Uploaded by isani5005

2 - Developing an Efficient Hybrid Routing Protocol for - Copy

advertisement
Proposed Hybridized Routing Protocol for
Mitigation of FloodingAttacks in MobileAd-HocNetworks
1
EHGadzama, 2IRSaidu
Department of Cyber Security
Nigerian Defence Academy, Kaduna, Nigeria
1,2
gadzamahe@nda.edu.ng
+2348126980414
rambo@nda.edu.ng
+2348034513644
ABSTRACT
Mobile Networks Ad-Hoc (MANET) are wireless communication technologies that connect mobile
devices such as phones, laptops, and smart devices by providing flexibility, seamless
communication, and mobility to all devices in the network. MANET is also a continuously selfconfiguring, infrastructure-less network of mobile devices connected wirelessly. Because there is
no central control infrastructure to monitor and control the devices that join the network, MANET
has security flaws. MANET is characterized by these security flaws, which make it vulnerable to
attacks such as denial of service attacks. Among the various attacks that exist in the MANET
environment, packet flooding is a common one that has a devastating effect on MANET nodes and,
if left undetected, can result in the entire network crashing. There is a requirement for data to be
kept secure and confidential. The separation of trusted nodes from malicious nodes, as well as the
protection of data packets from attackers, are the study goals in this work. To avoid unauthorized
access and detect malicious nodes, a highly secure Hybrid Trust-based Anonymous Authenticated
Routing Protocol (HTBAARP) is being developed to mitigate flooding assaults. This will be
accomplished by combining a Trusted Management Scheme (TMS) with a Modified Authenticated
Anonymous Routing Protocol (MAASR). To evaluate performance, simulation will be performed
using NS-2 in conjunction with MATLAB R2020a. The suggested method is predicted to increase
network throughput, packet delivery ratio and routing interruption by reducing routing delay and
overhead.
KEYWORDS:Mobile Networks, Flooding,Hybrid, Protocol,MANET,MaliciousNodes,Routing
1
procedure to regulate the trust level of each node in
the M ANET network. When participating nodes
in MANETs want to build a network with an
appropriate level of confidence, trust management
is required (Jin-Hee, 2010). These security flaws in
MANET deter people from using it, reducing the
enormous benefits it provides in terms of
flexibility, adaptability, and cost. Passive and
Active attacks are the two types of MANET
attacks.
INTRODUCTION
Infrastructure
wireless
networks
and
infrastructure-less wireless networks are the two
types of wireless communication networks.
Infrastructure wireless networks means that
communication between nodes is controlled
centrally, whereas infrastructure-less means that
communication between network nodes is
established through hop-to-hop, and this type of
network is also known as ad hoc network (Abu
Zant& Yasin, 2019). Because the connection
between neighbor nodes and end-user nodes does
not rely on infrastructure to form a network, and
nodes in an ad-hoc network communicate with
one another via multi-hop, all required services
such as forwarding, maintenance, routing, and
administration are performed by the nodes
themselves (Sandeep & Rajesh, 2014). MANET's
applications are numerous and growing, as more
gadgets become portable and capable of wireless
communication. However, when security and
communication integrity are critical, as they are in
medical and military applications, the lack of a
central control architecture that allows MANET to
adapt to diverse use scenarios is the key obstacle
(Gurung, 2017).
The attacker or attackers just gather information
about the network and other network nodes in
passive attacks, which do not affect the network's
operation or performance. Eavesdropping, traffic
analysis, and monitoring are examples of passive
attacks (Kumar et al, 2018). The attacker node's
goal during an active attack is to degrade network
performance, integrity, and security by discarding,
rerouting, changing, losing, or delaying packets in
the network. Spoofing, Black-hole, Gray-hole, and
Flooding attacks are some of the most common
active attacks in MANET (Kumar et al, 2018).
Among the different assaults that exist in the
MANET environment, packet flooding is a
common one that has a catastrophic effect on
MANET nodes and, if left undiscovered, can
result in the entire network failing (Mallikarjuna&
Anusha, 2020).
Different types of routing protocols are used in
MANETs, each of which is tailored to the
network's
unique
characteristics
(Dhenakaran&Parvathavarthini, 2013). A routing
protocol is a standard that defines how nodes in a
wireless domain select how to route incoming
packets between nodes, according to Kumar &
Kumar (2012). (devices). Over the years, many
different MANET routing protocols have been
developed. There are three types of routing
protocols: proactive, reactive, and hybrid routing
protocols (Abdulleh et al., 2015). MANETs have
become one of the most popular areas of research
in recent years due to the problems they provide to
related protocols (Ankur & Prabhakar, 2013).
Early routing protocols, such as AODV, were
primarily concerned with how to efficiently route
data packets in MANETs without taking into
account the possibility of a malicious node
stealing or collecting network traffic information
(Wei, 2014). As a result, academics have placed a
high priority on developing an anonymous routing
protocol that can improve MANET security
(Paolo et al, 2017).
Active assaults are more dangerous and costly in
MANET (Hajiheidari et al, 2019) than passive
attacks, as they cause severe network performance
degradation, reduced throughput, and energy
consumption of legitimate nodes in the network,
lowering the network's overall lifespan. With the
widespread use of MANET technology in military
applications
for
fast
and
dependable
communication in training and combat situations,
civilian and paramilitary activities such as searchand-rescue operations, and other civilian and
paramilitary activities, the threat of active attacks,
particularly flooding attacks, is seen as capable of
derailing these vital operations.
The remainder of the paper is organized as
follows: Section two discusses the literature
review, while Section three discusses the study
methodologies. Section four contains the results
and discussion, while section five contains the
conclusion and future work.
ResearchProblem
Inadequate
provision
of
an
authorized
authentication of routing protocol that can identify
and mitigate all sorts of flooding assaults is one of
Nodes in the network must be logically trusted for
dependable communication and relationships. To
do this, the researchers used a trust management
2
the challenges connected with securing mobile adhoc networks (MANETs) owing to flooding
attacks. Many studies have demonstrated that the
majority of existing techniques suffer from routing
delay and overhead. The majority of current
techniques or protocols do not have the
aforementioned security elements, resulting in a
vulnerability in the MANET security system. In
addition, numerous researchers have worked to
improve MANET security by changing the
standard Ad-hoc On-Demand Distance Vector
(AODV) routing protocol. The majority of offered
solutions, on the other hand, do not examine
network packets in order to detect malicious or
illegitimate packets. As a result, a reliable system
that will improve MANET network performance
is required. The goal of the research project is to
create a hybrid routing protocol for MANET
flooding mitigation. This will be accomplished by
modifying an existing Authenticated Anonymous
Secured Routing Protocol (AASR), developing
and evaluating a trust-based management scheme,
combining the trust-management scheme with the
Modified Anonymous Authenticated Secured
Routing Protocol, evaluating the performance of
the developed hybrid routing protocol under
flooding attacks in terms of delay and packet
overhead, and finally implementing the protocol
using a test-bed.
attack plummeting strategy in MANET. The
authors' study includes a computation of average
node packet data gathered during regular unattacked operations and a comparison of the
average packet data to under-attack packet
conditions. When the packets received from a
particular node exceed the average expected from
legitimate nodes in the network, the suspicious
malicious node is blacklisted by its neighbor node,
and an Alarm message is sent to all other
neighboring nodes around the suspected malicious
node, instructing them to update their routing
tables with the new information about the
malicious node, effectively blacklisting the node
and disconnecting it from the network. The
simulation in NS-2 produced improved PDR,
throughput, and reduced overhead, according to
the results.
Mallikarjuna and Anusha (2020) worked on feature
extraction and classification model based on ANFIS
for an optimized and hybrid energy-conscious
routing model for effective detection of flooding
attacks in a MANET environment (Adaptive NeuroFuzzy Inference System). The retrieved feature was
trained and classified using the ANFIS classifier. To
identify flooding threats in MANETs, a security
mobile agent (SMA) linked with the AODV protocol
called security mobile agent-adhoc on-demand
routing protocol (SMA2AODV) was developed. To
minimize flooding assaults, the routing protocol
SMA2AODV model is combined with Ant
Colony Optimization (ACO) and Fitness Distance
Ratio Particle Swarm Optimization (FDR PSO).
ACO determines an energy-efficient route, while
FDRPSO optimizes all nodes that are energy
consumed. Energy was addressed as a function of
fitness in the hybrid ACO-FDR PSO optimization
technique. The NS-2 simulator was used in
conjunction
with
current
benchmark
methodologies to assess the performance
indicators in question.
LITERATURE REVIEW
Gurung (2017) proposed a new method for
preventing route request flooding in MANET. A
method known as the Mitigating Flooding Attack
Mechanism (MFAM) was employed in the
suggested solution to reduce the effect of a nonaddressed spoofing attacks. This approach relied
on the deployment of special nodes known as FIDS (Flooding – Intrusion Detection System),
which are configured in sniff mode to detect
traffic from neighboring nodes, evaluate it, and
interact with the rest of the network's nodes. The
MFAM is divided into three phases: dynamic
threshold computation (during which the RREQ
packet rate is set), confirmation phase (during which
the F-IDS confirms the intent of a suspicious node to
be malicious or legitimate, then informs the entire
network of the threat presence via an ALERT
package), and finally resetting phase (during which
the malicious node restrictions are lifted and node
status is set to neutral). NS-2.35 software is used to
model the mechanism.
Security mobile agents (SMA) were established
by Thanh and Thai (2017) to detect flooding
attacks. SMA2AODV, an enhanced protocol, is
proposed by including these SMAs into the
AODV protocol's discovery route procedure.
SMA agents are employed to collect data
throughout the training period to determine the
system's minimal timeslot (the time-slot required
to successfully discover a path from a source node
to a destination node) (). Before broadcasting the
RREQ packet received from the source node to
the neighbors, the node confirms its security after
Using the neighboring nodes database, Vimal and
Nigam (2017) suggested a flooding-based DDOS
3
the training phase. A flooding attack is deemed to
have occurred if the route discovery time-slot is
less than the system's minimum time-slot (), as the
attacker then adds to its black list. Nodes on the
black list will have their RREQ packets deleted.
The disadvantage of this strategy is that it is only
valid during the training period if no malicious
nodes exist.
eswithallnodeslegitimate.
b.
CreateaMANETscenariowithmultiplemobilenod
eswithmaliciousnode.
c. Developatrust-basedmanagementscheme
forMobileAdHocNetwork.
d.
Determineatrustvaluecalculationalgorithmviadire
ctandindirectobservation.
Wenchao and Li (2014) introduced a new
intrusion detection system in wireless sensor
networks based on the k-nearest neighbors (kNN)
classification algorithm to distinguish abnormal
from normal nodes by analyzing their behaviour.
The number of routing messages that can be
delivered over a period of time, the number of
nodes with various destinations in the sending
routing packets, and the number of nodes with the
same source node in the receiving routing packets
are all represented by an m-dimensional vector.
The research reveals that the system has a high
detection accuracy, however it doesn't explain
why or how the training datasets are created.
e.
Determineatrustthresholdfornoderejectionand
blacklisting.
iv. IntegratethetrustmanagementschemewiththeModifiedAnonymous
Authenticated
SecuredRoutingProtocol(MAASR)toobtainahybri
droutingprotocol:
a.
Determinethresholdfornetworkdelayandbufferingt
opreventincorrectnode
METHODS
ResearchDesign
rejectionandblacklisting.
The following is the design and development
strategy that will be used to achieve each of the
research work's objectives, as well as the
processes required to complete each activity:
b.
Compressandintegrateencryptedanonymousauthen
ticationpacketswithinthe
networkforeasyupdatingwithtrustmanagementsche
me.
i.
TomodifyandevaluatetheAuthenticatedAnonymous
SecuredRouting
Protocol(MAASR)forMobileAdHocNetwork.
v. Evaluate the performance of the developed
routing protocol under flooding attacks in terms
ofDelayand PacketOverhead.
ii.
Modifypacketheaderforanonymousonionencryptio a. Simulate the developed hybrid routing protocol
under flooding attacks, measureand compare
n as follows:
performance indices with non-hybrid routing
a.
protocol
like
AASR,MAASRandtrustGeneratepublickeysizeforeachparticipatingnod
basedprotocolalone.
einthenetwork.
b. ProposedHybridProtocol
b.
After merging the anonymous secured routing
Developasourceandintermediatenoderouterequ
protocol with a trust management system, the
est.
proposed hybrid routing protocol ensures a secure
c.
MANET that can detect and mitigate DDOS
Implementadestinationnodeverificationsequenc
assaults. Without jeopardizing network efficiency,
e.
speed, or performance, flooding attacks can be
easily identified and managed. This will be
iii.
accomplished by encrypting the public and private
EvaluatetheperformanceoftraditionalAASRandthemo
keys of each RREQ packet before broadcast, and
difiedMAASRprotocolsunderfloodingattacks:
all receiving intermediate nodes determining the
a.
sending node's trust value before processing the
CreateaMANETscenariowithmultiplemobilenod
received packet, with low trust values resulting in
4
blacklisting of nodes until their status is
dynamically updated as they change behavior. To
avoid flooding, nearby nodes disregard packets
from blacklisted nodes with low trust scores.
When a neighbor node has a high trust value, it
onion encrypts the packet and forwards it after
failing to decrypt it using private, indicating that
the message is not destined for it. The destination
node successfully decrypts the sent packet,
prepares, and sends RREP, which is subjected to
the same scrutiny and trust value verification at all
intermediate nodes, as well as onion encryption,
until it reaches the source node, which forwards
the data packet via the shortest established secured
route. This ensures the network's anonymity and
security. Figure 1 depicts a flowchart of the
overall proposed Hybrid Trust-based Anonymous
Authenticated
routing
system.
Figure1:ProposedHybridTrust-basedAnonymousAuthenticatedRoutingProtocol(
Start
Source Node Encrypt Anamolyzed RREQ
Source Broadcast RRFQ to Neighbour Nodes
Neighbour Nodes Received Packets
n
Neighbour Nodes Determine Trust Value from
Table
Neighbour Node Attempt Decryption of
RREQ
Prepare and send Data Packet through
Established Route
Finish
5
authenticated secured protocol (MAASR), trust
management scheme (TSM), and hybrid protocol
(HTBAARP). Table 1 summarizes the simulation
parameters.
Performance Evaluation by Simulation
The network simulation will be run in three
different
scenarios:
modified
anonymous
DataPresentation
Tables 2 and 3 show how the information will be
organized and examined. Each result will be
determined after a simulation of the existing
Authenticated Anonymous Secured Routing
Protocol (AASR), the modified Authenticated
Anonymous
Secured
Routing
Protocol
(MAASR), the trust management scheme
(TMS), and the proposed Hybrid Trust-based
Anonymous Authenticated Routing Protocol
(HTBAARP) in terms of the selected metrics
(throughput, delays, packet delivery ratio)
against
the
number
of
nodes
6
secure communication in MANETs.
RESULTS
The research effort will be set up in a real-life b.
scenario utilizing a communication enable
hardware device called Raspberry Pi, and the
explanation of the results will be based on the
observations collected graphically, which presents
result of the simulation.
c.
CONCLUSION
AASR modification will be developed to be
adaptable to different hybridization efforts which
can be used in other communication research
applications such as Vehicular Ad-Hoc Networks
or Wireless Sensor Networks.
Due to the severity of successful attacks like
flooding, leading to denial-of-service scenarios,
this research proposal presents a methodology to
develop a hybrid routing protocol to improve
security in MANET, which is a serious challenge
to the deployment of networking technology in
high-risk applications like military and critical
civilian infrastructure. The hybrid routing
protocol is designed to detect, mitigate, and
isolate rogue nodes while notifying the node's
status and trust level throughout the network
using a combination of a Modified Anonymous
Authentication Secured Routing Protocol and a
Trust-Based Management Scheme. This proposed
technique helps to increase network security
while assuring a short packet delivery latency and
little packet overhead across the network.
detection rates during RREQ flooding, Data
flooding, Error flooding, Hello flooding, and SYN
flooding.
The proposed solution's effectiveness will be
assessed in terms of high malicious
REFERENCES
Abdulleh, M.N., Yussof, S. and Jassim, H. S.
(2015). Comparative Study of Proactive,Reactive
and Geographical MANET Routing Protocols.
Communications and Network,125137.DOI:http://dx.doi.org/10.4236/cn.2015.72012
.
Abu Zant, M., & Yasin, A. (2019). Avoiding and
Isolating Flooding Attack by
EnhancingAODVMANETProtocol(AIF_AODV).
SecurityCommunicationNetworks,
Ankur, O. B. and Prabhakar, L. R. (2013).
MANET:
History,
Challenges
andApplications.InternationalJournalofApplicatio
norInnovationinEngineering&Management(IJAIE
M).(2), 9,ISSN2319–4847.
EXPECTEDCONTRIBUTIONTOKNOWLED
GE
This research work is intended to give a
comprehensive knowledge-base for other
researchers in the field of Mobile Ad-Hoc
Network (MANET) based on the literature
review and study:
Gurung, S. (2017). A novel approach for
mitigating route request flooding attack
inMANET.WirelessNetworks.doi:10.1007/s11276
-017-1515-0
a. A hybrid routing protocol will be designed for more
7
Dhenakaran, S., &Parvathavarthini, A. (2013). An
overview of routing protocols in mobilead-hoc
network. International Journal of Advanced
Research in Computer
ScienceSoftwareEngineering, 3(2).
Paolo P., Luca C., & Dario M. (2017). An
Anonymous inter-networks Routing Protocol
fortheinternetofThings,JournalofCyberSecurityan
dMobility.6(2),127-146.
Sandeep, S., & Rajesh M. G (2014) A Cross
Layer Approach for Intrusion Detection
inMANETs, International Journal of Computer
Applications Buddha University
GreaterNoida,India. 93(9), 0975 –8887
Hajiheidari, S., Wakil, K., Badri, M.,
&Navimipour, N. J. (2019). Intrusion
detectionsystems in the Internet of things: A
comprehensive investigation. Journal of
ComputerNetworks,160,165-191.
Jin-HeeC.,AnanthramS.,&IngRayC(2010)Asurveyontrustmanagementformobile
Adhocnetworks.IEEECommunicationsurvey&Tut
orials, 1-22.
Thanh, & Thai Ngoc, (2017). Routing protocol
reduces the harm of flooding attacks in mobile ad
hoc network,” Journal of Communications, 12(7),
371–378.
Kumar,S.andKumar,J.(2012).Comparativeanalysi
sofproactiveandreactiveroutingprotocols in
mobile ad-hoc networks (MANET): Journal of
Information and
OperationsManagement.ISSN:0976–7754&EISSN:0976–7762,3(1),92-95
Vimal, V., & Nigam, M. J. (2017).Plummeting flood
based distributed-DoS
attacktoupsurgenetworksperformanceinadhocnetworksusingneighborhoodtabletechnique.Pa
perpresentedattheTENCON,IEEERegion10
Conference.
Kumar,V.V.,&Ramamoorthy,S.(2018).Secureadh
ocon-demandmultipathdistancevector routing in
MANET. Paper presented at the Proceedings of
the InternationalConferenceonComputingand
CommunicationSystems.
WeiY.(AnonymousRoutingprotocolwithAuthentic
atedkeyEstablishmentinwirelessAd Hoc
Networks. international Journal of Distributed
Sensor Networks, 1-10
DOI:http://dx.doi.org/10.1155/2014/222350.
Mallikarjuna N & Anusha K (2020). An
optimized and Hybrid Energy Aware
RoutingModel for Effective Detection of
Flooding Attacks in MANET Enviroment,
ResearchSquare,VIT-university,Chennai, India.
Wenchao L., P. & Li, J. (2014) , “A New
Intrusion Detection System Based on KNN
Classification Algorithm in Wireless Sensor
Network,” Journal of Electrical and Computer
Engineering, 2014(8), Article ID 240217.
8
Download