Secure Message Exchange to Protect Against DDoS Shivati Mahajan , Khushneet kaur

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014
Secure Message Exchange to Protect Against DDoS
in WSNs – A Review
Shivati Mahajan#1, Khushneet kaur#2
#1
Research Scholar ECE Department, Doaba Institute Of Engineering &Technology Kharar(Mohali)Punjab,India
Associate Professor ECE Department,Doaba Khalsa Trust Group Of Institute Rahon(Nawashar)Punjab,India
*2
Abstract-In this paper, we are proposing a new scheme to
protect against DDoS attack on WSNs using a novel message
passing interface. The proposed technique will use an
neighbour integrity based message exchange technique to
avoid the unauthorized nodes from sending the data in the
network. Each node will be individually capable of scanning
the input data packets to know the data streams sources. An
integral source will be sending a security message with special
type of information in the message transmissions. The
receiving node will get the integrity of the transmitting source
by keeping an eye over these integrity packets. This
information will use various mathematics and statistics
formulas to create and verify the integrity messages.
Keywords—DDoS (Distributed Denial Of Service), WSN,
SAD-SJ(Self Decentralized Solution –Self Jamming)
I.
INTRODUCTION
Wireless Sensor Network forms a network using sensor
nodes .The sensor nodes consist of one or more sensors that
communicate with each other via radio waves. The sensors
is device that has sufficient digital to analog converter
memory ,power supply & battery. The sensor node have a
various devices such as analog to digital converter, a radio
transreceiver, central processing unit, antenna. Sensors
nodes is a collection of sensors which perform basic
operation such as sensing, data processing &
communication. The sensor node can gather the
information from the environment The real time event
information is also provided by the sensors. TDMA is used
most of the time in WSN for data communication.
WSN deployed in many field such as in weather
forecasting, military areas, medical field, home appliances,
industries, shopping complex, tracking. In weather
forecasting it can provide the information about the change
of environment such as it provide the information of
change of temperature in environment. In medical field it
provide the information about the patient health it monitor
the patient body so that proper treatment of patient is done.
Military field can utilize the WSNs for the purpose of
tracking the activities in some sensitive area.
ISSN: 2231-5381
WSN Topology can be of any type it can varies from star
topology to mesh topology. The technology development
in wireless has build up the interest in WSN.As sensor
nodes has a sufficient amount of memory, battery &
ciphering so it can install in hills and villages. In captious
condition such as in military field or monitoring patient
there is expand of use of sensors. The application of
sensors network in military applications and the enough
power and memory, dispute the security purpose
WSN Security is the significant issue in now a days. The
WSN Security can be avert from beset in many ways .WSN
can be beset by blocking the communication between
sensor node and base station. In this type of beset analog
signal or digital signal is sent by the hacker for jamming
the network in form of DOS(Denial of Services).DOS is
achieve by transferring flood of packets to network or to
base station. The information between base station and
other nodes can be avert setting up incorrect routing
information so that traffic goes to the wrong destination or
node.
In this review paper we are concerned with
DDOS(Distributed Denial Of Service) attack. The DDOS
attack can be achieve by transferring flood of packets by
the multiple hacker. In case of DDOS attack the sensor
node was unable to communicate with each other. DDOS
jam the WSN network
II.
LITERATURE REVIEW
Marco Tiloca et. al. proposed industrial applications and
factory automation for Wireless Sensor Networks[1]. The
authors have worked closer to TDMA based WSNs. They
have proposed an algorithm named SAD-SJ for the
protection against DDoS attack on networks. Md. Monzur
Morshed et. Al. proposed Cluster Based Secure Routing
Protocol (CBSRP) is a MANET routing protocol with
ensurity of secure key management and secure
communication taking place between mobile nodes[2].
They have used digital signature and hashing technique to
facilitate the secure communications. Seuwou. P. et. al.
have proposed Effective Security as an ill-defined Problem
in Vehicular Ad hoc Networks (VANETs) [3]. They have
worked upon vanet security to protect against various
attacks. Qian.yi et.al. have worked on the performance
http://www.ijettjournal.org
Page 183
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014
evaluation of a secure MAC Protocol for vehicular
network[4].They have proposed an quality of service (call
priority) based MAC protocol to enhance the security of
the VANETs. Javed.M.A. et. al. have developed a Geo
casting technique in an IEEE802.11p based vehicular Ad
hoc network for road traffic management[5]. A location
aware packet transmission based technique is used to
protect against various VANET security issues. Hung c.c.
et.al. proposed Mobility Pattern Aware Routing for
Heterogeneous Vehicular Networks[6]. According to this
paper traditional ad hoc routing protocols are not well
suited for these high dynamic network. In this paper they
propose a new Heterogeneous Vehicular Network (HVN)
architecture and a mobility pattern aware routing for HVN.
Dias .A.J. et.al. have created a Test bed environment based
Performance Evaluation of Routing Protocols for Vehicular
Delay-Tolerant Networks[7].
III.
PROBLEM FORMULATION
Wireless Sensor Networks (WSNs) are currently used in
many application scenarios, including industrial
applications and factory automation. In such scenarios,
Time Division Multiple Access (TDMA) is typically used
for data communication among sensor nodes. However,
TDMA-based WSNs are particularly prone to DoS and
DDoS attacks which can stop the whole communication
between sensor nodes[8]. In the existing paper, authors
have presented SAD-SJ (Self-Adaptive Decentralized
solution against Selective Jamming) WSN protocol, a selfadaptive and decentralized MAC-layer solution against
selective jamming in TDMA-based WSNs[9]. SAD-SJ is
an effective WSN secure protocol against selective
jamming attach, a specific form of Denial of Service attack,
requires sensor nodes to rely only on local information, and
allows them to join and leave the network without
hindering other nodes activity[10][11]. But this protocol is
not capable of protecting against selective jamming, in
order to address multiple nodes attempting to join the
network at the same time i.e. Distributed Denial of Service
(DDoS) attack[12]. The existing protocol can be improved
to protect against selective jamming attack in order to
multiple nodes, a specific and severe DDoS attack.
IV.
PROPOSED SYSTEM
In the research project, we propose an effective
improvement in SAD-SJ method to make it capable of
protecting the selective jamming, in order to address
multiple nodes attempting to join the network at the same
time i.e. Distributed Denial of Service (DDoS) attack. The
existing protocol will be improved to protect against
selective jamming attack in order to multiple nodes, a
specific and severe DDoS attack. This protocol will
generate multiple random unique codes and add them to the
inter communication packets, at the sender’s side. On the
receiver side, these unique codes will be verified using the
unique code verification calculation method. This will
ISSN: 2231-5381
protect the nodes by discarding the non-matching packets
from external nodes attempting to launch DDoS on WSN.
V.
METHODOLOGY
At first stage, a detailed literature study would be
conducted on the denial of service or distributed denial of
service attacks and solution for WSNs. Literature study
will lead us towards refining the structure of the proposed
security solution design. Afterwards, the proposed solution
will be implemented in NS2 simulator and a thorough
performance analysis would be performed. Obtained results
would be analysed and compared with the existing
techniques. We will start our research project by
conducting a detailed literature review on the DDoS attack
in case of WSNs to know the problem in detail. Then, a
detailed security mechanism would be designed to prevent
the DDoS multiple selective jamming attack in WSNs. The
simulation would be implemented using Network
Simulator (NS2). The obtained results would be examined
and compared with the existing security mechanism to
address the similar issues.
VI.
CONCLUSION
The proposed method is based on integrity message
transfers for the evaluation of the real neighbours and
malicious nodes, from which it is receiving the data
packets. Every WSN node will be individually capable of
detecting the malicious nodes launching DDoS attack and
will block them. In future, we will develop the algorithm
and implement it in NS2 simulation with sufficient node
density running over AODV protocol.
REFERENCES
[1] Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe
Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against
Selective Jamming attack in Wireless Sensor Networks”, ETFA, vol. 18,
pp. 1-8, IEEE, 2013.
[2] Md. Monzur Morshed, Md. Rafiqul Islam, “CBSRP: Cluster Based
Secure Routing Protocol”, IACC, vol. 3, pp. 571-576, IEEE, 2013.
[3] Patrice Seuwou, Dilip Patel, Dave Protheroe, George Ubakanma
“Effective Security as an ill-defined Problem in Vehicular Ad hoc
Networks (VANETs)”.
[4] Yi Qian ,Kejie Lu , and Nader Moayeri“PERFORMANCE
EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR
NETWORKS” (2008 IEEE)
[5] Muhammad A. Javed and Jamil Y. Khan “A Geocasting Technique in
an IEEE802.11p based Vehicular Ad hoc Network for Road Traffic
Management”. (2010).
[6] Chia-Chen Hung, Hope Chan, and Eric Hsiao-Kuang Wu “Mobility
Pattern Aware Routing for Heterogeneous Vehicular Networks”( IEEE
WCNC 2008).
[7] João A. Dias, João N. Isento, Vasco N. G. J. Soares, FaridFarahmand,
and Joel J. P. C. Rodrigues “Testbed-based Performance Evaluation of
Routing Protocols for Vehicular Delay-Tolerant Networks” (2011 IEEE).
http://www.ijettjournal.org
Page 184
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014
[8] A. Proano and L. Lazos, “Selective Jamming Attacks in Wireless
Networks”, Proceedings of the 2010 IEEE
[9]R. Sokullu, I. Korkmaz and O. Dagdeviren, “GTS Attack:An
IEEE802.15.4 MAC Layer Attack in Wireless SensorNetworks”,
International Journal On Advances in Internet Technologies, Vol. 2, N. 1,
pp. 104-114, 2009.
[9] D.R. Raymond and S.F. Midkiff, “Denial-of-Service in Wireless
Sensor Networks: Attacks and Defenses”, IEEE Pervasive Computing,
Vol. 7, N. 1, pp. 74-81, 2008.
[10] R. Pickholtz, D. Schilling and L. Milstein, “Theory of Spread
Spectrum Communications - A Tutorial”, IEEE Transactions on
Communications, Vol. 30, N. 5, pp. 855-884, 1982.
[11] L. Tang, Y. Sun, O. Gurewitz and D. B. Johnson,“EMMAC:a
dynamic multichannel energy-efficient MACprotocol for wireless sensor
networks”, Proceedings of theTwelfth ACM International Symposium on
Mobile Ad HocNetworking and Computing (MobiHoc ’11), pp. 23:123:11, 2011.
[12] Institute of Electrical and Electronics Engineers, Inc.NewYork, IEEE
Std.802.15.42006,IEEEStandardforInformationtechnologyTelecommunica
tions andinformation exchange between systems - Local and metropolitan
area networks - Specic requirements Part15.4: Wireless Medium Access
Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate
Wireless Personal Area Networks (WPANs), September
2006.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 185
Download