An Evaluation of GET to Secure Data Transmission using DH

advertisement
International Journal of Computer Applications in Engineering Sciences
[VOL II, ISSUE II, JUNE 2012]
[ISSN: 2231-4946]
An Evaluation of GET to Secure Data Transmission using DH Routing Approach against
NLA in MANETs
Venkatesh S , 2G.S. Mamatha
1
1,2
Department of Information Science & Engg, R V College of Engineering, Bangalore
1svenkatesh200@gmail.com
2mamatha.niranjan@gmail.com
Abstract: A Mobile Ad-Hoc networks (MANETs) is a collection of mobile node which communicate each other
through wireless link to give a stationary infrastructure
network without any centralized administration. With
increase in number of attacks strategies on MANETs there
is need to propose best routing approach with efficient
encryption technique which resist attacks.
In this paper we have implemented network grid, GC
technique for text, image and graphics, and DH routing
approach along with prominent network layer attack such
as black hole, grey hole and message tampering attacks.
Our objective is to thoroughly encrypt, route and analyze
the impact of above attacks on MANETs performance.
Our evaluation result significantly depends on attack type
and parameter used. The performance of the network is
analyzed with number of nodes and load to transmit in the
network.
Keywords: MANETs, Gene Crypt Technique, DH routing
approach, Network layer attacks, Performance Evaluation.
I.
INTRODUCTION
MANETs were introduced in early 1970 by BBN
Technologies and SRI International designed as packet
radio network [1]. Since MANETs is a recent technology it gained a huge attention of many researchers and
exhibit there new ideas that would enhance the features
and potential of MANETs. These networks are suitable
for disaster recovery, battle field, emergency situation
and commercial sector [2]. MANETs use routing protocol such as DSR, DSDV, and AODV etc to transmit data
between nodes efficiently. MANETs consists of many
nodes with wireless connection in which there is a possibility of node become inactive, breakage of link between nodes, addition of foreign nodes into network
which act malicious or node in the network may act malicious. With this problem in MANETs the performance
metrics such as round trip time, end to end delay and
through put of the existing routing protocol have decreased and vulnerable to many of the network attacks.
In this paper we present a travelling salesman problem approach to design reactive routing approach for
MANETs. Proposed approach detects and corrects net-
work layer attacks using genetic encryption technique
(GET).
The remaining of this paper is structured as follows: section II briefly examines the related works section, III proposes network model, gene crypt encryption
technique, distance hop count (DH) routing approach
and network layer attack, section, IV provides performance comparison between without attack and with
attack, section V concludes the paper with future work.
II. RELATED WORK
Several encryption techniques to encrypt data,
routing protocol and attacks have been proposed in
MANETs environment. Two of the prominent encryption techniques are advance encryption standard (AES)
and data encryption standard (DES).
Wails S, Elkilani, Haten M. Abdul-Kader [3] address AES algorithm as symmetric key cryptosystem
that processes 128-bit data blocks using cipher keys with
lengths of 128 bits was adapted to secure multimedia
applications. Tingyuan Nie, Teng Zhang [4] address
DES as a 64-bit block cipher under 56-bit key. This algorithm processes with an initial permutation, sixteen
round block cipher and a final permutation. The drawback of using AES and DES is fault injection attack in
which attacker can reset an entire byte of the key or corrupt the basic round instruction to get the secrete key.
Since both encryption technique uses higher key size
which leads to clear change in the battery and time consumption.
S. M. Bo, H. Xiao, A. Adereti, J. A. Malcolm and
B. Christianson [5] present a performance analysis of
different routing protocols under attack. They compare
three different routing protocols under attack by two
types of selfish nodes: Destination-Sequenced DistanceVector (DSDV), Dynamic Source Routing (DSR), and
Ad-hoc On-Demand Distance Vector (AODV). Evaluation metrics are end to end delay, throughput, and routing overhead. Their evaluation results show that proactive DSDV routing is the most defence routing protocol
under the considered attacks.
66 | P a g e
Venkatesh et. al.
NZ Ali, R B Ahmad, S. A Alijunid exhibit the ability of source and destination to have multipath between
them if the route fails fault tolerance is given with alternative route. TORA, AODV-BR and ZRP protocol were
used with above technique to check the performance
metric. It shows that duplicate RREQ messages are not
rejected hence diminish the performance of network. [6]
OLSR is a proactive routing protocol which is vulnerable to many attacks hence M. Wang, L. Lamont, P.
Mason, M. Gorlatova, presented a paper to provide necessary security and authentication to OLSR protocol. To
accomplish intrusion detection system a semantic checking property is integrated into OLSR protocol to fight
against any abnormal semantics protocol to enter into
system a case study is in the paper explains how OLSR
protocol gives intrusion detection alarm to the working
system by sending warning message to all the nodes in
the network. The drawback of this paper is there is no
correction stage after detection alarm and the protocol
detect external node misbehaviour but there is a need to
study malicious behaviour of internal nodes. [1]
1) Key Generation:
In this stage, a stream of keys is generated using
the initial values which are given by the user. These
keys are nothing but a set of random numbers generated
using equation 𝑋𝑛 + 1 = (𝑎𝑋𝑛 + 𝑐) 𝑚𝑜𝑑 𝑚. where
𝑚
𝑎
the modulus
the multiplier
Initial
Keys
𝑚>0
0<𝑎<𝑚
Sender
Receiver
Original File
Original File
Key Stream
Generation
Message
Authentication
Message
Authentication
Second
Crossover
First Crossover
Mutation
Mutation
First Crossover
Second
Crossover
Key Stream
Generation
III. PROPOSED APPROACH
In this section a brief overview of network grid
model, gene crypt, a routing DH approach and network
layer attacks on proposed approach is explained.
A. Network Model
Ad-hoc network is a modeled using a directed
graph N (V, E) where V represents a finite set of mobile
nodes and E is a finite set of duplex wireless radio links
between nodes. Each node iЄV possess a unique ID and
moves randomly. S and D being the source and the destination of N respectively. Every mobile node i would
possess transmission radius of size R as modeled in
wireless transmission. N (i) is a set of neighbor node j of
node i but not including node i. If node j is in the
transmission radius R of node i , there is a bi-direction,
wireless radio links E[i, j] between node i and node j ,
E[i, j]ЄE .Set E changes with time.[8]
B. Gene Crypt
Gene crypt technique or genetic encryption technique is a special type of encryption technique which
derives the genetic concept of human being. The process
consists of key generation, message authentication,
crossover and mutation. The working of the process
diagrammatically represented in figure 3.1. In gene
crypt, initial keys are provided by the sender for the key
generation process. The keys generated are used in authentication, crossover and mutation processes. The
crossing-over and mutation processes, used with keys,
are used to scramble the input file. After the second
crossover process, the file will be completely encrypted.
[7]
67 | P a g e
Encrypted File
Transmisson
Initial
Keys
Encrypted File
Figure 3.1 Gene Crypt Process
𝑐
𝑋0
𝑋𝑛
the increment
0≤𝑐<𝑚
initial value or seed
0 ≤ 𝑋0 < 𝑚
sequence of key 0 ≤ 𝑋𝑛 < 𝑚
The strength of sequence number generated under
go Mono-bit test, Poker test, Run test and Long run test
to get rid of trial and error method attack.
2) Message Authentication
Message authentication is a procedure to verify
that received messages come from trusted source and
have not been altered during transmission or at the routers. The following four steps are used for authentication
at the sender side.
1. Padding: The message is padded so that its length in
bits is congruent to 384 modulo 512. That is the padded
message is 128 bits less than an integer multiple of 512
bits.
2. Appending length: A 128 bit representation of the
length in bits of the original message (before padding) is
An Evaluation of GET to Secure Data Transmission using DH Routing Approach against NLA in MANETs
appended to the result of step 1. The outcome of the first
two steps yields a message that is an integer multiple
512 bits in length. This outcome is given to a compression function which calculates the digest.
3. Initialize buffers: An intermediate and final result of
the hash function is stored in 128 bit buffer. Four 32-bit
registers (A, B, C and D) are represented by buffer.
These registers are initialized to the following hexadecimal values.
A=89ABCDEF, B= FEDCBA98, C=76543210,
D=01234567
4. Process the message in 512 bit blocks: Each 512 bit
block is given as input to the processing stage of the
authentication function where it is divided as four 128
bit segments. Each 128 bit segment is fed to one of the
four functions F, G, H, I. These functions are show below
Function
F:
𝐴=𝐴+
((𝑋[0] & 𝑋[1]) | (~𝑋[2] & 𝑋[3]))
Function
G:
𝐵=𝐵+
((𝑋[4] & 𝑋[5]) | (~𝑋[6] & 𝑋[7]))
Function
H:
𝐶=𝐶+
((𝑋[8] & 𝑋[9]) | (~𝑋[10] & 𝑋[11]))
Function I:D= 𝐷 +
((𝑋[12] & 𝑋[13]) | (~𝑋[14] & 𝑋[15]))
3) Crossover
The message after message authentication is represented as a data array with first and the last element are
selected for the first iteration and they are divided at the
positions indicated by the key value for crossover. After
the crossover two children are produced of new value.
4) Mutation
In this we change the bits of data values to produce
a totally new value. Here the multiple bits of the input
data are mutated, depending on the keys generated. The
position where the desired operation is needed to be
carried out is provided by the key and a sample is shown
as follows
0 1 1 0 1 1 0 1
0 0 0 0 0 1 1 0
0 1 1 0 10 1 1
5) Second Crossover
This process is exactly the same as first cross over
but the embedding of mutation in between the two
crossovers makes all the difference.
The decryption process is the reverse process of
encryption process. Here the same key is passed and the
bottom up approach is used for getting the clear text,
image and graphic back at receiver.
C. DH Routing Approach
DH routing approach consists of three main phases; Route discovery, Data transmission and Route
maintenance. [8]
1) Route Discovery
In the route discovery phase, the best path from
distance and hop count aspects is computed. Assume the
source node Ns want to transfer data packet to destination node Nd. with no route to Nd. Ns initiates a route
discovery by flooding a route request message (RREQ)
to its neighbour’s active nodes. The RREQ message
contains source identification number Ns, destination
identification number Nd, hop count and distance between nodes. Each node Nj receives route request packets directly from an intermediate node Ni, and stores Ni`s
information in the route table, an path distance Pij is also
stored in the route table. Each intermediate node Nj
check for early receive of RREQ message if so it drop
the packet else store in route table. After destination
node Nd receives RREQ message it sends RREP message in all existing active path on receiving RREP message the source node Ns sort all the paths based on hop
count if an ambiguity created by two or more paths have
same hop count then source node sort path based on
distance and all the paths are stored in route table. [8]
2) Data Transmission
In this phase encrypted data packets are relayed
through optimal path found in route discovery phase.
Destination node send acknowledgement packet for each
data packet it receive and decrypt the encrypted message
to get original data.
3) Route Maintenance
In this phase if any of the node is inactive in the
optimal path Psd in which data packets are transferring a
route error (RERR) message is sent by the previous
node of the inactive node in the optimal path to the
source node. Source node deletes the corrupted path and
transmits data packets in next optimal path available in
route table. After deleting the path/paths from its route
table, and if no paths are available, then Route Maintenance phase will intimate the Route Discovery phase to
start again from the scratch to find the new paths.
D. Network Layer Attacks (NLA)
This section briefs how attack are detected and corrected by launching attacks such as black hole, grey hole
and message tampering attacks on DH routing approach
which pertaining to the network layer in the network
protocol stack.
1) Black Hole Attack
68 | P a g e
Venkatesh et. al.
2) Grey Hole Attack
The grey hole attack purposefully drop or consume
selected packets by the attacking node. Source node
calculates data packets sent and acknowledgement packets received if it turns to 50% then source node decide
its grey hole attack and route data packets in next alternative path. [9][10]
3) Message Tampering Attack
The message tampering attack alters the content of
the message by deleting or adding content into the message hence confidentiality is lost. This attack is detected
by calculating the message digest for received message
and compares it with the appended message digest.
IV. PERFORMANCE EVALUATION
The comprehensive proposal of encryption, DH
routing, and NLA is implemented on network grid of
800 by 800 with 30 nodes placed randomly is shown in
figure 4.1 and transmission range of each node is set for
relaying of message between nodes. The mobility of
each node is 5 to 10 m/sec pause time.
then we discuss the Simulation result of the DH routing
approach by launching attacks and without attacks on
this approach using performance metrics.
A. Comparison of Message Digest Calculation
The digest calculation which is implemented in gene
crypt is much faster, when compared MD5 algorithm. In
gene crypt, calculation of message digest for the text,
image and graphics shown in the Figure 4.2 takes few
milliseconds, then of MD5 algorithm with the file size
of 10.2MB. These values are taken from a computer
having 64 bit processor with 2.40 GHz and 4GB of
RAM.
140
120
Time in Millisecond
The black hole attack generates and circulates incorrect routing information so that packets are lost or forwarded to attacking node instead of forwarding to intended recipient. With this information source node keep
counter of data packet sent and acknowledgement packet received if the ratio is 100% source node decide its
black hole attack and route data packets in next alternative path.[9][10]
100
80
60
40
20
0
Gene Crypt
Message Digest
Text
Image
Graph
ics
57.5
75
73
99
125
122
Figure 4.2 Comparison of Message Digest Calculation in millisecond
B. Encryption Result:
The gene crypt encryption technique is specially
design for MANETs to preserve confidential information and it can be shown through encryption results.
1) Text:
The plain text shown in the Figure 4.3(a) is given
as input to Gene Crypt; corresponding encrypted file
shown in the Figure 4.3(b) is produced.
Figure 4.1 Network Grid with 30 nodes
In this section we present the comparison of message
digest calculation of gene crypt against MD5. An encrypted text, image and graphics result is analysed and
69 | P a g e
An Evaluation of GET to Secure Data Transmission using DH Routing Approach against NLA in MANETs
(a)
(b)
Figure 4.3 (a) Original text and (b) Encrypted text
2) Image:
Histogram gives the color distribution of an image.
It gives the number of occurrences of distinct pixels in a
given image. The input image is shown in figure 4.4 and
its encrypted image along with histogram is shown in
figure 4.5 and it can be observed that encrypted image
histogram is uniform but it varies for original image.
3) Graphics:
A line, graphs, maps, engineering drawing etc act
as graphics. A simple graphics is shown in figure 4.6 (a)
and its encryption is shown in figure 4.6 (b). Since
graphic is free of colours it does not contain any histogram representation.
(a)
(b)
Figure 4.6 Graphics and its Encryption
Figure 4.4 Original image
It can be observed that the encrypted text, image
and graphics are completely different from that of their
origin and are unintelligible.
C. Simulation Result
The simulation results analysed using performance
metrics such as end to end delay, round trip time and
throughput figure 4.7 show the end to end delay taken
for data packet transmission without any attack and with
attack. The delay in increase with attack to that of without attack taken in terms of percentage varies from 40%
to 50%.
Figure 4.7 End to End Delay (sec)
Figure 4.5 Encrypted image with its RGB histogram
Figure 4.8 show the RRT for data packets transmission without any attack and with attack. The increase
of RTT with attack to that of without attack in terms of
70 | P a g e
Venkatesh et. al.
percentage varies from 45% to 50%. Figure 4.9 show
the throughput taken for data packets transmission per
second without any attack and with attack. The number
of packets transmitted per second varies from 3 to 0 with
respect to number of packets used.
ery and route maintenance of DH routing is more advance then existing routing protocol.
Our evaluation result shows that message digest
calculation in gene crypt is more efficient then MD5
algorithm. The degree of impact of performance metrics
differs depends on the simulation environment used. The
performance evaluation show that our solution for MANETs security favours less end to end delay, round trip
time and throughput.
As a potential direction for future work we can use
the gene crypt for audio, video encryption, and improve
DH routing approach performance by including time
constraint in routing approach.
ACKNOWLEDGEMENT
This work has been supported in part by G.S. Mamatha, Assistant Professor, ISE Department at R V College of Engineering.
REFERENCES
Donatas Sumyla, “mobile ad-hoc network (MANETs)” march
2006,[online].Available:http://ecom.umfk.maine.edu/MMobile%2
0Ad.
pdf
[2] [M. Wang, L. Lamont, P. Mason, M. Gorla tova, “An Effective
Intrsion Detection Approach for OLSR MANET Protocol” in 1st
IEEE ICNP workshop on secure network protocols, 2005, pp 5560.
[3] Wail S. Elkilani, Hatem M. Abdul-Kader, “Performance of Encryption Techniques for Real Time Video Streaming” Proceedings of the Interna
tional Conference on Networking and Media Convergence, 2009, pp
130-134.
[4] Tingyuan Nie, Teng Zhang, “A Study of DES and Blowfish
Encryption
Algorithm”. In A Project of Shandong Province
Higher Educational
Science and Technology Program, 2009,
pp. 1-4.
[5] S. M. Bo, H. Xiao, A. Adereti, J. A. Malcolm, and B. Christianson,“A Performance Comparison of Wireless Ad-Hoc Network
Routing Protocols under Security Attack,” in IAS ’07: Proceedings of the Third International Symposium on Information Assurance and Security. Washington, DC, USA: IEEE Computer Society, August 2007, pp. 50–
55.
[6] NZ Ali, R. B Ahmad, S.A.Aljunid, “A Survey on On-Demand
Multi path Routing Protocol in MANETs”, Proceedings of the
International Conference on Electronic Design, June 2008, pp 14.
[7] E. Baburaj1, and V. Vasudevan2, “An Intelligent On Demand
Multi cast Routing Protocol for MANETs”, First International
Conference on Emerging Trends in Engineering and Technology,
July 2008, pp 214-217.
[8] Fatemeh Saremi, Hamid Mousavi, and Ali Movaghar, “Performance Analysis of SLTC – A Stable Path, Low Overhead, Truthful, and Cost
Efficient Routing Protocol in MANETs with
Selfish Nodes”, Proceed
ings of the Asia-Pacific Services
Computing Conference, August 2008,
pp 243-250.
[9] Sukla Banerjee, “Detection/Removal of Cooperative Black and
Gray Hole Attack in Mobile Ad-Hoc Networks” Proceedings of
the World Congress on Engineering and Computer Science, October 2008.
[10] ]Malcolm Parsons, Peter Ebinger, “Performance Evaluation of
the Impact of Attacks on Mobile Ad-hoc Networks” Wireless
Comunica
tions and Networking Conference, vol 2, 2006, pp.
646-654.
[1]
Figure 4.8 Round Trip Time (sec)
Figure 4.9 Throughput (per sec)
The increase in percentage with attack to that of
without attack is not so significant to the situation chosen because of addition of time taken for detection and
correction stage of launched attack on existing optimal
path.
V. CONCLUSION AND FUTURE WORK
In this paper we have implemented and presented
most prominent gene crypt encryption technique, DH
routing approach and network layer attacks. The comprehensive approaches of above implementation gives a
security, confidentiality, integrity, and authenticate proactive routing approach for MANETs. The route discov-
71 | P a g e
Download