely as educational deliberations called
personalities. Sybil assaults happen when the balanced
correspondence between a substance and its personality is
damaged. They influence various situations and application
areas in a mixture of ways. Case in point, the notoriety
arrangement of a P2P system may be bargained as the
aggressor has the capacity positively modify notoriety
scores by the utilization of the recently made rebel
characters. In the direst outcome imaginable, an assailant
can make a vast number of manufactured personalities with
only one physical gadget. In a Mobile Ad hoc Network, the
main path for an element to recognize the vicinity of
different substances is by sending and getting the messages
over an imparted show correspondence channel [3]. By
exploiting this highlight, a malevolent hub can send
ISSN: 2231-5381
messages with different fake characters. The hub satirizing
the personalities of the hubs is called noxious hub/Sybil
assailant, and the hubs whose characters are caricature are
called Sybil hubs. Figure 1 speaks to a noxious hub S
alongside its four Sybil hubs (S1, S2, S3 and S4). In the
event this noxious hub corresponds with any real hub by
exhibiting every one of its characters, the true blue hub will
have deception that it has corresponded with four separate
hubs. Anyhow in genuine, there exists stand out physical
hub with various distinctive IDs [4].The red hubs are the
replica’s of the noxious blue hub that forms to be carry the
same identity of that of blue hub.
Figure 1.A Sybil attack with multiple identities
The Sybil assault scientific categorizations are created in
its diverse structures to better comprehend the suggestion.
http://www.ijettjournal.org
Page 358
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
A few orthogonal characteristics, for example, direct versus
circuitous correspondence and created versus stolen
characters are considered.
A. Direct versus Backhanded Communication
Direct Communication: One route by which the Sybil
assault can be done is for the Sybil hubs to correspond
straightforwardly with the authentic hubs of system. At the
point when a legitimate hub sends a radio message to a
Sybil hub, one of the malignant gadgets listens to the
message. Thus, messages sent from Sybil hubs are actually
sent from one of the malevolent gadgets.
Indirect Communication: In this kind of the assault, true
blue hubs are not ready to correspond straightforwardly
with the Sybil hubs as opposed to one or a greater amount
of the malignant gadgets may claim to have the capacity to
achieve the Sybil hubs. Messages sent to a Sybil hub are
directed through one of these vindictive hubs, which
constitute to go on the message to a Sybil hub.
B. Fabricated versus Stolen Identities
A Sybil hub can take a personality in one of two ways. It
can create another character, or it can take a personality
from a true blue hub.
Fabricated Identities: Sometimes, the aggressor can just
produce arbitrary new Sybil characters. Assume, if every
hub is distinguished by a 32-bit whole number, the
aggressor can just dispense every Sybil hub an irregular 32bit esteem.
Stolen Identities: Given a strategy to build the character of
authentic hub personalities, an assailant can't manufacture
new characters. Assume the name space is deliberately
restricted to keep assailants from embeddings new
characters. For this situation, the assailant obliges allotting
other true blue characters to Sybil hubs. This taking of
character may go undetected if the aggressor pulverizes or
incidentally impairs the imitated hubs.
Figure2. Dimensions for launching Sybil attack
ISSN: 2231-5381
II.
LITERATURE SURVEY
Prameet Kaur[7],2013- In the paper, they propose a
security based on LEACH routing protocol against Sybil
attack. LEACH routing protocol is the conservative
clustering communication protocol which is usually used in
Wireless Sensor Networks. A main issue with LEACH
routing protocol is energy consumption. In order to poise
the energy expenditure of each node, the nodes are selected
as cluster head randomly and circularly. The apparatus is
set up to detect Sybil attack based on the distance and hop
count between the nodes and the anticipation is done using
encryption technique which is based on unique identities of
the nodes. Three presentation parameter: Throughputs,
energy consumption, packet overhead are calculated. Their
values show the competence of the proposed protocol.
Yih-Chun Hu[8],2003- In the paper, they plan and assess
the Secure Efficient Ad hoc Distance vector routing
protocol , a secure ad hoc network routing protocol based
on the design of the Destination-Sequenced Distance
Vector routing protocol. In order to hold up use with nodes
of limited CPU dispensation ability, and to guard against
Denial of Service attacks in which an attacker attempt to
cause other nodes to drink excess network bandwidth or
dispensation time, we use efficient one way hash function
and do not use asymmetric cryptographic operations in the
protocol. SEAD performs well over the range of scenario
we tested, and is robust against multiple ungainly attackers
creating mistaken routing state in any other node, even in
spite of any active attackers or compromise nodes in the
network.
Haas, Zygmunt J., Pearlman, Marc R. , Samar , P.
[9],2002 -The practical maintenance of routing zones also
helps improve the quality of discovered routes, by making
them more robust to changes in network topology. Once
routes have been discovered, IARP’s routing zone offers
enhanced, real-time, route maintenance. Link failures can
be bypassed by multiple hop paths within the routing zone.
Similarly, suboptimal route segments can be identified and
traffic routed along shorter paths.
Jan Schaumann [10],2002- This text describes and analyze
the Zone Routing Protocol (ZRP), a hybrid mobile ad-hoc
protocol which divides the network into overlapping
routing zones, allowing for the use of autonomous
protocols within and between the zones.
III.
SYBIL ATTACKS IN MANET
In the event that a solitary pernicious hub has the capacity
persuade its neighbors by showing various characters, it
will have control over the generous part of the system and
can antagonistically influence the working of this system.
When a Sybil assault has been dispatched in the
framework, it likewise opens the entryways for diverse
sorts of different assaults. Normal instruments that can be
upset by the Sybil assault are:
Data Aggregation - A solitary Sybil assailant with different
fake personalities can take part in the collection, various
http://www.ijettjournal.org
Page 359
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
times and can change the consequence of the information
conglomeration
Fair Resource Allocation- Fair asset distribution plan is
likewise influenced by the Sybil assault. Case in point
some system assets may be designated on an every hub
premise; all things considered a vindictive hub can have a
bigger offer of any asset by showing various characters.
Voting- A Sybil aggressor hub is likewise equipped for
modifying the aftereffect of a voting plan. For instance, in
a vote based interruption identification framework, a
noxious hub with various Sybil hubs can oust a true blue
hub from the system by voting against this hub.
Additionally, to win the trust of the real hubs in the system,
a Sybil assailant can exploit its different Sybil hubs that
will vote to support it [5].
Routing- Sybil assaults can likewise affect the working of
certain directing conventions in MANETs, for example,
geographic based steering conventions and multi-way
steering conventions. In geographic routings, the hubs trade
their area data with their neighbors, to course the bundles
in a proficient way. Here, a solitary pernicious can give
different personalities distinctive fake direction positions.
Subsequently the honest to goodness hubs will have false
steering data in their tables and will prompt interruption in
the directing procedure. In multipath directing convention,
if the Sybil aggressor has exhibited different Sybil hubs
among the honest to goodness hubs, then for the authentic
sender hubs it may show up An impromptu system is made
out of versatile, remote gadgets, alluded to as hubs that
impart just over an imparted telecast station. The
multifaceted nature and uniqueness of MANETs make
them more helpless against security dangers than their
wired partners. Assaults on impromptu remote systems can
be delegated latent and dynamic assaults, contingent upon
whether the typical operation of the system is upset or not.
[13].
likewise contains the latest grouping number for the
destination of which the source hub is mindful.
DSR- Dynamic Source Routing (DSR) is the very efficient
protocol designed mainly for WSN, ad-hoc networks.
Dynamic Source Routing (DSR allows network to be selforganizing as well as self- configured. The DSR contains
two terms that is route recovery and route maintenance.
OLSR- Optimized Link State Routing convention (OLSR)
is a proactive convention. This convention made upon
connection state calculation. OLSR enhance a connection
state convention and pack the data size of a send messages,
and decline the retransmission bundles. It gives ideal in
light of number of bounces. OLSR has a property of having
the courses promptly accessible when required; it is a result
of its proactive nature. In a connection state convention, all
the connections are announced to neighbor hubs and
overwhelmed in the system. OLSR is an advancement of
connection state convention for MANET.
V.
CONCLUSION
In this paper, the Sybil assault as security dangers in the
Mobile ad-hoc systems has been examined. Because of
remote medium and versatile hubs the MANETs are more
inclined to all sorts of security dangers when contrasted
with wired systems. Subsequently, there is a requirement
for secure environment for transmission of secure
correspondences. In this paper, we have introduced the
sorts of directing conventions utilized as a part of versatile
specially appointed systems. Every directing convention
has interesting highlights and features.
REFERENCES
1.
Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc
networking: Imperatives and challenges,” Ad Hoc Netw., vol.
1, no. 1, pp. 13–64, 2003.
2.
J. R. Douceur, “The Sybil attack,” presented at the Revised
Papers from the First Int. Workshop on Peer-to-Peer Systems,
IV.
PREVENTION METHODS FOR SYBIL
ATTACK
AODV-AODV orchestrates a course to a destination just
when a hub needs to send a bundle to that destination.
Courses are kept up the length of they are required by the
source. Grouping numbers guarantee the freshness of
courses and certification the circle free directing. AODV
additionally gives topology data to the hub. AODV
manufactures
courses utilizing a course ask for/ course answer question
cycle. At the point when a source hub fancies a course to a
destination for which it doesn't have a course, it shows a
course ask for (RREQ) bundle over the system. Hubs
getting this parcel overhaul their data for the source hub
and set up in reverse pointers to the source hub in the
course tables. Notwithstanding the source hub's IP address,
current succession number, and show ID, the RREQ
ISSN: 2231-5381
2002, pp. 251–260.
3.
J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack
in sensor networks: Analysis and defences,” presented at the
3rd Int. Symp. Information Processing in Sensor Networks
(IPSN), 2004, pp. 259–268.
4.
B. Parno and A. Perrig, “Challenges in securing vehicular
networks,” in Proc. 4th Workshop HotNets, 2005, pp. 1–6.
5.
K. Hoeper and G. Gong, “Bootstrapping security in mobile ad
hoc networks using identity-based schemes,” in Security in
Distributedand Networking Systems (Computer and Network
Security). Singapore: World Scientific, 2007.
6.
P. Jacquet, P. Muhlethaler, A. Qayyum, “Optimized Link State
RoutingProtocol”, Internet Draft, draft-ietf-manetolsr- 00.txt,
November 1998.
http://www.ijettjournal.org
Page 360
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
7.
Jan Schaumann, “Analysis of Zone Routing Protocol”, Course
CS765, StevensInstitute of Technology Hoboken, New Jersey,
USA, 8th December 2002
8.
Haas, Zygmunt J., Pearlman, Marc R., Samar, P.: “Intrazone
Routing Protocol(IARP)”, IETF Internet Draft, draft-ietfmanet-iarp-01.txt, June 2001
9.
Haas, Zygmunt J., Pearlman, Marc R., Samar, P.: “The
Bordercast ResolutionProtocol (BRP) for Ad Hoc Networks”,
10. Yiu. -Chin. Hu, D. B. Johnson and A. Perrig, “SEAD: Secure
Efficient Distance VectorRouting for Mobile Wireless Ad Hoc
Networks”, Fourth IEEE Workshop onMobile Computing
Systems and Applications (WMCSA’02), Jun. 2002
11. Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure
On-Demand
RoutingProtocol
for
Ad
Hoc
Networks,
Mobicom’02, 2002.
12. Prameet Kaur & Sandeep Singh Kang,” Efficient Routing
Protocol to Detect and Prevent Sybil Attack in Wireless Sensor
Network”,Vol. 3, Issue 5, Dec 2013
13. C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil
attack in mobile ad hoc networks,” in Proc. Securecomm
Workshops, 2006, pp. 1–11.
14. K.S. Sujatha, V. Dharmar. R.S. Bhuvaneswaran, “Design of
genetic algorithm based IDS for MANET”, Conference:
Recent Trends In Information Technology (ICRTIT), IEEE,
pp.28-33, 2012.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 361
Download