International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 3, Issue 3, March 2014 ISSN 2319 - 4847 ENERGY EFFICIENT AND LOW COST ORIENTED HIGH SECURITY METHOD FOR MANET: A Review Prachi Sharma1, S.V. Pandit2 1&2 Department of Computer Science & Engineering, ICOT, RGPV, University, INDIA Abstract An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. Rapid development of mobile networks brings a lot of convenience to the people in their daily life. However, its dynamic nature and vulnerable-to-attack structure cause many secure problems which traditional networks can overlook, such as user anonymity, lightweight computation, impersonation attack. Therefore, we must solve these secure problems when we design an either authentication protocol or encryption algorithm or genetic algorithm or key management scheme for the mobile adhoc network Keywords: MANET, Security, Low cost, Energy Efficient, Encryption. 1. INTRODUCTION An adhoc network is a decentralized type of wireless network. Mobile Ad hoc Networks is a robust infrastructure less wireless network having mobile nodes. It does not have any fixed infrastructure and the nodes can communicate directly between each other [1]. It is made up of multiple nodes connected by links. A MANET can be created either by mobile nodes or by both static and dynamic mobile nodes. A mobile node has arbitrarily associated with each other forming uniformed topologies. They serve up as both routers and hosts [2, 3, 4]. The capability of mobile routers to self-configure makes this technology suitable for provisioning communication to, for instance, tragedy-strike areas where there is no communication infrastructure, forums, or in disaster search and rescue operations where a network connection is instantly required. A Mobile Ad Hoc Network (MANET) is formed by a cluster of mobile hosts without any predefined base station infrastructure. A host in a MANET can roam and communicate with other hosts at will. One critical issue for a MANET is power saving, as a host is useless without power. Recently, there have been lots of works on developing energy efficient and low cost oriented security method in wireless networks. Ad hoc networking for commercial uses; however, the main applications lie in military, tactical and other securitysensitive operations. In these applications, security plays an important role. We must say that security in adhoc networks is a major problem since they are wireless and unsecured in nature [5].To provide security, the nodes must share a secret key only to the authenticated neighbor nodes, so that we can achieve the various security goals like confidentiality, integrity, non repudiation, authentication, and availability. The main advantage of adhoc network is its cheap and easy construction. Mobile adhoc network is a seamless integration of nodes that can be sender, recipient or relay and may unaware until they come in contact with each other in a decentralized network. Communication should takes place in a secure manner even with the changes on topology, bandwidth, network size, resources etc. The nodes create network as a small group and stay connected to perform some specific task. Any node may join and leave the network at any point of time leads to dynamic changes in the network that tends to exchange information through multi-hop neighbour. To enable authenticity and avoid vulnerability, on membership requires offline trusted authority during system initialization for secure key distribution. 2. ENERGY-EFFICIENT SECURITY Mobile Adhoc NETwork (MANETs) have a very large growth in research in recent years. They are essentially adhoc networks, capable of processing, sensing and transmitting wireless information. These are networks that generate a large volume of raw data which possess natural heterogeneity. Besides, energy efficiency is an important performance measure, and one bit transmission over the network can consume as much energy as running thousands of instructions. In order to share information between different networks and decrease the amount of data sent, sensor data need to be enriched with semantic information. Mobile adhoc network with wireless connectivity between nodes hold great promise in enabling new military, public safety, health, industrial automation, and other commercial applications. In most applications of interest, a large number of nodes are essential to detect and provide detailed information regarding certain phenomena. Adhoc nodes are expected to be battery powered and deployed in locations where recharging the power source is impractical and expensive. This Volume 3, Issue 3, March 2014 Page 454 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 3, Issue 3, March 2014 ISSN 2319 - 4847 limits the lifetime of mobile adhoc nodes, and as a result, the lifetime of the entire MANET. Thus, designing methods to maximize energy efficiency and reduce battery drain are of great interest [6]. 3. LOW COST SECURITY Nowadays MANET is attracting many researchers due to their flexibility, capacity to install at any geographical place. And moreover it would not require any infrastructure. This is the thing which makes MANET suitable to many applications as we have discussed earlier in this paper. Implementing security in such networks is not as easy as in any other networks which have infrastructure. MANET is having more issues while handling security issues as it does not have any infrastructure. There are lots and lots of approaches which works for low light weighted security methods. These methods are broadly divided into two categories. (i) Encryption algorithms (ii) authentication algorithms. Although some researcher have this thinking that low cost or light weighted security is nothing but energy-efficiency. Apparently it looks like but actually both are not same. Low cost or Light Weighted Security contains following points [7]: a. Methods should have lesser number of statements to executes. b. Methods should have lesser memory requirement. c. Method should not use those data structure which requires higher time complexity. 4. ENERGY-EFFICIENT AND LOW COST SECURITY IN WIRELESS NETWORK: CATEGORIES 1. Genetic Algorihtm Techniques MANET is a effortless/seamless group of nodes which can be send, receive or relay data with each other in a network. The primary requirement of the communication is that it should takes place in a secure manner irrespective of any changes in its’ topology, bandwidth, network size etc. There are so many ways to establish trust among the nodes and one of the way for this is authentication. It checks by exchanging keys. In this paper [8], researchers propose a genetic algorithm approach for hierarchical group key management scheme. This hierarchical group key management could be implemented by rekeying technique on frequent scalable and high mobility nodes. The concept of rekeying approach distributes key with decentralize authority require single round and achieves consumption of energy during exchanging of rekeying messages. Few approaches such as OFT, GDH, and BH uses 3 rounds and DLKH, DOWF uses based on number of members in the network. Method [8] approach reduces energy consumption, computation, and communication compare to the existing scheme [8]. 2. Key Management Based Techniques A. Group Key Management Protocol Key management is a basic of all secure communication. The efficient, robust and secure key management is essential in most cryptosystem. Sharing secure information by common secret created by multiple members known as group key establishment. Secure group communication means that exchanging of secure information among members in a group which are inaccessible by the nodes out of network. The security ensured by encrypting the information with the group key established by all the participating members of that group, that leads decryption of message only to the group members designated to it. The typical classification of group key management protocol has four types such as centralized group key distribution (CGKD), decentralized group key management (DGKM), distributed/contributory group key agreement (CGKA) and distributed group key distribution (DGKD). In CGKD, the group controller (GC) is a central entity is responsible for generating, distributing and updating the group key. The key tree scheme or logical key hierarchy (LKH) [9] is the popular one in CGKD scheme. In LKH root node specifies group participant or user in its tree structure that significantly reduces memory space and number of broadcasting messages over the root and leaf nodes. The user shares a pair wise key with group initiator as well as set of intermediate keys from leaf to the root. Similar to LKH another group key management approach is the one way function tree (OFT) is proposed in [10]. The DGKM approach involves, dividing of small subgroups from larger groups. The subgroup controller in every subgroup is responsible for its key management. IOLUS [11] for scalable and secure multicasting is the first DGKM scheme. The CGKA scheme exchange information by absence of GC by all members contributes the group key in key management. The CGKA scheme typically includes binary tree based [12] n-party Diffie-Hellman key agreement [13, 14]. The tree based group keys, ensures secure and fully distributed protocol proposed in [12], but the main focus is to combine the contributory feature of DH with the efficiency of the tree structure. The DGKD scheme in [15] introduces the concept of sponsors and co-distributors just by eliminating the need for a trusted central authority. All group members have equal responsibility and trust with same capacity could be a potential sponsor of a co-distributor or other members. The rekeying process initiates the sponsor of members, whenever it joins or leaves the group. The sponsor initiates the secure distribution of keys to the co-distributors once necessary keys generated. The co-distributors distribute parallel from corresponding key to corresponding members. The hierarchy and cluster based Volume 3, Issue 3, March 2014 Page 455 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 3, Issue 3, March 2014 ISSN 2319 - 4847 schemes [14, 16] are other classifications of key management technique and SGC has contributory group key agreement as the most appropriate technique in this kind of environment. B. Key Management For Static Wireless Sensor Networks With Node Adding There are several application of wireless sensor networks but still there are many threads of its’ security, such as eavesdropping tampering etc. There are many approaches to communicate with security in wireless network. There are lot of key management schemes which have been proposed in order to establish symmetric keys. The paper [17] presents an innovative key management scheme called Random seed distribution with transitory master key (RSDTMK). This scheme uses the concept of random distribution of secret material and a transitory master key used to generate pair wise keys. This approach talks about the big and main drawback of the pre-existing approaches based on these techniques. Moreover, it over performs the state of-the-art protocols by providing always a high security level. C. Combined Public Key Scheme for Wireless Sensor Networks(C4W) With THE HELP OF hardware and software, Public Key Cryptography (PKC) has been introduces or used for micro sensors recently [18, 19, 21, 22]. Elliptic Curve Cryptography (ECC) is more suitable for resource constraint motes compared with RSA [19, 20]. This has been already proven from the lot of experiments which have done earlier. But the main drawback of ECC is its’ energy requirement. It requires too much energy. C4W is specially design for wireless networks. It works on the concept of an identity-based public key infrastructure, in which all nodes can generate others’ ECC public keys directly from their identities. Without certificates, no energy will be consumed for certificates communication and verification, which makes C4W especially energy efficient. Mutual authentication is required by C4W protocol which is without certificates. With respect to simplified SSL (SSSL) protocol which is using an abbreviated certificate, C4W consumes lesser power. It requires35% energy, and the C4W’s consumption for communication is only 28.5% of that consumed by SSSL. Furthermore, the energy analysis of C4W illuminates that the expensive public key computational cost is almost neglect able compared with the heavy communication consumption in a large-scale WSNs, which gives the asymmetric key management in WSNs a bright future Cluster-based Private Data Aggregation (CPDA). 3. Coded Network Based Encryption Technique A. Lightweight Encryption Scheme For Network-Coded Mobile Ad Hoc Networks As we know that MANET application requires more and more energy saving because of its’ nature of application. From the recent development we can say that network coding can help reduce the energy consumption in MANETs by using lesser transmissions. There are many factors of cost beside of only transmission cost, e.g., data encryption/decryption. Paper [23] illustrate in very easy manner that leverage network coding is to reduce the energy consumed by data encryption in MANETs. The is one very interesting thing about the network coding and that is, network coding itself provide security. This paper talks about P-Coding which makes our encryption algorithm of very light weighted to provide confidentiality for network-coded MANETs in an energy-efficient way. The basic idea of P-Coding is very simple. According to it, it is to let the source randomly permutes the symbols of each packet before performing network coding operations. Without knowing the permutation, eavesdroppers cannot locate coding vectors for correct decoding, and thus cannot obtain any meaningful information. And due to this factor only, this encryption algorithm provides high level of security with minimum effort and consume minimum energy. [23]. 4. Authentication Based Technique As we have seen from the previous study that there are lots and lots of the method which provide the security to the wireless network. It is really hard to design and develop an authentication protocol which is applicable for the global mobility network. There are many reasons for the same but still we can figure it out and it is that there are more susceptible to attacks and each user has limited energy, processing and storage resources. Recently, some authentication schemes with user anonymity for the wireless network GLOMONET have been proposed. The paper [24] shows some weaknesses in those schemes. The main contribution of the paper [24] is a secure and lightweight user authentication scheme which is highly acceptable for many wireless network. The main reason for it’s low cost is it’s low-cost functions which is use for authentication purpose. One of the authentication function such as one-way hash functions and exclusiveOR operations to achieve security. Just because of these features we can say that it’s suitability if higher for the energylimited mobile devices. At the other end, the home agent only needs to receive one message and send one message to authenticate the mobile user. Therefore, this protocol enjoys both computation and communication efficiency as compared to the well-known authentication schemes. It also shows that this method enjoys important security attributes such as preventing the various kinds of attacks, single registration, user anonymity, user friendly, no password/verifier table, no synchronized time mechanisms, high efficiency in password authentication, use of one-time session key between mobile user and foreign agent, etc. Furthermore, one of the new features in our proposal is: it is secure in the case that the information stored in the smart card is disclosed but the user password of the smart card owner is unknown to the adversary. 5. CONCLUSIONS In this paper, we presented many kind of protocols to preserve the privacy or security of the data. This paper studied the problem of energy saving in MANETs based on the technique of network coding. Previous studies demonstrated that Volume 3, Issue 3, March 2014 Page 456 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 3, Issue 3, March 2014 ISSN 2319 - 4847 network coding can reduce energy consumption with less transmission in MANETs. Network-Coding exploits the intrinsic security property of network coding, and uses simple permutation encryptions to generate considerable confusion to eavesdropping adversaries. We showed that Network-Coding is efficient in computation, and incurs less energy consumption for encryptions/decryptions. Genetic (Queue-batch) algorithm can significantly reduce both computation and communication costs when there is highly frequent membership events. The proposed model of this study provides a distributed collaborative key agreement protocols for dynamic peer groups. The key agreement setting is performed in which there is no centralized key server to maintain or distribute the group key. To reduce the rekeying complexity, paper proposes to use an interval-based approach to carry out re-keying for multiple join and leave requests at the same time, with a tradeoff between security and performance. So we can say that there are various means and ways to implement the energy –efficient & low-cost Security methods for MANET. These means include genetic algorithm and key management. References [1] Vesa Kärpijoki, “Security in Ad Hoc Networks”, Seminar on Network Security, 2000. [2] Manijeh Keshtgary and Vahide Babaiyan, ―Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET, IJCSE, ISSN: 0975-3397 Vol. 4 No. 02 February 2012. [3] S.D. Khatawkar, K. K. Pandyaji, R. M. Patil, V. M. Sali and U. L. Kulkarni, Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs, International Conference on Computer Networks and Communication Systems, (CNCS 2012) IPCSIT, vol.35 IACSIT Press, Singapore, 2012. [4] A.Al-Maashri and M. Ould-Khaoua, ―Performance analysis of MANET routing protocols in the presence of selfsimilar traffic, In Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006, 14-16 November 2006, pages pp. 801-807, Tampa, Florida, USA . [5] Lidong Zhou and Zygmunt J. Haas, ‘‘Securing Ad Hoc Networks’’, IEEE Network, November 1999. [6] Qi Jing, Jianbin Hu, Zhong Chen, “C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks,” IEEE-2006. [7] Emre Atsan, Iris Safaka, Lorenzo Keller, Christina Fragouli, “Low cost security for sensor networks,” work is supported by supported by the European Research Council grant NOWIRE ERC-2009-StG-240317 and published in IEEE-2013. [8] K. Pushpalatha, Dr. M. Chitra, “GAMANET: A Ganatic Algorithm approach for Hierarchical Group Key Management in Mobile Adhoc Network,” Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22. [9] Wallner, D.M., Harder, E.J. and Agee, R.C., “Key management for multicast: issues and architectures,” Internet Draft, draft-wallner-keyarch-01.txt, 1998. [10] Sherman, A.T. and McGrew, D.A., “Key establishment in large dynamic groups using one-way function trees,” IEEE Transactions on Software Engineering, vol. 29, no. 5, 2003, pp.444–458. [11] S. Mittra. Iolus, “A framework for scalable secure multicasting, ”Journal of Computer Communication Reviews, 27(4):277–288, 1997. [12] Y. Kim, A. Perrig, and G. Tsudik., “Tree-based group key agreement. ACM Transactions on Information Systems Security,” 7(1):60–96, Feb. 2004. [13] Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stan, and G. Tsudik, “Secure group communication using robust contributory key agreement,”IEEE Trans. Parallel and Distributed Systems, 15(5):468–480, 2004. [14] M. Burmester and Y. Desmedt,. “A secure and efficient conference key distribution system” In Advances in Cryptology - EUROCRYPT, 1994. [15] P. Adusumilli, X. Zou, and B. Ramamurthy, “DGKD: Distributed group key distribution with authentication capability,” Proceedings of 2005 IEEEWorkshop on Information Assurance and Security, West Point, NY, USA, pp. 476–481, June 2005. [16] J.-H. Huang and S. Mishra, “Mykil: a highly scalable key distribution protocol for large group multicast,”IEEE Global Telecommunications Conference, (GLOBECOM), 3:1476–1480, 2003. [17] Filippo Gandino, Bartolomeo Montrucchio, “Key Management for Static Wireless Sensor Networks with Node Adding,” IEEE Transactions on Industrial Informatics, 2013. [18] Gaubatz, Kaps, ¨ ozt¨ urk, Sunar, ”State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks,” In Third IEEE International Conference on Pervasive Computing and Communications, Workshops: 146-150, 2005. [19] Wander, Gura, Eberle, Gupta, Shantz, ”Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,” In Third IEEE International Conference on Pervasive Computing and Communications, Proceedings:324-328, 2005. Volume 3, Issue 3, March 2014 Page 457 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 3, Issue 3, March 2014 ISSN 2319 - 4847 [20] Gura, Patel, Wander, Eberle, Shantz, ”Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,” In Cryptographic Hardware and Embedded Systems (CHES) 2004, 6th International Workshop, Proceedings (Lecture Notes in Comput. Sci. Vol.3156): 119-32, 2004. [21] D. Malan, M. Welsh, M. Smith, ”A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography,” First IEEE International Conference on Sensor and Ad Hoc Communications and Networks. Santa Clara, California. October 2004. [22] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, ”TinyPK: Securing Sensor Networks with Public Key Technology,” SASN’04, Washington, DC, USA, October 25, 2004. [23] Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, Xuemin (Sherman) Shen, “A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks,” IEEE Transactions On Parallel And Distributed Systems-2013. [24] Daojing He, Chan, S., “A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network,” Network-Based Information Systems (NBiS), 2010 13th International Conference on IEEE-2010. Volume 3, Issue 3, March 2014 Page 458