A Survey on “Energy Efficient and Secure 8- May 2015

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
A Survey on “Energy Efficient and Secure
Infrastructure for MANET Jamming Attack”
Rajeev Raman#1, Narendra Pal Singh Rathore*2
#
Student, Computer Science &Engg., RGPV, Bhopal, M.P. India
Assistant Professor, Computer Science &Engg., TRUBA, Indore, M.P. India
#
Abstract: Security is the mandatory requisition in the
mobile Ad-Hoc network (MANET). Due to wireless
nature, it can be easily venerable or jammed by any
malicious network. But now a day MANET is the most
growing and very important part of our life system.
MANET is used in various fields like military operation,
vehicles, flood affected areas and remote areas etc. In
this survey, we present a novel idea for detecting
jamming from jammer, which uses three parameters i.e.
Avg. Request, Variance and Energy. In this context of,
overall variance of request is calculated in the network.
It behaves like threshold. Any node crosses the threshold
behaves like malicious node for some time. After that
total energy of overall system will be calculated. Any
node goes beyond this level will also treated as malicious
node.
Keywords: Avg. Request, variance, energy, Mobile AdHoc Network.
I.
INTRODUCTION
A wireless network is a network set up multiple base
stations communicating among computers or other
devices by sharing of radio signal frequencies. These
days, Wireless Networks are becoming more popular
because of easy setup and less cabling. A mobile Ad
hoc Network (MANET) is a system of wireless mobile
nodes that dynamically self-organizes [5].Due to
unstructured or self-configuring network. Any node
can add or leave the network at any time.
This feature, security is challenge to secure network.
Our main objective is to focus on the jamming, which
is the part of hybrid security. Jamming attack is a kind
of DoS attack. The purpose of a jammer is to protest
the communication between nodes. The main
objective of the jammer is to prevent an authorized
sender or receiver from transmitting or receiving
packets on the network.
The jamming is dividing into two categories:
(a) Physical jamming Attack
(b) Virtual jamming Attack
ISSN: 2231-5381
The physical jamming is the causing of continuous
transmission or packet collision at the receivers end.
Virtualjamming happen at the MAC layer by attack on
control frames or data frames.
II.
LITERATURE REVIEW
This section of the document introduces the
previously made efforts in order to improve security in
MANET environment.The shared nature of the
medium in wireless networks makes it easy for an
adversary to launch a Wireless Denial of Service
(WDoS) attack. Recent studies, demonstrate that such
attacks can be very easily accomplished using off-the
shelf equipment. To give a simple example, a
malicious node can continually transmit a radio signal
in order to block any legitimate access to the medium
and/or interfere with reception. This act is called
jamming and the malicious nodes are referred to as
jammers. Jamming techniques vary from simple ones
based on the continual transmission of interference
signals, to more sophisticated attacks that aim at
exploiting vulnerabilities of the particular protocol
used. In this survey, KonstantinosPelechrinis et al
present a detailed up-to-date discussion on the
jamming attacks recorded in the literature. They also
describe various techniques proposed for detecting the
presence of jammers. Finally, author survey numerous
mechanisms which attempt to protect the network
from jamming attacks. They conclude with a summary
and by suggesting future directions. [1]
With the pace of life, technology has also been
evolved. We have moved from the fixed transmission
to the mobility aspect. MANETs in today’s
environment is of great importance. The dynamic
feature of MANETs makes the networks
vulnerable to different security attacks. So it is
great
concern
to
provide
security
and
authentication along with power utilization and
robustness for the MANETs for successful
transmission.In our following paper we have
introduced our novel hybrid security approach by
using digital signature (DSA) with Blowfish algorithm
(DSAB) and compared its performance with existing
encryption techniques like AES, DES, etc. This
article is an extension of the article submitted to
ISCTURKEY 2012, Ankara, Turkey [2].
Security is an essential requirement in wireless ad hoc
network. Compared to wired networks, wireless ad
http://www.ijettjournal.org
Page 388
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
hoc network are more vulnerable to security attacks
due to the lack of a trusted centralized authority
and limited resources. Attacks on ad hoc networks
can be classified as passive and active attacks,
depending on whether the normal operation of the
network is disrupted or not. In this paper, we are
describing the all prominent attacks
and
alsoVarious attacks on the routing protocol are
described in literature in a consistent manner to
provide a concise comparison on attack types to the
best of our knowledge [3].
The varieties of studies in the literature have been
addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET).
Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference
attacks cannot be defeated through conventional
security mechanisms. An adversary can easily
override its medium access control protocol (MAC)
and continually transfer packages on the network
channel. The authorized nodes keep sending Requestto-Send (RTS) frames to the access point node in
orderto access to shared medium and start data
transfer. However, due to jamming attacks on the
network, the access point node cannot assign
authorization access to shared medium. These attacks
cause a significant decrease on overall network
throughput, packet transmission rates and delay on the
MAC layer since other nodes back-off from the
communication. The proposed method applied for
preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a
combination of different coordination mechanisms.
These are a combination of Point Controller Functions
(PCF), that is used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-ToSend) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the
wireless network. The entire network performance and
mechanism is simulated through OPNET simulation
application [4].
Security is an essential service for wired and
wireless network communications. The success of
mobile ad hoc networks (MANET) strongly
depends on people’s confidence in its security.
However, the characteristics of MANET pose both
challenges and opportunities in achieving security
goals,
such
as confidentiality, authentication,
integrity, availability, access control, and nonrepudiation. In this paper we provide a survey on
various security threats in MANET [5].
In a tactical field, wireless communication is prevailed
among military agents and vehicles, but it is fragile by
jamming attack from an adversary because of the
wireless shared medium. Jamming attack is easily
achieved by emitting continuous radio signal and it
can interfere with other radio communications within
the network. Channel switching over multiple
channels or route detouring have been proposed to
ISSN: 2231-5381
restore communication from jamming attacks, but
they require a special radio system or knowledge of
network topology. In this paper, in order to overcome
limitations of the previous research, we propose a new
robust rate adaptation scheme that is resilient to
jamming attack in a wireless multi-hop tactical
network. The proposed rate adaptation scheme detects
jamming attack and selects the data transmission
mode which has the expected maximum throughput
based on the successful transmission probability.
Through the performance evaluations, we prove rate
adaptation scheme that improves packet delivery ratio
and the wireless link utilization [6].
Wireless connectivity huge range results it exposed to
selective interference attacks, well known as jamming.
The thought of interrupting with wireless
transmissions will form as a platform and increases of
Denial-of-Service attacks on wireless connectivity. As
a critical situation, jamming has been known under an
external threat model. Moreover, antagonist of perfect
skills of protocol requirements and network
confidential things makes invisible jamming attacks
that won’t come under notice. In this paper, we
identify crisis of selective jamming attacks in wireless
connectivity. Such attacks, the attacker work on these
attacks very less time only, gives most preference to
the information which was passed through messages.
Explanation of benefits of chosen jamming based on
network performance was presented in two real time
applications or case studies. A chosen attack on TCP
and another is on routing. We explore that selecting
jamming attacks are cause of doing packets which of
real-time were declared at physical layer. To make
cautious about the attacks, we created three schemes
that restrict packet in reality classification by attaching
cryptographic
primitives
with
physical-layer
attributes. We guess the security of our approaches
and calculate their computational and communication
in future [7].
III.
PROBLEM DOMAIN
Mobile Ad-Hoc Network is a trust based network in
which a central supervising authority is absent. Its
independent and mobile behavior makes it vulnerable
towards a variety of attacks like wormhole, black-hole
and DDoS. DDoS, itself consist of a variety of attacks
such as Hello packet flooding, RREQ flooding etc. In
our work, we are portraying RREQ DDoS flooding
attack. In this attack malicious node floods fake
RREQ packets frequently. This causes node to lose
their computation power, battery and leads them to
Denial-of-service state. It is priory known that nodes
of a MANET are equipped with limited bandwidth,
battery power and computational power. DDoS
Flooding attack makes nodes so busy that their
energy, bandwidth and other resources get exhausted
and finally they become unable to handle genuine
http://www.ijettjournal.org
Page 389
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 8- May 2015
requests and services are denied i.e. Denial-ofService.
IV.
PROPOSED METHODOLOGY
To solve this issue, we are proposing to frame a
threshold based solution that considers three
parameters i.e. Avg. Requests, variance and Energy.
Into this context, the proposed methodology works as
follows. In this context, variance of overall requests in
the network is calculated. These will act as threshold
in the proposed algorithm. Any node exceeds
transmission above the threshold, will be blacklisted
for some time. Next, overall energy of the network is
calculated by taking average. If fluctuation beyond an
acceptable range (Say 5 to 10%) is traced, the node
will be finally titled as malicious node.
Following is the step-by-step Depiction of overall
Process:
Step 1: Record No. of requests of each node.
Step 2: Calculate variance of overall Nodes.
Step 3: If Requests (Node) > Threshold
Blacklist the Node ( for some time)
Step 4: Next, Calculate overall energy of the
network.
Step 5: Compare the energy with previously
calculated energy average.
Step 6: If fluctuation > 10%
Node is permanently titled as Malicious node
V.
CONCLUSION
The work in this paper is about to find out and classify
jamming attacks in 802.11b wireless networks. Types
of jamming detection and classification techniques has
been introduced in the literature. Most of them, To use
the individual parameters like signal strength, carrier
sensing time, and packet delivery ratio [1] to find the
jammer and to classify the jamming attacks type. The
announced result show by the authors are usually
marked the jamming regions. They do not classify
different jamming mechanism type. We put a multimodal scheme that models find the different jamming
attacks by using the correlation between three
parameters: Avg requests, Variance and Energy.
Based on, during training sessions which are then
compared with test sessions to detect and classify
jamming attacks. This proposed model helps to detect
different jammed regions for various type of jamming
attacks. In addition, it is uniformly effective for both
the protocol-aware and protocol-unaware jammers.
The produced results are not based on simulations, but
a test-bed was propounded to experiment in real
scenarios demonstrating significant enhancements in
previous results reported in the literature.
.
ISSN: 2231-5381
REFERENCES
[1]. KonstantinosPelechrinis, MariosIliofotou and SrikanthsV.
Krishnamurthy,Denial of Service Attacks in Wireless
Networks:
The
Case
of
Jammers,
IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL.
13, NO. 2, SECOND QUARTER 2011
[2]. Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai,DSAB –
A Hybrid Approach for Providing Security in
MANET,INTERNATIONAL
JOURNAL
OF
INFORMATION SECURITY SCIENCE, Vol.1, No.3 2012,
Ankara, Turkey.
[3]. Mahendra Kumar, Ajay Bhushan, AmitKumar,A Study of
wireless Ad-Hoc Network attack and Routing Protocol
attack,International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 2,
Issue 4, April 2012 ISSN: 2277 128X.
[4]. Arif Sari and Dr.BeranNecat,SECURING MOBILE ADHOC NETWORKS AGAINST JAMMING ATTACKS
THROUGH UNIFIED SECURITY MECHANISM,
International Journal of Ad hoc, Sensor & Ubiquitous
Computing (IJASUC) Vol.3, No.3, June 2012.
[5]. S SenthilKumaar, MaheshwariMangai, Needra Fernando, J
Vijay Daniel, R.Prabhu,A Survey of Various Attacks in
Mobile Adhoc Networks, IJCSMC, Vol. 2, Issue. 10,
October 2013, pg.171 – 185
[6]. KwangsungJu and Kwangsue Chung, Jamming Attack
Detection and Rate Adaptation Scheme for IEEE 802.11
Multi-hop Tactical Networks,International Journal of
Security and Its Applications, Vol. 6, No. 2, April, 2012
[7]. S.Ramesh , Prof. Ch. Anil Carie"Layer Model For Reducing
Malware Jamming Attacks"International Journal of
Computer Trends and Technology (IJCTT),V4(10):34503456 October Issue 2013 .ISSN 2231-2803
[8]. Ashok M. Kanthe, Dina Simunic and MarijanDjurek, Denial
of Service (DoS) Attacks in Green Mobile Ad–hoc
Networks, 788 MIPRO 2012/CTI
[9]. SARAH AHMED & S.M. NIRKHI, A FUZZY APPROACH
FOR FORENSIC ANALYSIS OF DDOS ATTACK IN
MANET, International Conference on Computer Science and
Information Technology, 10th, March 2013, Hyderabad,
ISBN: 978-93-82208-70-9
[10]. Jan von Mulert, Ian Welch, Winston K.G. Seah,Security
Threats and Solutions in MANETs: A Case Study using
AODV and SAODV, Preprint submitted to Elsevier February
3, 2012
[11]. Tapan P. Gondaliya, ManinderSingh,Intrusion detection
System for Attack Prevention in Mobile Ad-hoc
Network,International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 3,
Issue 4, April 2013 ISSN: 2277 128X.
http://www.ijettjournal.org
Page 390
Download