International Journal of Application or Innovation in Engineering & Management... Web Site: www.ijaiem.org Email: Volume 3, Issue 3, March 2014

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 3, March 2014
ISSN 2319 - 4847
ENERGY EFFICIENT AND LOW COST
ORIENTED HIGH SECURITY METHOD
FOR MANET: A Review
Prachi Sharma1, S.V. Pandit2
1&2
Department of Computer Science & Engineering, ICOT, RGPV, University, INDIA
Abstract
An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any
centralized access point or existing infrastructure. Rapid development of mobile networks brings a lot of convenience to the
people in their daily life. However, its dynamic nature and vulnerable-to-attack structure cause many secure problems which
traditional networks can overlook, such as user anonymity, lightweight computation, impersonation attack. Therefore, we must
solve these secure problems when we design an either authentication protocol or encryption algorithm or genetic algorithm or key
management scheme for the mobile adhoc network
Keywords: MANET, Security, Low cost, Energy Efficient, Encryption.
1. INTRODUCTION
An adhoc network is a decentralized type of wireless network. Mobile Ad hoc Networks is a robust infrastructure less
wireless network having mobile nodes. It does not have any fixed infrastructure and the nodes can communicate directly
between each other [1]. It is made up of multiple nodes connected by links. A MANET can be created either by mobile
nodes or by both static and dynamic mobile nodes. A mobile node has arbitrarily associated with each other forming
uniformed topologies. They serve up as both routers and hosts [2, 3, 4]. The capability of mobile routers to self-configure
makes this technology suitable for provisioning communication to, for instance, tragedy-strike areas where there is no
communication infrastructure, forums, or in disaster search and rescue operations where a network connection is instantly
required.
A Mobile Ad Hoc Network (MANET) is formed by a cluster of mobile hosts without any predefined base station
infrastructure. A host in a MANET can roam and communicate with other hosts at will. One critical issue for a MANET
is power saving, as a host is useless without power. Recently, there have been lots of works on developing energy efficient
and low cost oriented security method in wireless networks.
Ad hoc networking for commercial uses; however, the main applications lie in military, tactical and other securitysensitive operations. In these applications, security plays an important role. We must say that security in adhoc networks
is a major problem since they are wireless and unsecured in nature [5].To provide security, the nodes must share a
secret key only to the authenticated neighbor nodes, so that we can achieve the various security goals like
confidentiality, integrity, non repudiation, authentication, and availability. The main advantage of adhoc network is its
cheap and easy construction.
Mobile adhoc network is a seamless integration of nodes that can be sender, recipient or relay and may unaware until they
come in contact with each other in a decentralized network. Communication should takes place in a secure manner even
with the changes on topology, bandwidth, network size, resources etc. The nodes create network as a small group and stay
connected to perform some specific task. Any node may join and leave the network at any point of time leads to dynamic
changes in the network that tends to exchange information through multi-hop neighbour. To enable authenticity and
avoid vulnerability, on membership requires offline trusted authority during system initialization for secure key
distribution.
2. ENERGY-EFFICIENT SECURITY
Mobile Adhoc NETwork (MANETs) have a very large growth in research in recent years. They are essentially adhoc
networks, capable of processing, sensing and transmitting wireless information. These are networks that generate a large
volume of raw data which possess natural heterogeneity. Besides, energy efficiency is an important performance measure,
and one bit transmission over the network can consume as much energy as running thousands of instructions. In order to
share information between different networks and decrease the amount of data sent, sensor data need to be enriched with
semantic information.
Mobile adhoc network with wireless connectivity between nodes hold great promise in enabling new military, public
safety, health, industrial automation, and other commercial applications. In most applications of interest, a large number
of nodes are essential to detect and provide detailed information regarding certain phenomena. Adhoc nodes are expected
to be battery powered and deployed in locations where recharging the power source is impractical and expensive. This
Volume 3, Issue 3, March 2014
Page 454
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 3, March 2014
ISSN 2319 - 4847
limits the lifetime of mobile adhoc nodes, and as a result, the lifetime of the entire MANET. Thus, designing methods to
maximize energy efficiency and reduce battery drain are of great interest [6].
3. LOW COST SECURITY
Nowadays MANET is attracting many researchers due to their flexibility, capacity to install at any geographical place.
And moreover it would not require any infrastructure. This is the thing which makes MANET suitable to many
applications as we have discussed earlier in this paper.
Implementing security in such networks is not as easy as in any other networks which have infrastructure. MANET is
having more issues while handling security issues as it does not have any infrastructure. There are lots and lots of
approaches which works for low light weighted security methods. These methods are broadly divided into two categories.
(i) Encryption algorithms (ii) authentication algorithms.
Although some researcher have this thinking that low cost or light weighted security is nothing but energy-efficiency.
Apparently it looks like but actually both are not same. Low cost or Light Weighted Security contains following points
[7]:
a. Methods should have lesser number of statements to executes.
b. Methods should have lesser memory requirement.
c. Method should not use those data structure which requires higher time complexity.
4. ENERGY-EFFICIENT AND LOW COST SECURITY IN WIRELESS NETWORK:
CATEGORIES
1. Genetic Algorihtm Techniques
MANET is a effortless/seamless group of nodes which can be send, receive or relay data with each other in a network.
The primary requirement of the communication is that it should takes place in a secure manner irrespective of any
changes in its’ topology, bandwidth, network size etc. There are so many ways to establish trust among the nodes and one
of the way for this is authentication. It checks by exchanging keys. In this paper [8], researchers propose a genetic
algorithm approach for hierarchical group key management scheme. This hierarchical group key management could be
implemented by rekeying technique on frequent scalable and high mobility nodes. The concept of rekeying approach
distributes key with decentralize authority require single round and achieves consumption of energy during exchanging of
rekeying messages. Few approaches such as OFT, GDH, and BH uses 3 rounds and DLKH, DOWF uses based on number
of members in the network. Method [8] approach reduces energy consumption, computation, and communication
compare to the existing scheme [8].
2. Key Management Based Techniques
A. Group Key Management Protocol
Key management is a basic of all secure communication. The efficient, robust and secure key management is essential in
most cryptosystem. Sharing secure information by common secret created by multiple members known as group key
establishment. Secure group communication means that exchanging of secure information among members in a group
which are inaccessible by the nodes out of network. The security ensured by encrypting the information with the group
key established by all the participating members of that group, that leads decryption of message only to the group
members designated to it. The typical classification of group key management protocol has four types such as centralized
group key distribution (CGKD), decentralized group key management (DGKM), distributed/contributory group key
agreement (CGKA) and distributed group key distribution (DGKD).
In CGKD, the group controller (GC) is a central entity is responsible for generating, distributing and updating the group
key. The key tree scheme or logical key hierarchy (LKH) [9] is the popular one in CGKD scheme. In LKH root node
specifies group participant or user in its tree structure that significantly reduces memory space and number of
broadcasting messages over the root and leaf nodes. The user shares a pair wise key with group initiator as well as set of
intermediate keys from leaf to the root. Similar to LKH another group key management approach is the one way function
tree (OFT) is proposed in [10].
The DGKM approach involves, dividing of small subgroups from larger groups. The subgroup controller in every
subgroup is responsible for its key management. IOLUS [11] for scalable and secure multicasting is the first DGKM
scheme. The CGKA scheme exchange information by absence of GC by all members contributes the group key in key
management. The CGKA scheme typically includes binary tree based [12] n-party Diffie-Hellman key agreement [13,
14]. The tree based group keys, ensures secure and fully distributed protocol proposed in [12], but the main focus is to
combine the contributory feature of DH with the efficiency of the tree structure.
The DGKD scheme in [15] introduces the concept of sponsors and co-distributors just by eliminating the need for a
trusted central authority. All group members have equal responsibility and trust with same capacity could be a potential
sponsor of a co-distributor or other members. The rekeying process initiates the sponsor of members, whenever it joins or
leaves the group. The sponsor initiates the secure distribution of keys to the co-distributors once necessary keys generated.
The co-distributors distribute parallel from corresponding key to corresponding members. The hierarchy and cluster based
Volume 3, Issue 3, March 2014
Page 455
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 3, March 2014
ISSN 2319 - 4847
schemes [14, 16] are other classifications of key management technique and SGC has contributory group key agreement
as the most appropriate technique in this kind of environment.
B. Key Management For Static Wireless Sensor Networks With Node Adding
There are several application of wireless sensor networks but still there are many threads of its’ security, such as
eavesdropping tampering etc. There are many approaches to communicate with security in wireless network. There are lot
of key management schemes which have been proposed in order to establish symmetric keys. The paper [17] presents an
innovative key management scheme called Random seed distribution with transitory master key (RSDTMK). This scheme
uses the concept of random distribution of secret material and a transitory master key used to generate pair wise keys.
This approach talks about the big and main drawback of the pre-existing approaches based on these techniques.
Moreover, it over performs the state of-the-art protocols by providing always a high security level.
C. Combined Public Key Scheme for Wireless Sensor Networks(C4W)
With THE HELP OF hardware and software, Public Key Cryptography (PKC) has been introduces or used for micro
sensors recently [18, 19, 21, 22]. Elliptic Curve Cryptography (ECC) is more suitable for resource constraint motes
compared with RSA [19, 20]. This has been already proven from the lot of experiments which have done earlier. But the
main drawback of ECC is its’ energy requirement. It requires too much energy. C4W is specially design for wireless
networks. It works on the concept of an identity-based public key infrastructure, in which all nodes can generate others’
ECC public keys directly from their identities. Without certificates, no energy will be consumed for certificates
communication and verification, which makes C4W especially energy efficient. Mutual authentication is required by
C4W protocol which is without certificates. With respect to simplified SSL (SSSL) protocol which is using an abbreviated
certificate, C4W consumes lesser power. It requires35% energy, and the C4W’s consumption for communication is only
28.5% of that consumed by SSSL. Furthermore, the energy analysis of C4W illuminates that the expensive public key
computational cost is almost neglect able compared with the heavy communication consumption in a large-scale WSNs,
which gives the asymmetric key management in WSNs a bright future Cluster-based Private Data Aggregation (CPDA).
3. Coded Network Based Encryption Technique
A. Lightweight Encryption Scheme For Network-Coded Mobile Ad Hoc Networks
As we know that MANET application requires more and more energy saving because of its’ nature of application. From
the recent development we can say that network coding can help reduce the energy consumption in MANETs by using
lesser transmissions. There are many factors of cost beside of only transmission cost, e.g., data encryption/decryption.
Paper [23] illustrate in very easy manner that leverage network coding is to reduce the energy consumed by data
encryption in MANETs. The is one very interesting thing about the network coding and that is, network coding itself
provide security. This paper talks about P-Coding which makes our encryption algorithm of very light weighted to
provide confidentiality for network-coded MANETs in an energy-efficient way. The basic idea of P-Coding is very
simple. According to it, it is to let the source randomly permutes the symbols of each packet before performing network
coding operations. Without knowing the permutation, eavesdroppers cannot locate coding vectors for correct decoding,
and thus cannot obtain any meaningful information. And due to this factor only, this encryption algorithm provides high
level of security with minimum effort and consume minimum energy. [23].
4. Authentication Based Technique
As we have seen from the previous study that there are lots and lots of the method which provide the security to the
wireless network. It is really hard to design and develop an authentication protocol which is applicable for the global
mobility network. There are many reasons for the same but still we can figure it out and it is that there are more
susceptible to attacks and each user has limited energy, processing and storage resources. Recently, some authentication
schemes with user anonymity for the wireless network GLOMONET have been proposed. The paper [24] shows some
weaknesses in those schemes. The main contribution of the paper [24] is a secure and lightweight user authentication
scheme which is highly acceptable for many wireless network. The main reason for it’s low cost is it’s low-cost functions
which is use for authentication purpose. One of the authentication function such as one-way hash functions and exclusiveOR operations to achieve security. Just because of these features we can say that it’s suitability if higher for the energylimited mobile devices. At the other end, the home agent only needs to receive one message and send one message to
authenticate the mobile user. Therefore, this protocol enjoys both computation and communication efficiency as compared
to the well-known authentication schemes. It also shows that this method enjoys important security attributes such as
preventing the various kinds of attacks, single registration, user anonymity, user friendly, no password/verifier table, no
synchronized time mechanisms, high efficiency in password authentication, use of one-time session key between mobile
user and foreign agent, etc. Furthermore, one of the new features in our proposal is: it is secure in the case that the
information stored in the smart card is disclosed but the user password of the smart card owner is unknown to the
adversary.
5. CONCLUSIONS
In this paper, we presented many kind of protocols to preserve the privacy or security of the data. This paper studied the
problem of energy saving in MANETs based on the technique of network coding. Previous studies demonstrated that
Volume 3, Issue 3, March 2014
Page 456
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 3, March 2014
ISSN 2319 - 4847
network coding can reduce energy consumption with less transmission in MANETs. Network-Coding exploits the
intrinsic security property of network coding, and uses simple permutation encryptions to generate considerable confusion
to eavesdropping adversaries. We showed that Network-Coding is efficient in computation, and incurs less energy
consumption for encryptions/decryptions.
Genetic (Queue-batch) algorithm can significantly reduce both computation and communication costs when there is
highly frequent membership events. The proposed model of this study provides a distributed collaborative key agreement
protocols for dynamic peer groups. The key agreement setting is performed in which there is no centralized key server to
maintain or distribute the group key. To reduce the rekeying complexity, paper proposes to use an interval-based
approach to carry out re-keying for multiple join and leave requests at the same time, with a tradeoff between security and
performance.
So we can say that there are various means and ways to implement the energy –efficient & low-cost Security methods for
MANET. These means include genetic algorithm and key management.
References
[1] Vesa Kärpijoki, “Security in Ad Hoc Networks”, Seminar on Network Security, 2000.
[2] Manijeh Keshtgary and Vahide Babaiyan, ―Performance Evaluation of Reactive, Proactive and Hybrid Routing
Protocols in MANET, IJCSE, ISSN: 0975-3397 Vol. 4 No. 02 February 2012.
[3] S.D. Khatawkar, K. K. Pandyaji, R. M. Patil, V. M. Sali and U. L. Kulkarni, Performance Comparison of DSDV,
AODV, DSR, Routing protocols for MANETs, International Conference on Computer Networks and Communication
Systems, (CNCS 2012) IPCSIT, vol.35 IACSIT Press, Singapore, 2012.
[4] A.Al-Maashri and M. Ould-Khaoua, ―Performance analysis of MANET routing protocols in the presence of selfsimilar traffic, In Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006, 14-16 November
2006, pages pp. 801-807, Tampa, Florida, USA .
[5] Lidong Zhou and Zygmunt J. Haas, ‘‘Securing Ad Hoc Networks’’, IEEE Network, November 1999.
[6] Qi Jing, Jianbin Hu, Zhong Chen, “C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless
Sensor Networks,” IEEE-2006.
[7] Emre Atsan, Iris Safaka, Lorenzo Keller, Christina Fragouli, “Low cost security for sensor networks,” work is
supported by supported by the European Research Council grant NOWIRE ERC-2009-StG-240317 and published in
IEEE-2013.
[8] K. Pushpalatha, Dr. M. Chitra, “GAMANET: A Ganatic Algorithm approach for Hierarchical Group Key
Management in Mobile Adhoc Network,” Proceedings of the 2013 International Conference on Pattern Recognition,
Informatics and Mobile Engineering (PRIME) February 21-22.
[9] Wallner, D.M., Harder, E.J. and Agee, R.C., “Key management for multicast: issues and architectures,” Internet
Draft, draft-wallner-keyarch-01.txt, 1998.
[10] Sherman, A.T. and McGrew, D.A., “Key establishment in large dynamic groups using one-way function trees,” IEEE
Transactions on Software Engineering, vol. 29, no. 5, 2003, pp.444–458.
[11] S. Mittra. Iolus, “A framework for scalable secure multicasting, ”Journal of Computer Communication Reviews,
27(4):277–288, 1997.
[12] Y. Kim, A. Perrig, and G. Tsudik., “Tree-based group key agreement. ACM Transactions on Information Systems
Security,” 7(1):60–96, Feb. 2004.
[13] Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stan, and G. Tsudik, “Secure group communication using robust
contributory key agreement,”IEEE Trans. Parallel and Distributed Systems, 15(5):468–480, 2004.
[14] M. Burmester and Y. Desmedt,. “A secure and efficient conference key distribution system” In Advances in
Cryptology - EUROCRYPT, 1994.
[15] P. Adusumilli, X. Zou, and B. Ramamurthy, “DGKD: Distributed group key distribution with authentication
capability,” Proceedings of 2005 IEEEWorkshop on Information Assurance and Security, West Point, NY, USA, pp.
476–481, June 2005.
[16] J.-H. Huang and S. Mishra, “Mykil: a highly scalable key distribution protocol for large group multicast,”IEEE
Global Telecommunications Conference, (GLOBECOM), 3:1476–1480, 2003.
[17] Filippo Gandino, Bartolomeo Montrucchio, “Key Management for Static Wireless Sensor Networks with Node
Adding,” IEEE Transactions on Industrial Informatics, 2013.
[18] Gaubatz, Kaps, ¨ ozt¨ urk, Sunar, ”State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor
Networks,” In Third IEEE International Conference on Pervasive Computing and Communications, Workshops:
146-150, 2005.
[19] Wander, Gura, Eberle, Gupta, Shantz, ”Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,”
In Third IEEE International Conference on Pervasive Computing and Communications, Proceedings:324-328, 2005.
Volume 3, Issue 3, March 2014
Page 457
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 3, March 2014
ISSN 2319 - 4847
[20] Gura, Patel, Wander, Eberle, Shantz, ”Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,” In
Cryptographic Hardware and Embedded Systems (CHES) 2004, 6th International Workshop, Proceedings (Lecture
Notes in Comput. Sci. Vol.3156): 119-32, 2004.
[21] D. Malan, M. Welsh, M. Smith, ”A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic
Curve Cryptography,” First IEEE International Conference on Sensor and Ad Hoc Communications and Networks.
Santa Clara, California. October 2004.
[22] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, ”TinyPK: Securing Sensor Networks with Public
Key Technology,” SASN’04, Washington, DC, USA, October 25, 2004.
[23] Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, Xuemin (Sherman) Shen, “A Lightweight Encryption Scheme
for Network-Coded Mobile Ad Hoc Networks,” IEEE Transactions On Parallel And Distributed Systems-2013.
[24] Daojing He, Chan, S., “A Secure and Lightweight User Authentication Scheme with Anonymity for the Global
Mobility Network,” Network-Based Information Systems (NBiS), 2010 13th International Conference on IEEE-2010.
Volume 3, Issue 3, March 2014
Page 458
Download