www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume - 3 Issue -7 July, 2014 Page No. 7394-7397
Discover and Verifying Authentication of Nearest
Nodes in Mobile Ad hoc Networks
N.R.Anitha, E. Murali
M.Tech Student Department of CSE SISTK, Puttur, INDIA
Assistant Professor Department of CSE SISTK,Puttur,INDIA
nranitha664@gmail.com
sai4murali@gmail.com
Abstract- A large number of temporary nodes consisting of set of rules and destination based services require that mobile nodes
learn the nearest places. A process can be easily improper usage or interrupt by opposition nodes. In being away of fixed
nodes the discover and verifying of nearest places that have been hardly inquired in the existing system .In this thesis by
introducing a complete distributed answer that is strong and secret against adjacent nodes and can be damaged only by an
huge number of neighbor nodes . Results that a set of rules can occur more than 99 percent of the threats . under the best
possible state the original nodes are to be searched.
Keywords— Temporary nodes; Destination based services ;
Interrupt ; Threats; Neighbor nodes;
I
INTRODUCTION
Destination based services has become an important in mobile
systems where a wide range of set of rules require knowledge
of the place of nodes participation. Routing in networks, data
collecting in sensor networks among robotic nodes, location
based services for handheld devices and danger warning or
traffic perfect in vehicular networks are all examples of
services are available in neighbor position information.
Node locations is to be set right is an main issue in
mobile networks and it becomes particular challenges in the
presence of nodes aiming at injuring the system. In these
situation we need solutions that let nodes:
1.Location are to be establish based on false location
information in spite of threats.
2.Neighbor positions are to be verified, and which have false
locations are to be identified.
In this thesis the main aspect ,here in after referred
as neighbor position verification (NPV for short). In wireless
adhoc networks where a services accessed by sources is not
present, and the location data are to be obtained through node
-to-node communication such a scenario are used in location
aware services. For example, data collecting process, routing
in geographical areas, attracting traffic networks or discarding
it, similarly position counterfeit access unauthorized
information are to be accessed by services dependent location.
In this thesis is to perform in absence of fixed nodes,
a fully divided, easy analyse of NPV procedure enables that
each node to retrieve the place advertised by its nearest nodes.
Therefore NPV protocol that has the following features:
1.It is designed for ad hoc networks and it does not rely on
the presence of a priority based nodes.
2.Action are to be performed by a node it allows all
comparision procedures separately.
3.It can be executed by any node with out priority knowledge
of the nearest node are to be respond.
4.It is strong against independent and together nodes.
5.It is easy analyse, as it generates low traffic time.
Additionally our NPV scheme is used in security
architectures, including the vehicular networks [1], [2], which
represent a neighbor position verification environment.
II. RELATED WORK
Ad hoc security protocols carries a number of problems
related to NPV, there are no strong solutions, easy analyse to
NPV that can executed with in short time with out any priority
based nodes.
Some of the NPV-related problems are secure
positioning and secure disclosure and then solution address to
NPV.
A. Securely finding own place:
In wireless environments, Global Navigation Satellite
Systems are mainly achieved through self-localization e.g.,
Global Positioning System ,whose security can be provided by
defense mechanism [3]. Alternate infrastructure of terrestrial
are to be used [4], [5], along with distribution with nonhonest
beacons [6]. some of the safely resolve their own place and
reference time.
B. Secure neighbor disclosure:
It deals with the establishment of nodes with which
a link can be found with in a given distance [7]. Secure
neighbor disclosure is only a solution toward the step we are
N.R.Anitha, IJECS Volume-3 Issue-7 July, 2014 Page No.7394-7397
Page 7394
after : an nearest node can be simply secure discover as
neighbor with in range of SND, but it could still its place
with in same range. In different words, SND is a set of the
NPV problem ,since a node can be accessed whether another
node is a an closest of actual one but it place are not to be
verified. SND is mostly used to counting the wormhole
attacks [8], [9],[10]; some of the solutions to proposed system
related to SND problem [11], SND as set of rules to prove
based on secure solutions can be in [12], [13].
C. Neighbor place verification:
In the ad hoc and sensor networks; existing NPV
schemes often rely on fixed[14], [15] or mobile[16] fixed
nodes, are to assume always available of places are to be
verified declared by third parties. In temporary locations,
either neighbor nodes or infrastructure can be faith unrealistic.
Thus a set of rules does not consist of fixed neighbors.
In [17], an NPV consist of set of rules are to be purposed that
first nodes distance are to be calculated ,and then which nodes
consist pair of nodes are to be encircled act as verifiers of the
position of their pairs, This information does not used in
priority based nodes, but it is designed for sensor networks are
to be constant and it consists of of multiround computation
lengthy involves many nodes that on a same nearest
comparison . Futher, the resilience of the set of rules in [17],
the information are to be hacked is not explained. The
information in [18], suits constant sensor networks too, and it
consists of many nodes information are to be exchange by a
node signal to be emitted whose place has to be identified.
Our NPV solution allows any node to calculate the
position of all the of its neighbors through a message one-time
are to be exchange, which makes is used in wireless and
temporary networks. Addition to NPV scheme is strong
against many attackers hack the infomation. Some of the
differences can be in the work and [19].
In [20], the authors are identify NPV consist of set of rules
that allows to identify the correct position of neighbor nodes
through some calculations only. This performs checks whether
correct position identified by one neighbor movement may be
possible. This approach in [20], a node several data are to be
collected before take a decision to be taken, based on
situations the solution are to be made where the information
consist of place are to be identified with in a short period of
time. Moreover, the protocol by announcing unknown
locations, that follow a realistic pattern mobility. Among all
nodes NPV protocol is:
1. Any node can be executed reactively at any instant with a
short span period of time.
2. Mobility patterns announces by opposite nodes consist of
strong fake information over time.
Our protocol is to provide a lightweight solution, fully
distributed to the NPV problem that does not require any
structure or a fixed priority based nodes and it is strong
against several attacks, including all nodes are together.
Indeed, non-RF communication, e.g., infrared or ultrasound, is
used in mobile networks, where non-line-of-sight conditions
are frequent and distance can be calculated between device-
to- device in terms of tens or hundreds of meters. An version
of early of this work, some of the verification tests are used to
detect adversaries are to be sketched in NPV protocol.
III.
SYSTEM MODEL
A mobile network and define as a node of communication
neighbors of all other nodes that reach directly its
transmissions [7].Each node its own location with some
maximum error _p, and its share a reference of common time
with the nodes of other: both requirements can be used by
communication nodes with GPS receivers. In addition, nodes
perform Time-of-Flight-based RF ranging with a maximum
error equal to _r. This is a reasonable assumption, it
requirements modifications to off-the-shelf radio interfaces
[16]; also, some of the techniques for precise ToF-based RF
ranging have been developed.
Nodes carry a different identity and can secure information of
other nodes through public key cryptography [23]. We assume
each node X owns a private key, kX, and a public key, KX ,as
well as set of use one-time keys {k0X; KX0}, as proposed in
emerging architectures for authentication and privacy
enhancing communication [2], [21]. Node X can encrypt and
decrypt data with its keys and public keys of other nodes; It
can produce digital signatures (SigX) with its private key. Any
node, a secure communication architectures [2], [22] , can be
binding between X and KX.
Nodes are correct with the NPV protocol, and adversarial if
they delete from it. As secure essentially external information
,we focus on the more powerful internal ones, i.e., nodes can
possess to participate in the NPV and try to advertising own
locations or misleading information. Internal adversaries
cannot messages of other nodes they do not have keys. Thus
attacks occurred the cryptosystem are not considered, as
correct implementation of cryptographic primitives makes
them infeasible.
We classify adversaries into: knowledgeable, if at
each time instant positions are to be know and temporary
identities of all their neighbors, and unknowledgeable,
otherwise; independent, if they act individual, and colluding, if
they actions are to be coordinated.
IV.
NPV OVERVIEW
The presented a distributed solution for NPV, which
allows any node in wireless ad hoc networks is to verify the
location of its communication neighbor without relying on
priority based nodes. The analysis shows that a set of rules
protocol is very strong to attacks by independent as well as
together nodes, even when they have perfect knowledge of
the neighbor of the verifier. Simulation results confirm that
the solutions is effective in identifying nodes announcing false
positions. Only an overwhelming presence of colluding nodes
in the neighbor of the verifier, or the unlikely presence of
distributed network topologies, can degrade the effectiveness
of our NPV.
Future work will aimed at integrating the set of rules, as well
as useful in presence of applications that location of the
neighbors.
In methodology, a complete distributed cooperative
scheme for NPV, which enables a source node, to discover
N.R.Anitha, IJECS Volume-3 Issue-7 July, 2014 Page No.7394-7397
Page 7395
and verify the location of its neighbors. For clarity, here it
describes the principles of route discovery and location
verification process.
Figure1: Neighbor discovery in adversarial environment
A source node, S can initiate the protocol at any time
instant, by triggering the 4- step message exchange process
[POLL, REPLY, REVEAL and REPORT], after completion
of message exchange process, source node S has derives
distance range of neighbor nodes to find the shortest path to
reach destination, after discovery of route S runs verification
tests of several places in order to classify each neighbor node
as either VERIFIED, FAULTY, UNVERFIABLE.
Clearly, the verification tests aim at adversaries
announcing fake positions that are already verified and the
correct nodes whose positions are deemed faulty as well as at
minimizes the number of unverifiable nodes. we remark that
our NPV scheme does not target the creation of a consistent
“map” of neighbor node relations through out an network:
rather, it allows the verifier to classify its neighbors.
V.
NPV PROTOCOL
NPV protocol is used to message exchange between the
verifier and its neighbors communication, followed it
describes at tests run by the verifier. In NPV protocol it
consists of steps mentioned below:
1.Protocol Message Exchange
2.Position Verification
Figure2: Message Exchange Process
a) POLL message:
A verifier S initiates this message. This message is
is anonymous. The verifier of identity is kept hidden.
Software generated MAC address is used here. A public key
K’S carries chosen from a pool of onetime use keys of S’.
b)
REPLY message:
A communication neighbor X receiving the POLL message
will broadcast REPLY message with a time interval MAC
address are generated. This also internally saves the
transmission time. It contains some encrypted message with S
public key (K’S). This message is called as commitment of
XCX.
c)
REVEAL message:
The REVEAL message is broadcasted using verifier’s MAC
address. It contains A map MS, as a proof that S is the verifier
of the original POLL and the identity of verifier ,i.e., it
certifies public key and signature.
d) REPORT message:
A. Protocol Message Exchange:
2. REPLY message
The REPORT carries X’s position, the time of transmission
X’s REPLY, and the list of pairs of times and temporary
identifiers refers to REPLY broadcasts X received. The
identifiers are obtained from the map MS included in the
REVEAL message. Also, X has its own value by including in
the message its digital signature and it certifies public key.
3. REVEAL message
B. Position Verification:
4. REPORT message
The node location verification is not suitable for
dynamic environment, since wireless nodes are in change in
nature, so each and every schedule the wireless nodes
undergoes location verification test, thus results in delay time
of delivery packet ratio.
In Protocol Message Exchange, follow the steps
mentioned below:
1. POLL message
VI. CONCLUSION
Techniques for finding neighbors effectively in a non priority
based nodes are identified. The proposed techniques will
eventually provided authentication from attacked nodes. A set
of rules is strong to adversarial attacks. This protocol will also
update the location of the nodes in an active environment. The
N.R.Anitha, IJECS Volume-3 Issue-7 July, 2014 Page No.7394-7397
Page 7396
performance of the proposed scheme will be effective in
identifying nodes announcing false locations. Future work will
aim at integrating the NPV protocol in a set of rules, as well as
at extending it to a information, useful in presence of
implementation that need each node to continuous verify the
location of its neighbors.
REFERENCES
[1] 1609.2-2006: IEEE Trial-Use Standard for Wireless
Access in Vehicular Environments - Security Services
for Applications and Management Messages, IEEE, 2006.
[2] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J.
Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P.
Hubaux, “Secure Vehicular Communications: Design and
Architecture,” IEEE Comm. Magazine, vol. 46, no. 11,
pp. 100-109, Nov. 2008.
[3] P. Papadimitratos and A. Jovanovic,“GNSS-Based
Positioning: Attacks and Countermeasures,” Proc. IEEE
Military Comm. Conf. (MILCOM), Nov. 2008.
[4] L. Lazos and R. Poovendran, “HiRLoc: High-Resolution
Robust Localization for Wireless Sensor Networks,”
IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 233246, Feb. 2006.
[5] R. Poovendran and L. Lazos, “A Graph Theoretic
Framework for Preventing the Wormhole Attack,”
Wireless Networks, vol. 13, pp. 27-59, 2007.
[6]
S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao,
“Towards a Theory of Robust Localization against
Malicious Beacon Nodes,” Proc. IEEE INFOCOM, Apr.
2008.
[7] P.Papadimitratos,M. Poturalski, P. Schaller, P.
Lafourcade, D. Basin, S. Capkun, and J.-P. Hubaux,
“Secure Neighborhood Discovery:AFundamental Element
for Mobile Ad Hoc Networks,” IEEE Comm. Magazine,
vol. 46, no. 2, pp. 132-139, Feb. 2008.
[8] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes:
A Defense against Wormhole Attacks in Wireless
Networks,” Proc. IEEE INFOCOM, Apr. 2003.
[9] J.Eriksson,
S.
Krishnamurthy,
and
M.
Faloutsos,“TrueLink: A Practical Countermeasure to the
Wormhole Attack in Wireless Networks,” Proc. IEEE
14th Int’l Conf. Network Protocols (ICNP), Nov. 2006.
[10]
Wireless Networks,” IEEE J. Selected Areas in Comm.,
vol. 24, no. 2, pp. 221-232, Feb. 2006.
[13] M. Poturalksi, P. Papadimitratos, and J.-P. Hubaux,
“Towards Provable Secure Neighbor Discovery in
Wireless Networks,” Proc .Workshop Formal Methods.
in Security Eng., Oct. 2008.
[14] E. Ekici, S. Vural, J. McNair, and D.Al-Abri, “Secure
Probabilistic Location Verification in Randomly
Deployed Wireless Sensor Networks,” Elsevier Ad Hoc
Networks, vol. 6, no. 2, pp. 195-209, 2008.
[15] J. Chiang, J. Haas, and Y. Hu, “Secure and Precise
Location Verification Using Distance Bounding and
Simultaneous Multilateration,” Proc. Second ACM
Conf. Wireless Network Security (WiSec), Mar. 2009.
[16]S. Capkun, K. Rasmussen, M. Cagalj, and M.
Srivastava, “Secure Location Verification with Hidden
and Mobile Base Stations,” IEEE Trans. Mobile
Computing, vol. 7, no. 4, pp. 470-483, Apr. 2008.
[17] S.Capkun and J.-P. Hubaux, “Secure Positioning in
Wireless Networks,” IEEE J. Selected Areas in Comm.,
vol. 24, no. 2, pp. 221-232, Feb. 2006.
[18]A. Vora and M. Nesterenko, “Secure Location
Verification Using Radio Broadcast,” IEEE Trans.
Dependable and Secure Computing, vol. 3, no. 4, pp. 377385, Oct.-Dec. 2006.
[19] J. Hwang, T. He, and Y. Kim, “Detecting Phantom
Nodes in Wireless Sensor Networks,” Proc. IEEE
INFOCOM, May 2007.
[20] T. Leinmu¨ ller, C. Maiho¨ fer, E. Schoch, and F. Kargl,
“Improved Security in Geographic Ad Hoc Routing
through Autonomous Position Verification,” Proc. ACM
Third Int’l Workshop Vehicular Ad Hoc Networks
(VANET), Sept. 2006.
[21]PRECIOSA: Privacy Enabled Capability in CoOperative
Systems
and
Safety
Applications,
http://www.preciosa-project.org, 2012.
[22]G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P.
Hubaux, “On the Performance of Secure Vehicular
Communication Systems,” IEEE Trans. Dependable and
Secure Computing, vol. 8, no. 6, pp. 898- 912, Nov./Dec.
2011.
[23]IEEE
Standard
Specifications
for
Public-Key
Cryptography – Amendment 1: Additional Techniques,
IEEE 1363a 2004, 2004.
R.Maheshwari, J.Gao, and S. Das,“Detecting
Wormhole Attacks
in Wireless Networks Using
Connectivity Information,” Proc. IEEE INFOCOM, Apr.
2007.
[11] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos,
and J.-P Hubaux, “A Practical Secure Neighbor
Verification
Protocol
for
Wireless
Sensor
Networks,”Proc. Second ACM Conf. Wireless Network
Security (WiSec), Mar. 2009.
[12] M.Poturalski, P.Papadimitratos, and J.-P.Hubaux,
“Secure Neighbor Discovery in Wireless Networks:
N.R.Anitha, IJECS Volume-3 Issue-7 July, 2014 Page No.7394-7397
Page 7397
Download