defending against energy draining attack in ad

advertisement
Universe of Emerging Technologies and Science
Volume I Issue VI – November 2014
ISSN: 2349 - 655X
Impact Factor: 0.272
DEFENDING AGAINST ENERGY DRAINING ATTACK IN AD-HOC
SENSING NETWORK
Mrs. Roshani Sahare Chandekar1, Prof. Vinod Nayyar2
1
Student, MTECH (CSE), Abha Gaikwad-Patil College of Engineering, Maharashtra, India
2
Professor, CSE, Abha Gaikwad-Patil College of Engineering, Maharashtra, India
________________________________________________________________________________________________________
from Vampire attacks implies that this ratio is 1. Energy use
ABSTRACT
by malicious nodes is not considered, since they can always
unilaterally drain their own batteries
Ad-hoc wireless network is an innovative research
direction in pervasive computing and sensing. In this area
1.1 Vampire Attack
we mainly focused on security, denial of service at the
We can define it as the composition and transmission of a
routing and in access level. This paper elaborate energy
message that causes more energy to be consumed by the
draining attack which widely known as “Vampire Attack”.
network than if an honest node transmitted a message
It is resource depletion attacks found at the routing
of identical size to the same destination.
protocol layer, which permanently disable networks by
quickly draining node’s battery power.
We measure the strength of the attack as follows:
These “Vampire” attacks are not relying on specific to any
Ms= Network Energy / Malicious Case
protocol, but rather rely on the properties of many popular
classes of routing protocols. We find that all examined
Vampire attacks are not dependent on any protocol i.e. they
protocols are susceptible to Vampire attacks, which are
do not rely on any specific protocol i.e. link-state, distancedevastating, difficult to detect, and are easy to carry out
vector, sourcing routing, and geographic and beacon
using as few as one malicious insider sending only
routing. Since vampire use protocol-compliant messages,
protocol-compliant messages. In the worst case, a single
these attacks are very difficult to detect and prevent.
Vampire can increase network-wide energy usage by a
They are called vampire attacks, since they drain the life
factor of O (N), where N is the number of network nodes.
from networks nodes. These attacks are distinct from
We discuss methods to defend against energy draining
previously discussed Denial of service.
attack i.e. Vampires using EWMA.
In case of vampire network, Re-charging batteries will not
support.
Keywords: Wireless Network, Battery Power,
These “Vampire” attacks are not relying on specific to any
EWMA, Resource Deplication etc.
protocol, but rather rely on the properties of many popular
classes of routing protocols. We find that all examined
1. INTRODUCTION
protocols are susceptible to Vampire attacks, which are
Ad-hoc wireless sensor networks (WSNs) will be integrate
devastating, difficult to detect, and are easy to carry out
new applications in the future, such as ubiquitous onusing as few as one malicious insider sending only protocoldemand computing power, continuous connectivity, and
compliant messages.
instantly deployable communication for military and first
Vampire attack constitutes of two different types of attacks
responders. Such networks always measure environmental
called
conditions, performance. It is become more and more useful
to the everyday functioning of people, organization and
1.1.1
Stretch attack and
institutions.
1.1.2
Carousel attack. These two
Due to their ad hoc organization, wireless ad hoc networks
are particularly vulnerable to denial of service (DOS)
attacks. We define a Vampire attack as the composition and
transmission of a message that causes more energy to be
consumed by the network than if an honest node transmitted
a message of identical size to the same destination, although
using different packet headers. We measure the strength of
the attack by the ratio of network energy used in the benign
case to the energy used in the malicious case, i.e. the ratio of
network-wide power utilization with malicious nodes
present to energy usage with only honest nodes when the
number and size of packets sent remains constant. Safety
Vampire attack can be define as the composition and
transmission of a message that causes more energy to be
consumed by the network than if an honest node
transmitted a message of identical size to the same
destination. We measure the strength of the attack by the
ratio of network energy used in the case to the energy used
in the malicious case. Safety from the vampire attack
implies that this ratio is 1. Vampire attacks are not protocolspecific i.e. they do not rely on any specific protocol, but
rather exploit general properties of protocol classes such as
link-state, distance-vector, sourcing routing, and geographic
and beacon routing. Since vampire use protocol-compliant
_______________________________________________________________________________________
Online Available at www.uniets.com | 2014-UNIETS-November-0012
1
Universe of Emerging Technologies and Science
Volume I Issue VI – November 2014
messages, these attacks are very difficult to detect and
prevent.
They are called vampire attacks, since they drain the life
from networks nodes. Re-charging the batteries also will
not help unless the vampire attacks are more resource
constraint than the honest nodes. Vampire attack constitutes
of two different types of attacks called Stretch and
Carousel attack. These two mainly focuses on reducing the
energy of the nodes.
1.1.1 Carousel attack:
In this attack, an adversary composes packets with
purposely introduced routing loops. It is called carousel
attack. It targets source routing protocols by exploiting the
limited verification of message headers at forwarding nodes,
allowing a single packet to repeatedly traverse the same set
of nodes. The reason for this large standard deviation is that
the attack does not always increase energy usage, the length
of the adversarial path is a multiple of the honest path,
which is in turn, affected by the position of the adversary’s
position of the adversary in relation to the destination, so
the adversary’s position is important to the success of
this attack.
1.1.2 Stretch attack
In this attack, also targeting source routing, an adversary
constructs artificially long routes, potentially traversing
every node in the network. It is call this the stretch attack,
since it increases packet path lengths, causing packets
to be processed by a number of nodes that is
independent of hop count along the shortest path
between the adversary and packet destination.
2. ENERGY WEIGHT
ALGORITHM (EWMA)
2.1 Network Configuring Phase:
The goal of this layer is to establish a shortest routing path
from source to destination in the network. Basically we
mainly focused balancing the load of the nodes and
minimizing energy consumption for data communication
and resource sharing.
Working of this phase is as follows:
When any node reached to threshold level energy that node
called as attacked node. It sends ENG_WEG message to all
its surrounding nodes. After receiving the ENG_WEG
packets the surrounding nodes sends the ENG_REP
Impact Factor: 0.272
message that encapsulates information regarding their
geographical position and current energy level. In this
ENG_REP message all node gives the rout i.e. shortest path
to reach at destination from the source. Hence the attacked
node reached.
START
START
MALISIOUS NODE
REACHES TO
THRESHOLD
LEVEL
COMPUT
E THE
ENERGY
NEEDED
ESTABLISHED
THE PATH
NEEDED
SENDING
ENR_WEG TO
SURROUNDING
LEVEL
NODES REPLY BY
SENDING
ENR_REP WITH
THEIR CURRENT
ENERGY LEVEL
MONITORING
This part focused on the design of proposed protocol
EWMA. Where energy of a node rich at threshold level it
plays an important role by defending against denial of
service attack. This pattern based on the energy levels of the
sensors.
Here we define two phases of Energy Weight Monitoring
Algorithm.
2.1. Network configuring phase
2.2. Communication phase
ISSN: 2349 - 655X
DATA
ACREA
TING
DATA
ROUTING
Fig- 1: Energy Weight Monitoring Algorithm
Above process represent how securely we communicate
with node and forwarded the packet from source to
destination. Above algorithm gives prime importance to
achieve load balancing in the network. The perfect and
suitable node will be assigned as a forwarding node has a
capability to efficiently handle attacked or malicious node.
In this way we achieve shortest distant to bound damage
made by vampire attack.
Energy weight monitoring algorithm avoids the collision by
dropping in the network. The load balancing basically
depends on capacity of a node. In this way we achieve load
balancing.
_______________________________________________________________________________________
Online Available at www.uniets.com | 2014-UNIETS-November-0012
2
Universe of Emerging Technologies and Science
Volume I Issue VI – November 2014
ISSN: 2349 - 655X
Impact Factor: 0.272
5.
G. Vijayanand, R. Muralidharan, “Overcome Vampire
Attacks Problem In Wireless Ad-hoc Sensor Network
By Using Distance Vector Protocols”, G. Vijayanand et
al, International Journal of Computer Science and
Mobile Applications, Vol.2 Issue. 1, January- 2014, pg.
115-120
6.
Aggregation is the process of copying the content of the
packet and copied content compare with data packet if
transmitted packet is same the node stops the data packet
transmission.
Sharnee Kaul, Helen Samuel , Jose Anand, “Defending
Against Vampire Attacks In Wireless Sensor
Networks,” International Journal of Communication
Engineering Applications-IJCEA , Vol 05, Article
C084; March 2014.
7.
In this way it avoids the redundant packets transmitting
through the same node again and again and protects the
depletion of batteries and send the required data packets
through the establish node safely to the destination from the
source.
K.Sivakumar, P.Murugapriya, “Efficient Detection and
Elimination of Vampire Attacks in Wireless Ad-Hoc
Sensor Networks,” International Journal of Innovative
Research in Computer and Communication Engineering
Vol.2, Special Issue 1, March 2014.
8.
S.Manimala, A.Taskala Devapriya, “Detection of
Vampire Attack Using EWMA in Wireless Ad Hoc
Sensor Networks”, IJISET - International Journal of
Innovative Science, Engineering & Technology, Vol. 1
Issue 3, May 2014.
9.
Gowthami.M, Jessy Nirmal.A.G, IIIP.S.K.Patra,
“Mitigating Vampire Attack in Wireless Ad-Hoc Sensor
Networks,” International Journal of Advanced Research
in Computer Science & Technology (IJARCST 2014)
Vol. 2 Issue Special 1 Jan-March 2014 .
2.2 Communication Phase:
The main job of communication phase is to avoid packets
send through the same node redundantly to deplete the
batteries vastly and leads to network death because of
vampire attacks.
The redundancy is eliminated by aggregating the data
packets within the forwarding node and sends the remaining
packet using shortest route to the destination.
3. CONCLUSIONS
In this paper, One energy draining attack was defined which
known as Vampire attack. This is a new form of attack
which consumes life and energy from the node present in
the network. It includes some types of vampire attack such
as Stretch attack, Carousel attack. Also to defend against
vampire attack one method introduces EWMA method.
4. REFERENCES
1.
Eugene Y. Vasserman and Nicholas Hopper, “Vampire
Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks”, IEEE Transactions On Mobile Computing,
Vol. 12, No. 2, February 2013
2.
B. Umakanth1, J. Damodhar2, “Detection of Energy
draining attack using EWMA in Wireless Ad Hoc
Sensor Networks,” International Journal of Engineering
Trends and Technology (IJETT) – Volume 4 Issue 8August 2013
3.
R. Sangeetha, R.Deepa, C.Balasubramanian, “Provably
Secure Routing and Defending Against Vampire
Attacks in Wireless Ad Hoc Sensor Networks” ,
International Journal of Innovative Research in Science,
Engineering and Technology Volume 3, Special Issue
3, March 2014.
4.
Mr. M. Rajesh Khanna, S. Divya, Dr.A.Rengarajan,
“Securing Data Packets from Vampire Attacks in
Wireless Ad-Hoc Sensor Network”, International
Journal of Innovative Research in Computer and
Communication Engineering (An ISO 3297: 2007
Certified Organization) Vol.2, Special Issue 1, March
2014.
10. K.Vanitha,V.Dhivya, “A Valuable Secure Protocol to
Prevent Vampire Attacks In Wireless Ad Hoc Sensor
Networks,” International Journal of Innovative
Research in Science, Engineering and Technology
Volume 3, Special Issue 3, March 2014
11. N. Keerthikaa MCA.,K. Devika M.Sc., MCA., M.Phill.,
“Synchronization and Time Slot-Based Method for
Vampire Attacks Detection in Wireless Sensor
Networks,” International Journal of Engineering
Research and General Science Volume 2, Issue 5,
August-September, 2014.
_______________________________________________________________________________________
Online Available at www.uniets.com | 2014-UNIETS-November-0012
3
Download