Prevention of Wormhole attack in Mobile Ad

advertisement
Prevention of Wormhole attack in Mobile Ad-hoc Network (MANET)
1
Miss. Samrudhi P. Bonde, 2Miss. Sayali N. Gajare , 3Mr. Manjitsing V. Patil, 4Mr. Aniket S. Kolte.
Department of Computer Engineering, Shram Sadhana Trust, College of Engineering, Jalgaon-India.
1
bondesamrudhi@gmail.com, 2 sayaligajare7@gmail.com, 3 manjeet1811@gmail.com,
4
aniketkolte11@gmail.com .
1,2,3,4
Abstract:- A Mobile Ad-Hoc Network (MANET) is a
the important issue in Mobile Ad-hoc Network (MANET).
set of mobile nodes and wireless communication link
The ultimate goal of the security for MANET is to provide
used to connect those nodes. Nodes in a MANET are
availability, confidentially, integrity, and authentication to
free to move independently in the network. MANET is
ensure secure services to the user. Mobile Ad-hoc
an infrastructure less network with no fixed base
networks are susceptible to various routing attacks such as
station therefore Security is one of the major issues,
wormhole, gray hole, vampire attack. Wormhole Attack is
because of its dynamic topology. In wormhole attack a
one of the most severe attacks on routing protocols in
set of misbehaving nodes creates a high speed tunnel
which two or more unauthenticated nodes receive packets
using this it causes data traffic and route disturbance.
at one point of the network and transmit them to another
Misbehaving nodes add itself in a routing path then
location by high speed wireless tunnel.
drops the data packets in network. Propose approach is
used to prevent wormhole attack in the mobile ad-hoc
Wormhole Attack:
network, which uses the Advanced Encryption
Standards (AES) technique and 2Acknowledgement
(2ACK) scheme to find the misbehaving nodes in the
network.
Keywords: Ad-hoc, MANET, Wormhole attack, AES
Technique, Security, Prevention Techniques.
I.
Figure 1:Wormhole attack
INTRODUCTION
Mobile Ad-Hoc network are most popular wireless
network because of infrastructure less nature. Mobile adhoc network is a set of independent mobile nodes that
communicates with each other using
communication
a wireless
link. Applications of mobile Ad-hoc
networks include military communication system in case
of
critical
situations,
emergency
relief
operations,
commercial and educational use in remote areas, and in
meetings and other situations where the networking is
mission oriented and communication based. Due to open
medium, lack of centralized authorization system and
continuous change in topological nature, Security is one of
Therefore Wormhole attack is also known as tunneling
attack. The wormhole attack is a multiple threat against
packet routing in mobile networks that is particularly
challenging to prevent. In the wormhole attack, an attacker
node receives packets at one location, tunnels them and
drops that data packet to another location in a network,
where the packets are resent into the network to consume
the bandwidth of network therefore it causes data traffic.
This tunnel between two malicious attacker nodes is
known as a Wormhole.
In case of 2ACK,
Let 2Ack received by each node is,
II.
Related work
2ACK = ACK (next node) +ACK (its successor node).
Privacy-preserving routing is important for every ad hoc
networks therefore it require stronger privacy protection.
If acknowledgment received less at each node is than 2,
Previous approach defines stronger privacy protection
then node is the attacker or misbehaving and treated as
regarding to privacy-preserving routing in mobile ad hoc
wormhole.
networks. It proposes AODV routing protocol which offer
A. Advanced Encryption Standard (AES):
effective link ability for all types of data packets. AODV is
efficient however it uses a concatenation of ID-based
encryption and group signature for route discovery. It
calculates each next hop distance which is based on the
certain threshold value
and
wormhole link using
frequency. PT is based on public key cryptography, every
node in network calculate next hop distance of its neighbor
with the previous hop distance to identify the wormhole
attack. The respective nodes detect the wormhole if the
I.
Figure 2: AES Algorithm.
next hop distance goes beyond the certain threshold range.
AES contains three block ciphers, AES-128, 192 and 256.
[5]
Each cipher encrypts and decrypts data in blocks of 128
III.
Proposed system
bits using cryptographic keys of 128, 192 and 256 bits
respectively. For encryption and decryption, Symmetric or
Mobile Ad-Hoc Network consists of a group of mobile
nodes. Mobile ad-hoc network is unsecure from wormhole
attack due to its dynamic topology therefore the proposed
work is about to prevent the wormhole attack of mobile
Ad-hoc network. In this system, for neighbor discovery
and to find shortest path AODV protocol is used. To
secure data in network proposed system uses Advanced
Encryption Standard (AES) algorithm which encrypt the
packet at each level by using secret key and ensuring
secure delivery via decrypting the packet at the neighbor
node and matching the distributed Secret Key, Attacker
only retrieve data in encrypted form but it could not
decrypt it.
In addition to AES proposed system uses
2ACK scheme which detect and prevent the wormhole
attack in the MANET.
secret-key ciphers use the same key, so both the sender
and the receiver must know and use the same secret key.
All key lengths must be sufficient to protect secret data up
to the authorized level. If data is Top Secret then it
requires either 192- or 256-bit key lengths. There are 14
rounds for 256-bit keys, 12 rounds for 192-bit keys, and 10
rounds for 128-bit keys. Each round consists of multiple
processing steps that include substitution, transposition and
mixing of the input plaintext data and transform it into the
final output of ciphertext data. [3]
B. Algorithm for 2ACK Scheme:
Figure 3: 2ACK Scheme.
Traffic type
TCP/UDP
Routing protocols
AODV
Simulation area
1500*1500
Number of nodes
30
Communication range
Default 50m
Simulation time
20sec
Speed of nodes
1.2 m/sec
Begin
INPUT: Encrypted Message
1: Assume source Node A sends message to Node I.
2: If Node I receives the message and forward to
destination Node B.
3: Node I give acknowledgement to Node A.
4: Node B sends an acknowledgement to Node A and I
Figure 4: Packet loss
(2ACK).
5: Node A consider that message forwarded successfully
6: Else
7: If Node I sends an acknowledgement to Node A
8: Node B do not send acknowledgement to Node A
9: Node A classified to Node B as a misbehaving node in
the Network
10: Else
11: If Node I does not send acknowledgement to Node A
12: If Node B does not send acknowledgement to Node A
Figure 5: Delivery ratio
13: Then Node A classified as Node I as a misbehaving
node in networks
V.
Conclusion:
14: End.
A wormhole attack is an attack, executed by two
IV.
Simulation Environment and Analysis:
unauthenticated nodes causing serious damage to data
and indirectly networks reliability. Here, a solution is
The proposed approach is implements with NS2
proposed to prevent the network against wormhole
simulator. AODV protocol is used for routing
attack. In this, Advanced Encryption Standard (AES)
purpose. Mobile Ad-hoc networks of 30 nodes are
algorithm is used for encryption and decryption of data
created with the simulation area of 1500*1500
packets and 2ACK scheme is used to identify and prevent
meter, other parameters are as shown in table:
attacker nodes in network. Because of this, the only
Table1: Simulation Parameters
authentic node will remain in the network; unauthentic
nodes (wormhole node) will be discarded. As a result,
Parameters
Values
secure communication can take place only between the
authenticated nodes.
Communications Networking System , Vol 01,
Issue 02, December 2012 ISSN: 2278-2427.
[6] Shalini Jain and Dr.Satbir Jain, “Detection and
prevention of wormhole attack in mobile adhoc
networks”, International Journal of Computer
VI.
Theory and Engineering, Vol. 2, No. 1 February,
ACKNOWLEDGEMENTS
2010.
Authors of this paper would like to thank our College,
SSBT’s COET Bambhori, Jalgaon, NMU University,
Maharashtra, India, for providing us adequate resources to
make this paper. Also, we would like to thank our project
guide Mr. M. E. Patil and HOD Dr. G. K. Patnaik for their
valuable suggestions.
I.
References:
[1] Priyanka Sharma, H.P. Sinha and Abhay Bindal,
“Detection and Prevention against Wormhole
Attack in AODV for Mobile Ad-Hoc Networks”,
International Journal of Computer Applications
(0975 – 8887) Volume 95– No. 13, June 2014.
[2] Pravin Khandare, Prof. N. P. Kulkarni, “Public
Key Encryption and 2Ack Based Approach to
Defend Wormhole Attack”, International Journal
of Computer Trends and Technology- volume4,
Issue3, 2013.
[3] Manoj E. Patil and Kavita T. Patil , “Improve the
Security of CGA using Adjustable Key Block
Cipher based AES, to Prevent Attack on AES in
IPV6 over MANET”, IEEE Global Conference
on
Wireless
Computing
and
Networking
(GCWCN) 2014.
[4] Yashpalsinh Gohil, Sumegha Sakhreliya and
Sumitra Menaria, “A Review On: Detection and
Prevention of Wormhole”,International Journal of
Scientific and Research Publications, Volume 3,
Issue 2, February 2013
[5] P. Anitha and M. Sivaganesh, “DETECTION
AND
PREVENTION
ATTACKS
TRACING”
IN
OF
MANETS
International
WORMHOLE
USING
Journal
PATH
of
Download