“Comparison of layerwise attacks in MANETs” Shekhar Saini, Rajesh Kumar** A.P Department of CSE/IT, M.tech(CSE) GIMT(Kanipla,Kurukshetra), GIMT( Kurukshetra), it.shekhar@gmail.com, rishi.rajesh@gmail.com Abstract: The inherent properties of MANET leads to some II. ATTACKS ON VARIOUS LAYERS OF MANET major issues such as power constraints, radio interference, There are many types of attacks which can collapse the security routing mobility of MANET. These attacks can be performed on various layers of management, service discovery, bandwidth constraints and the network. Some attacks can be performed on any of the layer Quality of Services (QoS). Security has been a prime concern of MANET and others are for a particular layer. The layer-wise among researchers. In this paper, we have surveyed various distribution of the attacks is shown in the diagram below:- protocols, IP addressing, security, attacks which can be implemented on various layers of MANETs. Index Terms: Qos, WMN, DOS, MANET, MAC I. INTRODUCTION In Ad hoc network all the nodes are mobile and can be connected dynamically in an arbitrary manner. There are no fixed routers. All the nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. Ad hoc networks are very helpful in emergency search-and rescue operation, meeting or conventions in which person wish to quickly share information A. Security Issues in MANET The characteristics of MANETs such as: varying topology, mobility of nodes, provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Because of the characteristics of MANETs, to design and development of secure routing is challenging task for researcher. The various attacks which can be Figure 1: Classification of attacks on MANET performed on MANET is a major security flaw in MANET and is the matter of discussion in this paper. 1 A. Physical Layer network with selfish purposes to achieve large throughput, DoS attack can be launched against physical layer by using radio reduce power consumption and increase QoS. Selfish router jamming device or by source of strong noise to interfere the nodes use selfish strategy top result in the congestion of network physical channels and may compromise the service availability. or even the denial of service. With the Characteristics of multi- To perform jamming attack, the attacker can launch the attack hop and public access, it is more vulnerable for WMN to selfish from anywhere. Due to the large coverage area and deployment client nodes attack. The selfish attacks on routing nodes will also of wireless mesh routers in WMN, physical layer is on the target have large impact on the whole network performance. of DoS attacks. Different types of jamming attacks [1] are: 1) Trivial Jamming Attack: In this attack an attacker constantly C. Network Layer transmits noise. Network layer protocols extend connectivity from neighboring 2) Periodic Jamming Attack: In which an attacker transmits a 1-hops nodes to all other nodes in MANET. The connectivity short signal periodically. These transmissions can be scheduled between mobile hosts over a potentially multi-hop wireless link often enough to disrupt all other communications, for example, strongly relies on cooperative reactions among all network with a very less period. It is also called scrambling. nodes. 3) Reactive Jamming Attack: In this attack an attacker transmits 1. Wormhole attack: An attacker records packets at one location a signal whenever it detects that another node has initiated a in the network and sends them to another location. Routing can transmission, causing a collision during the second portion of the be disturbed when routing control messages are sent anywhere message. else. This tunnel is referred as a wormhole [4]. Wormhole B. MAC Layer attacks are severe threats to MANET routing protocols. When a MAC layer incorporates functionality uniquely designed to wormhole attack is used against an on-demand routing protocol WMN as stated in draft 3.0 released in March, 2009 [2]. In it, the (in which a new route is generated at every request), the attack ability to search networks, participate and leave networks, and could prevent the route to be discovered other than through the coordinate to the radio medium is included. Possible DoS attacks wormhole. are given below [3]: 2. Blackhole attack: The blackhole attack has two features. 1. MAC Misbehavior: DoS attack can be implemented via Firstly, the node uses the mobile ad hoc routing protocol, like corrupting CTS / RTS frames by following steps: AODV, to advertise itself as having a valid route to a destination a) Unprompted CTS Attack: In this type of attack an attacker node, even though the route is repeated, with the purpose of transmits a CTS message with a long message duration causing disturbing packets. Second, the attacker consumes the disturbed all recipients to halt transmission for this duration. packets without any forwarding. However, the attacking node is b) Reactive RTS Jamming Attack: Whenever a node detects an having the risk that neighboring nodes will monitor and make RTS message, it disrupts these messages by immediately fail the ongoing attacks. There is a more difficult to detect form initiating a transmission. The effects of this attack are of these attacks when an attacker selectively forwards packets. exacerbated by the exponential back-off scheme. An attacker changes or modifies packets produced by some c) CTS Corrupt Jamming: When a RTS message is received, an nodes, while leaving the packets from the other nodes without attacker transmits noise during the CTS response. any change, which limits the suspicion of its wrong doing. 2. Selfish attacks: The selfish nodes will reduce the resource of 3. Grayhole attack: Grayhole attack is an extension of Blackhole Wireless channel which can be used by real nodes, thereby affect attack in which a malicious node’s behavior is exceptionally the network performance, and even interrupt the network unpredictable. There are three types of Grayhole attacks [1]. In service. There are types of selfish nodes in WMN, selfish client first, the malicious node may drop packets from certain nodes nodes and selfish router nodes. Selfish client nodes access while forwards all other packets. In second type, a node may 2 behave maliciously for a specific time, but after that it behaves connect and communicate using TCP, firstly they must establish just like other ordinary nodes. Third type of attack is the a TCP connection using a three-way handshake process. combination of both attacks i.e. the malicious node may drop 2. Session hijacking: Packets from specific nodes for certain time only, later it Session hijacking takes advantage of the fact that most behaves as a normal node. Due to these characteristics, detection communications are protected (by providing credentials) at of Grayhole attacks is not an easy task. A Grayhole attack can session startup, but not thereafter. In the TCP session capturing disturb route discovery process and degrade network’s attack, the attacker adopts the victim’s IP address, determines the performance [5]. right sequence number that is expected by the target node, and 4. Byzantine attack: Attacks where the adversary has full control then performs a Denail of service attack on the victim. Thus the of an authenticated device and can perform arbitrary behavior to attacker take place of the the victim node and continues the disrupt the system are referred to as Byzantine attacks [6]. session with the target. 5. Sybil attack: A Sybil attack [7] is an attack in which a node imitates the appearance, a malicious device knowingly making E. Application layer attacks multiple identities, behaving as if there are a larger number of Application layer attacks can be mobile viruses, worm attacks, nodes (instead of just one). Malicious device extra identities are and repudiation attacks. referred to as Sybil identities or Sybil nodes. 1. Mobile virus and worm attacks: The application layer contains 6. Flooding attack: The attacker transmits a flood of packets user’s data, and it normally supports no of protocols such as toward a target node or to congest the network and decreases its HTTP, SMTP, FTP. Malicious code, which includes many performance. A flooding Denail of service attacks are difficult to viruses and worms, is applicable across operating systems and handle. Attacker may use any type of packets to congest the applications. As we know, malicious programs are widely spread network. in networks. There are a number of techniques by which a worm can discover new machines to exploit. One example is IP address D. Transport layer attacks scanning used by Internet worms. That technique consists of The objectives of TCP-like Transport layer protocols in MANET generating probe packets to a vulnerable UDP/TCP port at many include setting up of end to end connection, reliable delivery of different IP addresses. Hosts that are hit by the scan respond, packets, flow control, congestion control. Like TCP protocols in receive a copy of the worm, and hence get infected. The Code the Internet, the mobile node is vulnerable to the classic SYN Red worm [9] is one of the scanning worms. Some worms use a flooding attack or session hijacking attacks. However, a loophole of the system. For example, Worm.Blaster and MANET has a higher channel error rate when compared with Worm.Sasser [9] each use a different loophole: Worm.Blaster wired networks. Because TCP does not have any mechanism to uses a sys-tem RPC DCOM loophole, and Worm.Sasser uses the distinguish between whether a loss is due to congestion, system LSASS (local security authentication subsystem service). randomized error, or malicious attacks, TCP multiplicatively In MANET, an attacker can also produce a worm attack using decreases its congestion window upon experiencing losses, any loophole of the system of the mobile ad hoc network which degrades network performance significantly [8]. 2. Repudiation attack: On the network layer, firewalls can be 1. SYN flooding attack: installed to filter the packet coming in and going out of the The SYN flooding attack is a denial-of-service attack. The network. On the transport layer, entire connections can be fed to attacker generates a large number of incomplete TCP the port. But these solutions do not answer the problem of connections with a target node, but it did not complete the authentication or non-repudiation completely. Repudiation is a process to fully establish the connection. For two nodes to denial of participation in all or part of the communication processes. For example, a selfish person could deny conducting 3 an operation on a credit card purchase, or deny any on-line bank applied in MANET. IDS are some of the latest security tools in transaction, which is the prototypical repudiation attack on a the battle against attacks. commercial system. Hence there is not any complete way to make the attacks to happen or stop them but we can make the effect of these attack F. Multi-layer attacks: less. One way to do this is active queue management. There are Some security attacks can be launched from multiple layers many active queue management techniques like RED, ARED, instead of a particular layer. Examples of multi-layer attacks are SFB etc which can make the effect of attacks less by using the denial of service (DoS), man-in-the- middle, and impersonation queues efficiently. attacks. REFERENCES 1. Denial of service: Denial of service (DoS) attacks could be [1] Jeremy J. Blum, launched from several layers. An attacker can attack on physical Eskandarian,"Denial layer and employ signal jamming, which disrupts normal Communication Networks" in 11th IEEE conference on Intelligent of Andrew Service Neiswender Attacks on and Azim Inter-Vehicle Transportation Systems, 2008, pp 797-802. communications. At the link layer, malicious nodes can occupy [2] IEEE 802.11s Draft 3.0 released in March, 2009. channels through the capture effect, which takes advantage of [3] John Bellardo and Stefan Savage, "802.11 Denial-of-Service the binary exponential scheme in MAC protocols and prevents Attacks: Real Vulnerabilities and Practical Solutions" in Proceedings of other nodes from channel access. At the network layer, the the 12th Conference on USENIX Security Symposium - Volume 12, pp routing process can be interrupted through routing control packet 2-2. modification, selective dropping, table over- flow, or poisoning. [4] M. Ilyas, The Handbook of Ad Hoc Wireless Networks, CRC Press, At the transport and application layers, SYN flooding, session 2003. hijacking, and malicious programs can cause Denail of service [5] Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc attacks. Routing.IEEE Security & Privacy, pp. 28-39, 2004. [6] Kai Han1, Binoy Ravindran1, and E. Douglas Jensen, "Byzantine- 2. Impersonation attacks: Impersonation attacks are just the first Tolerant, Point To-Point Information Propagation in Untrustworthy and step for most attacks, and are used to launch further sophisticated Unreliable Networks" in International Conference on Network-Based attacks. For example, a malicious node can precede an attack by Information Systems, 2007. altering its MAC or IP address. [7] Douceur, J.R., Donath, J.S. "The sybil attack". In: Proceedings for 3. Man-in-the-middle attacks: An attacker sits between the the 1st International Workshop on Peer-to-Peer Systems, 2002, pp 251- sender and the receiver and sniffs any information being sent 260. between two ends. In some cases the attacker may impersonate [8] H. Hsieh and R. Sivakumar, Transport Over Wireless Networks. the sender to communicate with the receiver, or impersonate the Handbook of Wireless Networks and Mobile Computing, Edited by receiver to reply to the sender Ivan Stojmenovic. John Wiley and Sons, Inc., 2002. CONCLUSION [9] N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, ”A Security is an essential service for wired and wireless network Taxonomy of Computer Worms”, First Workshop on Rapid Malcode communications. The characteristics of MANET pose both (WORM), 2003. challenges and opportunities in achieving the security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. There are many ways by which we can oppose the attacks on various layers like such as tokens and smart cards, can be used to protect against physical attacks. intrusion detection systems (IDS) is also proposed and 4