Performance Evaluation of Conditional Active Rreq in Manet

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 5 – Sep 2014
Performance Evaluation of Conditional Active Rreq
Flooding-Filter Based Prevention Method for AODV
in Manet
Neha Kamdar #1, Neeraj Paliwal
*2
M-Tech Scholar , Associate Proff.
Department CSE ,Oriental University
Indore (M.P), India
Abstract— Without the management of centralized unit, mobile
ad hoc networks (MANETs) are vulnerable to security threats
from flooding attacks launched through compromised nodes or
intruder. Whenever a source node needs a data session with a
destination node, it disseminates a route request (RREQ)
message to its neighbors in a hop-by-hop manner. A crucial type
of flooding attacks called RREQ flooding appears to be
inevitably proliferated in wireless networks. Within the RREQ
flooding attack, attackers would launch immense RREQ packets
with out-of-domain IP address as its destination node.[1]
Forwarding services conducted by all intermediate nodes exhaust
their energy and processing resources. This proposed approach
can suppress redundant RREQ packets using the co-operation of
destination node and neighbor nodes within one hop range of the
attacking node.This proposed approach and configure all
relevant system aspects in a concise fashion for qualitative
analysis. As of quantitative viewpoint, relevant network
simulations were conducted to validate the proposed scheme
using an NS2. The experimental result reveals that the proposed
CARF-F can be applied to economically and effectively elongate
the operational lifetime of MANETs under flooding attack. [2]
Keywords—MANET; AODV, CARF-F (Conditional Active
RREQ Flooding-Filter), RREQ (Route Request)
I. INTRODUCTION
A mobile ad hoc network (MANET) is a wireless
LAN(Local Area Network) model without the need of central
base stations and operated as a self-organized, dynamically
changing multi-hop network. MANETs can be applied in
during natural catastrophes, for military applications and
conducting geographic exploration [3,4]. Mobile and wireless
devices belonging to a MANET are usually called mobile
nodes. Nodes are characterized by high mobility, low power,
limited storage, limited transmission range and finite energy
budget without recharging gears. Mobile nodes communicate
through bi-directional radio links and data transmission is a
key challenge. MANET communication events are called
sessions.Two communicating parties, namely the source node
and the destination node comprise a session pair (or source–
destination pair). A mobile node can communicate effectively,
but when flooding in the network is minimized. Based on a
hop-by-hop routing scheme, the AODV (Ad hoc On-Demand
Vector) routing protocol offers quick adaptation to dynamic
links, low processing and memory overhead for CARF-F.[5]
When a source node needs a route to a destination, it
disseminates a route request (RREQ) message to its
ISSN: 2231-5381
neighbors. Every node receiving the message creates a mobile
ad hoc network (MANETs) are usually formed by a group of
mobile nodes, interconnected via wireless links, which is
agreed to cooperate and forward each other’s packet. One of
the basic assumptions in the design of routing protocols in
MANETs is that every node is honest and cooperative. [6]
Fig. 1 Example of a simple ad-hoc network with three participating nodes
That means, if a node claims it can reach another node by a
certain path or distance, the claim is trusted/true. Similarly, if
a node reports a link break, the link will no longer be used.
While this assumption can fundamentally facilitate the design
and implementation of routing protocols, it meanwhile
introduces a vulnerability to several types of denial of service
(DOS) attacks and node deopping, all this problem resolved
by using this scheme CARF-F [7], particularly packet
dropping attack. To launch such attacks, a malicious node can
stealthily drop some or all data or routing packets passing
through it. Due to the lack of physical protection and reliable
medium access mechanism, packet dropping attack represents
a serious threat to the routing function in MANETs. A foe can
easily join the network and compromise a legitimate node,
then subsequently start dropping packets that are expected to
be relayed in order to disrupt the regular communications. As
a result, all the routes passing through this node fail to
establish a correct routing path between the source and
destination nodes.[8]
II. RELATED STUDY
Significant works have been done in securing the ad hoc
network. A few researches defined the method for secure
routing, but secure routing also can not able to handle the
flooding attack.
The first flooding attack prevention(FAP) method was
proposed in [9]. In their paper, first they described RREQ
flooding and data flooding. This was the first paper that
http://www.ijettjournal.org
Page 206
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 5 – Sep 2014
addressed the prevention of flooding attack in ad hoc network.
The authors proposed the separate approach for RREQ
flooding and data flooding. To oppose the RREQ flooding,
they defined the neighbor suppression method which
prioritizes the node based on the number of RREQ
acknowledged. A node gets higher priority if it sends less
numbers of RREQ packets and defined the threshold rate. To
deal with data flooding they used path cutoff method. In this
method when a node identifies that sender is originating data
flooding, then it cut off the path and sends the route error
message. During this way the attack is prevented up to some
extent, but the disadvantage of this method is flooding a
packet still exists in the network. This limitation of FAP is
eliminated by [10] presented threshold prevention. In this
method they defined the fixed threshold value for every node
in the network. Now if any node receives the RREQ flooding,
packet more than the threshold value, then the sender is
assumed as an attacker and all the packets from an attacker is
discarded by the receiver node. This method eliminates the
flooding, packet but if the intruder has the idea about the
threshold value, then it can bypass the TP mechanism. A usual
node with high mobility is treated as the malicious node.
In [11], the author proposed the distributive approach to
resist the flooding attack. In this method they have used the
two
threshold
values;
RATE_LIMIT
and
BLACKLIST_LIMIT. If the RREQ count of any node is less
than RATE_LIMIT then the request is processed otherwise
check whether it is less than BLACKLIST_LIMIT, and if yes,
then black list the node, but if the count is greater than
RREQ_LIMIT and less than BLACKLIST_LIMIT then put
the RREQ in the delay queue and process after queue time out
occurs. This method can Handel the network with high
mobility.
In [12], the author analyzed the flooding attack in
anonymous communication in the network. They used the
threshold tuple which consist of three threshold components:
transmission, blacklist and white listing threshold. If any node
generates RREQ packet more than transmission threshold,
then its neighbor discards the packet if it crosses the
transmission threshold more than blacklist threshold then it
black list the node.
III. PROBLEM DOMAIN
The Flooding is the active category based network attack
whose aim is to make the network congested by some fake
route request (RREQ) packets. In this scenario when a route
initiated route discovery then the source node sends RREQ
packet to its neighbors and waits for a time for its reply. The
node is not having any information about the behaviour of its
neighbour. The neighbors distance is taken as a hop count.
Thus if the node is having smallest hop count the packet is
forwarded to it[13]. During this process of traditional routing
the verification of legitimate node condition is not involved
and hence some new node will destruct the actual working of
the network by flooding the fake RREQ packets to the
ISSN: 2231-5381
network. By this packets the actual packet route discovery
gets affected and which later makes denial of service (DOS)
attacks. Thus, in the absence of any malicious packet removal
schemes the network is getting congested with these fake
packets. Traditional schemes are not capable of identifying
these packets. So later on several improvements over the
AODV protocol is proposed[14]. This paper studies various
techniques proposed for overcoming the flooding attack
situation and measured that there are some issues which
remains unsettled.
IV. PROPOSED CARF-F ARCHITECTURE & METHOD
All the nodes in an ad hoc network are categorized as
friends, associates or strangers based on their relationships
with their neighboring nodes. During network initiation all
nodes will be strangers to each other node. A trust estimator is
used in each node to evaluate the trust level of its neighboring
nodes.That trust level is a function of various parameters like
length of the association, proportion of the number of packets
forwarded successfully by the neighbor to the total number of
packets sent to that neighbor, proportion of number of packets
received intact from the neighbor to the total number of
received packets from that node on that time, and average
time taken to respond to a route request etc. Consequently, the
neighbors are categorized into friends (most trusted),
acquaintances (trusted) and strangers (not trusted).
In an ad hoc network, the link of a node i to its neighbor node
j may be any of the subsequent varieties
A. Node i may be a stranger (S) to neighbor node j :
Node I actually have ne’er sent/received messages to/from
node j. Their trust levels between one another are going to be
terribly low. Any new node getting in to ad hoc network will
be a stranger to all or its neighbors. There are unit high
probabilities of malicious behavior from stranger nodes.
B. Node i is an exponent (A) to neighbor node j
Node I actualy have sent/received few messages from node
j. Their mutual trust level is neither too low nor too high to be
reliable. The probabilities of malicious behavior can go to be
observed.
C. Node i is a friend (F) to neighbor node j :
Note i sent/received plenty of messages to/from node j. The
trust levels between them area unit are reasonably high.
chance of misbehaving nodes is also teribly less.
The above relationships are represented as a Friendship
table for each node in an ad hoc network. Consider the node
n0 in Figure 1. The threshold trust level for a stranger node to
become an acquaintance to its neighbor is represented by Tacq
and the threshold trust level for an acquaintance node to
become a friend of its neighbour is denoted by Tfri.This idea
provide a uniform approach for mimizing node dropping and
perform the process with high accuracy and avoid the problem
of misbehaving .This approach generate a better result as a
outcome.
http://www.ijettjournal.org
Page 207
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 5 – Sep 2014
Figure 2 : Proposed CARF-F Based Flooding Attack Prevention and Removal
The relationships are represented as
R (ni →nj) = F when T ≥ Tfri
R (ni →nj) =A when Tacq ≤ T < Tfri
R (ni →nj) =S when 0 < T < Tacq
5. Else
6. Forward the RREQ packet
7. If node =A‘ is an acquaintance and Z [A] = 0 then
8. Increment X [A]
9. If X [A] > Xra
10. Drop the RREQ packet and set
Z [A] = 1
11. Else
12. Forward the RREQ packet
13. If node =A‘ is a stranger and Z [A] = 0 then
14. Increment X [A]
15. If X [A] > Xrs
16. Drop the RREQ packet and set
Z [A] = 1
17. Else
18. Forward the RREQ packet
End
Figure 3: Nodes in an Ad hoc Network
A. Proposed Algorithms
CARF-F Algorithm:
Begin
If an intermediate node receives RREQ flooding, packet from
Node A then
1. If node =A‘ is a friend and Z [A] = 0 then
2. Increment X [A]
3. If X [A] > Xrf
4. Drop the RREQ packet and set
Z [A] = 1
ISSN: 2231-5381
The packets are successfully received by n0 else if Xrs < X,
the packets are dropped. Again, if the n3 is sending X packets
to n0, is compared with the threshold value of acquaintance. If
Xra > X then the packets are successfully received by n0. Else
if Xra < X, the packets is dropped. Similarly the transfer of X
packets from n4 is compared with the threshold value for
friend (Xrf). The same procedure is followed for preventing
DATA flooding attacks from the neighboring nodes.
http://www.ijettjournal.org
Page 208
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 5 – Sep 2014
A. Energy Description with respect to time (PDR) –
The no of nodes packets received at the destination to the
number of packets sent from the source. When flooding is
judged it shows uniform result.
B. RREQ packet with respect to Nodes:
Graph Summary: As turnout live the transmission potency in
terms of which success, delivered packets in unit time for a
mere channel information measure. The higher than result
shows the effectiveness of the steered approach, whereas
compare it with the prevailing. The graph interprets the
constant turnout for many cases that justify the approach.
D. Node Overhead:
Routing Load is that the quantitative relation of the local
variety of the routing packets to the full variety of received
information packets at the destination. The number of batteries
consumed generated (in bits) per information traffic delivered
(in bits). It ought to be taken in terms of the additional load
started whereas executing the steered approach than the
normal protocol load for the system.
Graph Summary: As the PDR ratio is used to identify the
performance of the approaches using the packet delivery
ration. It is the ration of the number of packets sent to the
amount of packet received. In ideal condition it ought to be
high as possible.
C. Exist RREQ
It is one of the dimensional parameters of the network,
which gives the fraction of the channel capacity used for
useful transmission selects a destination at the beginning of
the simulation, i.e., the information whether or not data
packets correctly delivered to the destinations.
ISSN: 2231-5381
Graph Summary: The above graph verifies its results by
uniform node with the suggested approach. It also shows that
the execution of nodes using the proposed method is quite
uniform with comparison with other methods.
V.
CONCLUSION
This analytical work planned a distributive approach to
known and stop the flooding attack. The effectiveness of the
planned technique depends on the choice of threshold values.
Although, the idea of delay queue reduces the likelihood of
accidental blacklisting of the node, however it conjointly
delays the detection of misbehaving node by permitting him
sends more packet until delay queue time out happens. This
http://www.ijettjournal.org
Page 209
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 5 – Sep 2014
analysis addresses related works on security problems and
trust institution schemes. A proposal to effectively stop
flooding attack exploitation AODV Protocol is mentioned. An
improved understanding and modelling of the protection
attacks is required in MANETs if economical, secure routing
algorithms are to be built into the network [15]. Future work
of this analysis is optimizing price of threshold and improve
their performance this distributed approach to identifying the
flooding attack. The effectiveness of the planned technique
depends on the choice of threshold values. Although, the
concept of delay queue reduces the probability of accidental
blacklisting of the node, but it also delays the detection of
misbehaving node by allowing him sends more packet until
delay queue time out occurs. This works on security issues and
trust establishment schemes. A proposal to effectively detect
flooding attack using AODV Protocol is discussed. A better
understanding and modeling of the security attacks is needed
in MANETs if efficient, secure routing algorithms are to be
built into the network[16]. Future work of this research can be
optimized value of threshold and improve their performance.
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
VI. FUTURE WORK
Some problems and concepts that remain unaddressed can
be performed in the future. This system can further be
extended to implement CARF-F scheme in real-time networks
where it has to deal with the flooding problem. Such as with
the help of pre-emptive approach more information can be
added to exact, timely analysis node dropping minimization
problem can easily solve. We are also working towards
embedding the developing source code of our proposed
scheme in NS2. In our proposed scheme so as to use the
benefits of an approach like open source.
ACKNOWLEDGMENT
This research work is self financed but recommended from
the institute so as to improve the CARF-F with current
techniques in Ad Hoc network using this method. Thus, the
authors thank the anonymous reviewers for their valuable
comments, which strengthened the paper. The authors also
wish to acknowledge institute administration for their support
& motivation during this research. They also like to give
thanks to Mr.Neeraj Paliwal for discussion regarding the
situational awareness system & for producing the approach
adapted for this paper.
[14]
[15]
[16]
[17]
P.Papadimitratos and Z. Hass and P.Samar. The Secure Routing
Protocol (SRP) for Ad hoc Networks. Draft-papadimitratos-securerouting-protocol-00. Text, Dec.2002.
Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang: Resisting
Flooding Attacks in Ad Hoc Networks. Coding and Computing. ITCC
2005. International Conference on Information Technology, Volume 2,
Issue, April 2005, 657 – 662.
A. A. Pirzada, A. Datta and C. McDonald, Incorporating Trust and
Reputation in the DSR protocol for Dependable Routing, Computer
Communications, Special issue on Internet Communications Security,
Vol. 29, pages 2806-2821, Elsevier Press, 2006.
Revathi Venkataraman, M. Pushpalatha, Security in Ad Hoc Networks:
An extension of dynamic Source Routing in Mobile Ad Hoc Networks.
In proceedings of the 10th IEEE International Conference on
Communication Systems, Singapore, 2006.
C.Siva Ram Moorthy, B.S. Manoj: Ad hoc Wireless Networks
Architectures and Protocols, Prentice Hall, 2004.
Y.Sun et al., Defense of trust management vulnerabilities in distributed
networks, IEEE Communications Magazine, February 2008.
Y.Sun et al., Information Theoretic Framework of Trust Modeling and
Evaluation for ad hoc networks. IEEE JSAC, Vol. 24, no. 2, Feb.2006.
Venkat Balakrishnan et al. Mitigating Flooding attacks in Mobile Ad
hoc Networks Supporting Anonymous Communications. In proceedings
of the 2nd International Conference on Wireless and Ultra Wideband
Communications (Auswireless 2007).
Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin,
Flooding Attacks and Defense in Ad hoc networks. Journal of Systems
Engineering and Electronics, VoL. 17, No. 2, pp. 410- 416, 2006.
L. Zhou and Z.J. Haas. Securing Ad hoc Networks. IEEE Networks,
Vol.13, no.6, pp.24-30. 1999.
Young-Bae Ko and Nitin Vaidya, Location-Aided Routing (LAR) in
Mobile Ad Hoc Networks. In Proceedings of the Fourth International
Conference on Mobile Computing and Networking (MobiCom‘98),
pages 66–75, October 1998.
Jian-Hua Song1, 2, Fan Hong1, Yu Zhang1 ―Effective Filtering
Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks ―
Proceedings of the Seventh International Conference on Parallel and
Distributed Computing,Applications and Technologies (PDCAT'06)07695-2736-1/06 2006.
Neha Kamdar,Neeraj Paliwal CARF-F: Conditional Active RREQ
Flooding-Filter Based Prevention Scheme for AODV in MANET,
International Jounral of Computer Application, Vol.100. No.4, Augest
2014.
REFERENCES
.
[1]
[2]
[3]
[4]
George Theodorakopoulos and John S. Baras, On Trust Models and
Trust Evaluation Metrics for Ad Hoc Networks. IEEE JSAC, Vol.24.
No.2, February 2006.
Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, Mobile ad hoc
networking: imperatives and challenges. Ad Hoc Networks I(2003)pages
13-64, Elseiver publications.
Jet Li and Jean Kato, Future Trust Management Framework for Mobile
Ad hoc Networks. IEEE Communications Magazine, April 2008
Panagiotis Papadimitratos and Zygmunt J. Haas, Secure Data
Communication in Mobile Ad hoc Networks, IEEE JSAC, Vol.24, No.2,
February 2006.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 210
Download