International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 An Empirical Model of Malicious Node detection and Prevention with Data rating Santoshi Kancherla1, Kollati Vijaya kumar2 1 1,2 Final M.Tech Student,2Assistant Professor Department of CSE, Vignan's Institute of Engineering for women, Vadlamudi, Duvvada, Visakhapatnam, AP, India. Abstract: Identification and prevention of malicious nodes is always an interesting research issue in wireless sensor networks. In this paper we are proposing an efficient approach for identification of anonymous or malicious node with signature and data rating techniques. Initially every node can be verified genuine or malicious node with signature mechanism and only genuine nodes can communicate with each other based on the data ratings of intermediate nodes, priority given to the nodes based of the highest average data rating of in and out data packets and secure transmission of data can be done with Triple DES cryptographic algorithm. The intruder detection in wireless sensor networks is based on the base station level and where some important predictions can be against the attacks. The malicious node detection methods are proposed in many existing approaches. The nodes differently based on the hosting position and energy and the proximity of the nodes from the base stations. In our malicious node detection schemas we select an infrastructure for the sensor networks having the attributes. That is sensor nodes are deployed by manual installation. If node cannot get their self-area of locations and the sensors through a single time authentication method after their deployment in the field. I. INTRODUCTION The base station, sometimes called access point, acting as a controller and as a key server, is assumed to be a laptop class device and supplied with long-lasting power. We also assume that the base station will not be compromised. The measured values provided by each sensor present a strong deterministic component rather than a truly random (stochastic) one (e.g. wind speed or temperature measurements in different locations). In this case there exists a correlation between past values and the current one.[4] In wireless sensor networks are one of the main domains of present days. Some of the main features of wireless sensor networks are the property and the ability of self-maintaining during the whole life cycle. The hosted in any type of the environment are the attacks and without high security the data passing through the network could be listened and also manipulated. Based on the architecture the wireless sensor network implementation and varies the cost. The reading and writing operations of software is not required for the network than the security of the network is very high using proof hardware and leaving no chance of usage for intruder purposes in an attacker.[1,3] In any case an attacker, he will read new software for malicious applications. It is a main prediction should be taken in order to select the architecture and regarding the hosting environment and the sensor network applications. By preventing the corruption of the wireless sensor networks by rewritten code and finds its solution detection in instant decision from the topology in their recovery by copying the original software In wireless sensor network is collection of the nodes deployed in the environment having the property of self-organization in various from wired networks. The intruder detection methods in wireless sensor networks should take consideration in their limited architecture with calculated power and the usage of the energy. The anomaly detection identifies the published and unpublished attacks by comparing the general behavior of the sensor node with its activities. These types of the models may require large resources for log files. ISSN: 2231-5381 Efficient secret-key cryptography with predistributed keys using Skipjack, RC5 or AES algorithms to encipher all data communications inside the sensor network [8][9]; All these three types of encryption algorithms have a common feature that makes them an attractive option in case of sensor networks: they are able to encrypt short or medium size messages, like the ones send by sensors and received by base stations, in the case of limited power consumption. By using such appropriate cryptographic techniques the harmful potential of the passive attacks(eavesdropping and traffic analysis) can be neglected. Probably the biggest threat for a wireless sensor network is node-capturing attack [10] where an adversary gains full control over sensor nodes through direct physical access. This type of attack is fundamentally different from the attacks already mentioned because it doesn’t rely on security holes in protocols, broadcasting, operating systems, etc. It is based on the geographic deployment of the sensor nodes in the field. Realistically, we cannot expect to control access to hundreds of nodes spread over several kilometers and, http://www.ijettjournal.org Page 56 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 by this, we make a node capturing attack very possible. In addition, sensors are rarely tamper resistant, so an attacker can damage or replace sensors and computation hardware or extract sensitive material such as cryptographic keys to gain unrestricted access to higher levels of communication. Moreover, all sensors are usually assumed to run the same software, in particular, the same operating system. Finding an appropriate bug in the sensor Network, through reverse engineering techniques applied to the captured sensor, allows the adversary to control the entire sensor network. II. RELATED WORK Security issues of wireless sensor networks: In traditional networks the security problems in the wireless networks are faced with new security issues and such attacks are passive attacks and the active attacks, internal attacks and external attacks, host and network attacks. These attacks are classified into different protocols based on layers. For physical layer there are physical capture and radio interference attacks etc. For the data link layer there are conflict on the frames and reducing of the energy attacks etc. For network layer all the researches focus and attacks from this layer. Consider an example false messages and manipulation and sink hole attach and the selective forwarding attack. For the transport layer is main attack and out of memory attacks. For the application layer attacks the data gathering and the task distribution etc. which need the security methods. The secure communication is required for sending the data securely between the sensor networks. The configuration goals of the network will based in the needs that protects the data packets. It shares the features of the networks and also has some distinct features. The security issues of the existing networks and those are suited in the distinct constraints of the wireless networks. There four security goals there are confidentiality, integrity, authentication and availability [10,7]. In the concept of confidentiality the sensor node should not retrieve the data to other nodes. Consider an example that a malicious program is injected to malicious nodes into the network channel in a military application. The confidentiality will not let in from the access to data of other nodes. Integrity in the network is required to provide the flexibility of the data that links to the capability to confirm that a message is not tampered and also it is not manipulate the changes on the network. The integrity of the network will be in question if a malicious node present in the ISSN: 2231-5381 network injects bogus data or turbulent conditions due to wireless channel cause damage or loss of data. Authentication indicates the reliability of the message. Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional bogus packets. So the receiving node needs to be able to confirm that a packet it has received is actually comes from the node who have claim to send it. In other words, data authentication verifies the identity of senders. Data authentication is achieved through symmetric or asymmetric mechanisms where sending and receiving nodes share secret keys to compute the message authentication code (MAC)[3,8]. Availability means the service should be available all the time. It means whether a node has the ability to use the resources and whether the network is available for the messages to communicate. Complex security measures require a higher consumption of energy and computation power. It keeps availability of the network challenging. However, failure of the base station or cluster leader’s availability will eventually threaten the entire sensor network. Therefore availability is most important factor for maintaining an operational network Intrusion detection systems (IDS) according to collect data in different ways can be classified based on host and network- based intrusion detection. IDS of traditional wired network cannot be directly used to wireless sensor networks, because of its characteristics of "wireless”, autonomy, and multiple nodes distributed in unattended environment, not the central node, but consider the issue of energy consumption, the system should be as much as possible to avoid excessive complexity in the design and communication. MANET is a self-configuration wireless ad hoc network of mobile nodes. A MANET organization depends upon the location of the nodes, their connectivity, their service discover capability and their ability to search and route messages using the nearest node or nearby nodes. The MANET's are self-organizing, each MANET node requires much smaller frequency spectrum than node in fixed network. Routing protocol specifies the method used and phases deployed for maintaining and updating the routing table at the nodes in the network. The Routing Algorithm is used for service discovery and for caching maintaining and updating the routing table. Security is an important issue for MANETs, especially for security-sensitive applications. To secure a MANET, we consider the following attributes. Availability: It ensures the survivability of the network services depicts denial of service. http://www.ijettjournal.org Page 57 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 Confidentiality: It ensures the certain information is never disclosed to unauthorized entities. 6) if S (send by GN)= S (stored in MN) Then “Node is genuine” Authentication: It enables a node to ensure the identity of the peer node with which it is communicating. else Non-Repudiation: It ensures the origin of the message cannot deny having sent the message, non-repudiation is useful for detection and isolation of compromised nodes. Malicious Node Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks. The algorithm works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. The nodes in the friend list are rated on the basis of the amount of data transmission they accomplish and their friendship with other nodes in the network. The account of friendship of a node with other nodes in the network is obtained through the Share Your Friends process which is a periodic event in the network. Data rating: Drawbacks: Time complexity increases in the process of detecting malicious nodes. More number of computations are needed for identify the trusted nodes by challenging process. So much memory space is required for each node to maintain the number of lists. So much power consumption. III. PROPOSED WORK We are proposing an efficient malicious node detection and prevention mechanism with signature and data rating techniques. Master node (MN) is a centralized server it generates a random session key and distributed to all available nodes or general nodes (GN) in the networks, nodes in turn applies signature over the key which is received from master node and forward back to master node. Master node itself generates signature on key and compares the signatures of all individual nodes, if signature generated at master node and general node are equal then that node is genuine otherwise it is malicious. ALGORITHM: Node recognition Step1 :A random session Sk is shared by MN to each node individually. Step2 : MN computes signature(Sk). Step43: Individual GN computes hash or signature over received Sk S=[h(Sk)] h=hash function known by both MN and general node end if After node recognition, genuine nodes can communicate with each other, any node can transmit data packets to destination node through the intermediate nodes by computing the data rating of the nodes. Here data rating can be computed based on packets which are incoming to a node and packets which are going out from the node .Let use consider a source node “A” wants to transmits some data packets to destination node “E” and B,C,D are intermediate nodes, path can be based on highest data rating by computing average of in out packet transmission. The following table shows sample data rating table as follows. In (data packets in Bytes) 30 40 25 23 45 46 Out (data packets in Bytes) 20 40 22 23 40 44 Data rating can be computed with average of in and out with respect to all intermediate nodes and data transmitted through highest rating path of genuine nodes. For secure transmission of data packets from source to destination data packets can be encrypted with Triple DES cryptographic algorithm and these data packets can decrypted only at destination node even though transmitting through intermediate node. The following algorithm shows triple DES algorithm as follows Secure Transmission: Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA) block cipher. It is so named because it applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Triple DES provides a relatively simple method of increasing the key size of DES to protect against brute force attacks, without requiring a completely new block cipher algorithm. 5) GN requests MN for sign verification with S or [h(Sk)] ISSN: 2231-5381 http://www.ijettjournal.org Page 58 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 The standards define three keying options: Keying option 1: All three keys are independent. Keying option 2: K1 and K2 are independent, and K3 = K1. Keying option 3: All three keys are identical, i.e. K1 = K2 = K3. Keying option 1 is the strongest, with 3 x 56 = 168 independent key bits. Keying option 2 provides less security, with 2 x 56 = 112 key bits. This option is stronger than simply DES encrypting twice, e.g. with K1 and K2, because it protects against meet-in-the-middle attacks. Keying option 3 is no better than DES, with only 56 key bits. This option provides backward compatibility with DES, because the first and second DES operations simply cancel out. It is no longer recommended by the National Institute of Standards and Technology (NIST) and not supported by ISO/IEC 18033-3. In general Triple DES with three independent keys (keying option 1) has a key length of 168 bits (three 56-bit DES keys), but due to the meet-in-the-middle attack the effective security it provides is only 112 bits. Keying option 2, reduces the key size to 112 bits. However, this option is susceptible to certain chosen-plaintext or knownplaintext attacks and thus it is designated by NIST to have only 80 bits of security. For experimental analysis ,we implemented our current research work with Java, in the following example, node 0 and node1 are malicious nodes and other nodes are genuine nodes, data cannot be passed through malicious nodes REFERENCES [1] Berkeley MICA mote.ttp://webs.cs.berkeley.edu/tos/hardware/hardware.html,2003. [2] MICA2 radio stack for TinyOS.http://webs.cs.berkeley.edu/tos/tinyos1.x/doc/mica2radio/CC1000.html, 2003. [3] Chipcon. SmartRF CC1000 single chip very low power RFtransceiver.http://www.chipcon.com/files/CC1000 Data Sheet 2 1.pdf,2003. [4] J. Hill and D. Culler. A wireless embedded sensor architecturefor system-level optimization. Technical report, Universityof California, Berkeley, 2001. [5] S. Hollar. COTS Dust.Master’s thesis, University of California,Berkeley, December 2000. [6] Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes:A defense against wormhole attacks in wireless ad hoc networks.Proceedings of the 22nd Annual Joint Conference ofthe IEEE Computer and Communications Societies (INFOCOM2003), April 2003. [7] J. M. Kahn, R. H. Katz, and K. S. J. Pister. Next centurychallenges: Mobile networking for “smart dust”. In InternationalConference on Mobile Computing and Networking(MOBICOM), pages 271–278, 1999. [8] J. M. Kahn, R. H. Katz, and K. S. J. Pister. Emerging challenges:Mobile networking for “smart dust”. Journal ofCommunications and Networks, 2(3):188–196, September2000. [9] C. Karlof and D. Wagner. Secure routing in wireless sensornetworks: Attacks and countermeasures. First IEEE InternationalWorkshop on Sensor Network Protocols and Applications,May 2003. [10] T. S. Rappaport. Wireless communications: principles andpractice. Prentice Hall, 2nd edition, 2002. BIOGRAPHIES Santoshi Kancherla pursuing M.Tech in department of CSE in Vignan's Institute of Engineering for women, Vadlamudi, Duvvada, Vskp, AP, India.Her interesting areas are data mining, network security. Path Kollati Vijaya kumar completed mtech and pursuing Ph.D He is working as Asst. prof in department of CSECSE in Vignan's Institute of Engineering for women, Vadlamudi, Duvvada, Vskp, AP, India. He is Researchers Scholar in Karpagam University, Coimbatore. His interesting areas are datamining, network security, cloud computing. IV. CONCLUSION We are concluding our current research work with efficient signature and data rating technique for authenticated and secure transmission of data packets in wireless sensor networks, to maintain the data confidentiality data packets can be encrypted with Triple DES cryptographic algorithm. Our experimental results show efficient results than the traditional approach. ISSN: 2231-5381 http://www.ijettjournal.org Page 59