International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 A Review on Denial of service attacks and their counter measures over MANETs Soni Sindhal#1, Samarth kapoor#2 Dept. of Computer Science and Engg. Swami Devi Dyal Institute Of Engg. & Tech. Panchkula(Haryana),India. Abstract—Security and QoS in ad hoc wireless networks have recently become very important and actively researched topics because of a growing demand to support live streaming audio and video in civilian as well as military applications. The wireless links between nodes are highly susceptible to link attacks, which include passive eavesdropping, active interfering, leaking secret information, data tampering, impersonation, message replay, message distortion, and denial of service. Eavesdropping might give an adversary access to secret information, violating confidentiality. Active attacks might allow the adversary to delete messages, to inject erroneous detail, to modify messages, and to impersonate a node, thus violating availability, integrity, authentication, and nonrepudiation. Ad hoc networks do not have a centralized piece of machinery such as a name server or a base station, which could lead to a single point of failure and, thus, make the network that much more vulnerable.A malicious node could attempt to flood the network with its own unicast data packets, potentially using many different destination addresses. In this paper, we provide a comprehensive overiew on different types of denial of sevice attacks and their prevention techniques over Wirless Mobile Ad hoc NETworks. being solely by interactions among their constituent wireless nodes, and it is only such interactions that are used to provide the necessary administration functions supporting such networks. Mobile ad-hoc networks offer unique versatility for certain environments and certain applications. Since no fixed infrastructure, including base stations, is prerequisite, they can be created and used any time, anywhere. Indeed, since all nodes are allowed to be mobile, the composition of such networks is necessarily time varying. Addition and deletion of nodes occur only by interactions with other nodes; no other agency is involved. Such perceived advantages elicited immediate interest in the early days among military, and rescue agencies in the use of such networks, especially under disorganized or hostile environments, including isolated scenes of natural disaster and armed conflict. Keywords— QoS, DOS, MANETs. I. INTRODUCTION Mobile ad hoc networks consist of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology control of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. Conventional wireless networks require as prerequisites a fixed infrastructure netwok with centralized administration for their operation. In contrast, socalled (wireless) mobile ad hoc networks, consisting of a collection of wireless nodes, all of which may bemobile, dynamically create awireless network amongst themselves without using any such administrative support [3, 4]. An ad hoc wireless network is a collection of two or more devices equipped with wireless communications and networking capability. For the latter scenario, an intermediate node is used to passes the packet from the source toward the destination. Such devices can communicate with another node that is immediately within their radio range or one that is outside their radio range. Ad hoc wireless networks are self-creating, selforganizing, and self-administering. They come into ISSN: 2231-5381 Figure 1 : Mobile Ad hoc Networks. A. Challenges Facing Ad Hoc Mobile Networks * Spectrum Allocation and Purchase Regulations regarding the use of radio spectrum are currently under the control of the FCC. Most experimental ad hoc networks are based on the ISM band. To prevent interference, ad hoc networks must operate over some form of allowed or specified spectrum range. Most microwave ovens operate in the 2.4GHz band, therefore can interfere with wireless LAN systems. Frequency spectrum is not only tightly controlled and allocated, but it also needs to be http://www.ijettjournal.org Page 67 International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 purchased. With ad hoc networks capable of forming vector routing is not designed for wireless networks, it and deforming on-the-fly, it is not clear who should is still applicable to packet radio networks since the pay for this spectrum. rate of mobility is not high. The bulky and heavy construction of these radios make them less mobile * Service Location, Provision, and Access once deployed. However, as mentioned in the previous While protocols are important for the correct operation chapter, advances in microelectronics technology have of an ad hoc wireless network, service location, enabled the construction of portable, and highly provision, and access are equally important. Should integrated mobile devices. Hence, ad hoc mobile we continue to assume that the traditional client/server networks are different from packet radio networks RPC paradigm is appropriate for ad hoc networks. Ad since nodes can move more freely, resulting in a hoc networks comprise heterogeneous devices and dynamically changing topology. Existing distancemachines and not every one is capable of being a vector and link-state-based routing protocols are server. The concept of a client initiating concept unable to cover up with such frequent link changes in requests to a server for execution and awaiting results ad hoc wireless networks, resulting in poor route to be returned may not be attractive due to limitations convergence and very low communication throughput. in bandwidth and power. Perhaps the concept of Hence, new routing protocols are needed. remote programming as used in mobile agents is more applicable since this can reduce the interactions * Multicasting exchanged between the client and server over the The explosion in the number of Internet users is partly wireless media. attributed to the presence of video and audio conference tools. Such multiparty communcations are * Security & Privacy enabled through the presence of multicast routing Ad hoc networks are intranets and they remain as protocols. The multicast backbone consisting an intranets unless there is connectivity to the Internet. interconnection of multicast routers that are capable of Such confined communications have already tunneling multicast packets through non-multicast countered attackers who are not common in the area. routers. Some multicast protocols use a broadcast-andNote that this is not the case for wired and wireless- prune approach to build a tree rooted at the source. last hop users. Through neighbor identity Others use core nodes where the multicast tree authenication, a user can know if neighboring are originates. All such methods rely on the fact that friendly or hostile. Information sent in an ad hoc route routers are static, and once the tree is formed, tree can be protected in some way but since multiple nodes nodes will not move. However, this is not the case in are involved, the relaying of packets has to be ad hoc wireless networks. authenicated by recognizing the originator of the paket * Energy Efficiency and the flow ID or label. Most existing network protocols do not consider * Media Access energy consumption an issue since they assume the Unlike cellular networks, there is a lack of centralized presence of static hosts and routers, which are global synchronization in ad hoc wireless networks. powered by mains. However, mobile devices today are Hence, FDMA and TDMA schemes are not suitable. mostly operated by batteries. Battery technology is In addition, many MAC protocols do not deal with still lagging behind microprocessor technology. The host mobility. As such, the scheduling of packets for lifetime of an Li-ion battery today is only 2-3 hours. timely transmission to support QoS is difficult. In ad Such a limitation in the operating hours of a device hoc wireless networks, since the same media are implies the need for power conservation. In particular, shared by multiple mobile ad hoc nodes, access to the for MANETs, mobile devices must perform both the common channel must be made in a distributed role of an end system (where the user interacts and fashion, through the presence of a MAC protocol. where user applications are executed) and that of an Given the fact that there are no static nodes, nodes intermediate system (packet forwarding). Hence, cannot depends on a centralized coordinator. The forwarding packets on the behalf of others will MAC protocol must contend for access to the channel consume power, and this can be quite significant for while at the same time avoiding possible collisions nodes in an ad hoc wireless network. with neighboring nodes. The presence of mobility, and hidden terminals problems must be accounted for B. Classification af Attacks when it comes to designing MAC protocols for ad hoc Nodes in MANET can be broken, malicious or selfish. wireless networks. Broken nodes become non functional due to some link failure so cannot forward the traffic that they earlier * Routing agree to forward. Malicious nodes aimed at disrupting The presence of mobility implies that links make and the network by dropping the packets or launching break often and in an indeterministic fashion. Note denial of service attacks. Selfish nodes hinder the that the classical distributed Bellman Ford routing routing by dropping packets in order to conserve their algorithm is used to maintain and update routing energy and bandwidth. MANET found applications in information in a packet radio network. While distance military, disaster relief operations etc as it is easy to ISSN: 2231-5381 http://www.ijettjournal.org Page 68 International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 deploy. In order to encourage its need in future it is * External attacks: In external attack the attacker important to ensure secure and reliable routing in wants to cause congestion in the network this can be MANET. Before providing security we need to know done by the propagation of fake routing information. attacks related to such networks. Security aspects were The attacker disturbs the nodes to avail services [4]. not considered when adhoc protocols were designed. * Internal attacks: In internal attacks the attacker Later researchers tried to incorporate security wants to gain the access to network & wants to mechanisms on existing routing protocols. Attacks can participate in network activities. Attacker does this by be classified into two broad categories[4]: some malicious impersonation to get the access to the network as a new node or by directly through a * Passive Attacks The attacker just snoops the network without present node and using it as a basis to conduct the attack [8]. disrupting the network operation. These attacks compromise the confidentiality of the data and tell which nodes are working in promiscuous mode. i. Eavesdropping: It is reading or snooping of messages by an unintended receiver. In MANET, the nodes share a wireless medium so nodes can easily overhear communication of the nodes within its transmission range. This attack can be prevented by using encryption. ii. Selfishness: A selfish node in order to save its battery life and resources does not participate in routing either by dropping the packets or not forwarding them. Figure 2: Example of External attack * Active Attacks Attacks in which attacker disrupts the normal operation of the network by fabricating messages, dropping or modifying packets, replaying packets or tunneling them to other part of the network. Basically the content of passing message is modified. These can be internal attacks and external attacks. Figure 3: Example of Internal attack Active attacks can be further classified corresponding to different layers in MANET. Figure 4: Categorization of Attacks [7]. ISSN: 2231-5381 http://www.ijettjournal.org Page 69 International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 II. Denial of Service (DoS) The denial of service threat produced either by an unintentional failure in the system or a malicious action forms a severe security risk in any distributed system. The classical way to create a DoS attack is to flood any centralized resource so that it no longer operates correctly or crashes. But in ad hoc networks, this may not be an applicable approach, due to the distribution of responsibility as well as the lack of a centralized resource. Radio jamming and battery exhaustion are two other ways in which service can be denied to other nodes and users. A distributed DoS attack is an even more severe threat. If the attackers have enough computing power and bandwidth to operate with, smaller ad hoc networks can be crashed or congested rather easily. Compromised nodes may be able to reconfigure the routing protocol or a part of it, such that they can send routing information very frequently, thus causing congestion and preventing nodes in gaining the latest information about the changed topology of the network. If the presence of compromised nodes and the compromised routing are not detected, the consequences to the network are severe, as the network may seem to operate normally to the other nodes. This kind of invalid operation of the network initiated by malicious nodes is called a Byzantine failure. For example, a compromised node could participate in a session but simply drop a certain number of packets, which may lead to degradation in the quality of service being offered by the network. In summary, some of the examples of Denial of Service attacks are: * SYN flooding : In this type of DoS attack, the adversary sends a large number of SYN packets to a victim node, spoofing the return address of the SYN packets. On receiving the SYN packets, the victim node sends back acknowledgement (SYNACK) packets to nodes whose addresses have been specified in received SYN packets and awaits for ACKs from the senders, which never arrive. If sufficient connections are established among multiple senders and the victim, it is likely that its memory resources may be exhausted (table overflow), owing to the currently open connections and the victim cannot now accept a new legitimate request for a connection. * Jamming : This type of DoS attack is initiated by a malicious node after determining the frequency of communication used by the receiver and using the same frequency to send data to the receiver thereby interfering with its operation. Frequency hopping is an established technique to get around jamming attacks. * Distributed denial of service attack : This type of attack is launched by a group of compromised nodes who are part of the same network and who collude together to bring the network down or seriously affect its operation. ISSN: 2231-5381 III. RELATED WORK MANET is very much popular due to the fact that these networks are dynamic, infrastructure less and scalable. Despite the fact of popularity of MANET, these networks are very much exposed to attacks [5]. Wireless links also makes the MANET more susceptible to attacks which make it easier for the attacker to go inside the network and get access to the ongoing communication [6]. Different kinds of attacks have been analyzed in MANET and their affect on the network. Attack such as gray hole, where the attacker node behaves maliciously for the time until the packets are dropped and then switch to their normal behavior [7]. Security is one of the most primary concerns in MANET for the protection of communication and security of information. For network operation it is necessary to perform routing and packet forwarding. Hence numbers of security mechanisms has been made to counter measure the malicious attacks. In cryptographic approaches like S-AODV [8] and Adriane [9], the routing packets are encrypted using symmetric or asymmetric algorithm and hence external or inside attacker cannot modify the packets. However the problem with cryptographic approaches is the increased consumption of processing power and flooding attack can also be launched without forging the packets. Dahill et al. [10], proposed ARAN, a routing protocol for ad hoc networks that uses authentication and requires the use of a trusted certificate server. In ARAN end-to-end authentication is achieved by the source by having it verify that the intended destination was reached. In this process, the source trusts the destination to choose the return path. The source begins route instantiation by broadcasting a Route Discovery Packet (RDP) that is digitally signed by the source. Following this, every intermediate node verifies the integrity of the packet received by verifying the signature. The first intermediate node appends its own signature encapsulated over the signed packet that it received from the source. All subsequent intermediate nodes remove the signature of their predecessors, verify it and then append their signature to the packet. One primitive solution to vanish the RREP forging is to disable the ability to reply in a message of an intermediate node, so all reply messages should be sent out only by the destination node [11]. This method avoid intermediate node to reply which avoid in certain case the Black Hole and implements the secure protocol. This increase the routing delay in large networks and a malicious node can take advantage by replying message instead of destination node. So for this one or more routes are used by the intermediate nodes which replay the RREQ messages to confirm the routes from intermediate nodes and http://www.ijettjournal.org Page 70 International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 destination nodes for sending out the data packets. In understanding of the key attack factors and how to case if it does not exist, the reply messages is evaluate the impact of an attack, protocol designers discarded from intermediate node and alarm messages can better determine if the overhead of deploying a are sent to the network. This method avoids the Black counter-strategy is merited given the damage that an Hole problem thus preventing the network from attack can inflict. malicious node. This will result in great delay IV. CONCLUSION AND FUTURE WORK especially in large networks and in addition the attacker can fabricate a reply message on behalf of the In this paper, We covered general denial of service Various possible threats and attacks on ad hoc destination node. networks and their possible prevention. The security In [12] Aleksandar Kuzmanovic and Edward W. schemes that govern trust among communicating Knightly have analyzed several DoS traffic patterns entities are collectively known as trust management. for different TCP Variants such as TCP-Reno, New Here trust means the confidence of an entity on Reno, Tahoe and SACK ( Selective another entity based on the expectation that the other Acknowledgement ) and showed that a realistic threat entity will perform a particular action important to the to today’s Internet is low-rate DoS attacks and for one who trusts, irrespective of the ability to monitor or small Round Trip Time (RTT) flows out of a control that other entity. In the trust management heterogeneous RTT environment , are more vulnerable system, reputation system and other trust-based to low-rate DoS attacks. RED and RED –PD like systems, route selection is based on the sending node’s mechanisms unable to prevent DoS-initiated prior experience with other nodes in the network. The synchronization but not eliminate the effectiveness of dynamic feedback mechanisms are usually applied on the attack. the current ad-hoc routing protocols to rate the trust In [13] Ferdous A. Barbhuiya et. al. summarize that about other nodes in the network and make routing Transmission Control Protocol (TCP) is a transport decisions based on the trust matrix, which is formed layer protocol which provides flow control, according to the evidence collected from previous congestion avoidance and error control. TCP is interactions. By incorporating the dynamic feedback designed to provide the reliable end to end byte stream mechanism in the routing protocol, misbehaved nodes communication and little or almost no consideration are identified and avoided to forward packets. In this was given to the fact that algorithms used in TCP can way, misbehavior can be mitigated. be exploited by attackers while designing this References protocol. Low rate TCP-targeted denial of service attack is a cleverly crafted attack in which an attacker [1] Goyal, Priyanka, Vinti Parmar, and Rahul Rishi. "Manet: vulnerabilities, challenges, attacks, application." IJCEM exploits congestion avoidance algorithm and International Journal of Computational Engineering & uniformity of minimum Retransmission Time out Management 11 (2011): 32-37. period in Transmission Control Protocol. optimistic [2] Shanthi, N., L. Ganesan, and K. Ramar. "STUDY OF acknowledgement for any misbehaving TCP receiver DIFFERENT ATTACKS ON MULTICAST MOBILE AD is suggested for detection and mitigation of Induced HOC NETWORK." Journal of Theoretical & Applied Information Technology 6.4 (2009). Low rate TCP-targeted attack . This solution mitigates this Induced Low rate TCP-targeted attack by stopping [3] Pani, N. K., Mishra, S., Secure Hybrid Routing for MANET Resilient to Internal and External Attacks, ICT and Critical optimistic acknowledgement. In [14], the author disscuses the two type of attack on adhoc network. The first on is Jelly Fish and second one is Black Hole attack.Significant progress has been made towards making ad hoc networks secure and DoS resilient. In this paper, the author made the design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause. JellyFish attack, is targeted against closed-loop flows such as TCP. This attack is protocol-compliant and yet has a devastating impact on the throughput of closedloop flows, such as TCP flows and congestioncontrolled UDP flows. These attacks are studied in a variety of settings and have provided a quantification of the damage they can inflict. As such a partitioned system is clearly undesirable, author also considered fairness measures and the mean number of hops for a received packet, as critical performance measures for a system under attack. The main guidelines are provided for protocol designers who are developing DoS-resilience mechanisms: with a better ISSN: 2231-5381 Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India, Springer International Publishing, 2014, pp. 449-458. [4] Tarunpreet Bhatia and A.K. Verma, “Security Issues in Manet: A Survey on Attacks and Defense Mechanisms”, International Journal of Advanced Research in Computer Science and Software Engineering, 3 (6), June - 2013, pp. 1382-1394. [5] S. Lu, L. Li, K.Y. Lam, L. Jia, “SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.,” International Conference on Computational Intelligence and Security, 2009. [6] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile AdHoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007 [7] S.Marti, T.J.Giuli, K.Lai, M.Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”. [8] S. Yi and R. Kravets, Composite Key Management for AdHocNetworks.Proc. Of the 1st Annual InternationalConference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), pp. 52-61, 2004. [9] Hu, Y., Perrig, A., & Johnson, D. (2002). Ariadne: A Secure On-Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta http://www.ijettjournal.org Page 71 International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 2- June 2015 [10] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding Royer, “Secure routing protocol for Ad-Hoc networks,” In Proc. of 10th IEEE International Conference on Network Protocols, Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA. Pp.78- 87, ISSN: 1092-1648, 12-15 Nov. 2002. [11] Hongmei Deng, Dharma P. Argawal, “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, October 2002. [12] Aleksandar Kuzmanovic and Edward W. Knightly, “Low Rate TCP Targeted Denial of Service Attacks” SIGCOMM’03, August 25-29, 2003. [13] Ferdous A. Barbhuiya, Vaibhav Gupta, Santosh Biswas and Sukumar Nandi, “Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack” IEEE Sixth International Conference on Software Security and Reliability, Oct. 2012. [14] Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly , “Impact of Denial of Service Attacks on Ad Hoc Networks, ” IEEE/ACM transactions on networking, VOL. 16, NO. 4,pp no 791-802, Aug 2008. ISSN: 2231-5381 http://www.ijettjournal.org Page 72