Hybrid Cryptography for Secure Intrusion

advertisement
Hybrid Cryptography for Secure Intrusion Detection System
for MANETs
1
Shreyas S. Jathe
PG Student, Department of
Computer Engineering
G.H.R.C.E.M.
Pune, India
shreyasoct@gmail.com
ABSTRACT
Mobile Ad Hoc Networks (MANETs) consist of a set of
mobile nodes, which can move freely. MANET does not
require a fixed network infrastructure. Mobile ad hoc network
(MANET) is one of the most important and unique
application in which every single node works as both a
transmitter and a receiver and they trust their neighbors to
relay messages. Many IDS (Intrusion Detection System) have
been proposed for detecting malicious nodes. On such IDS,
Enhanced Adaptive Acknowledgement (EAACK) has over
come the drawbacks of watchdog, ACK and TWOACK. In
this Paper, identification of inadequate nature of EAACK in
scenarios of link breakage, source maliciousness and partial
packet dropping and an improved algorithm called improved
EAACK to tackle the security issues. Thus proposed system
explicitly stated that the Hybrid Cryptography technique is
used to reduce network overhead. We then provide some
directions for future research.
Keywords
Mobile Ad Hoc Networks (MANET), Intrusion Detection
System (IDS), Enhanced Adaptive ACK, Rivest Shamir
Adleman, Data Encryption Standard and Digital Signature.
INTRODUCTION
MANET (Mobile Ad hoc network) is a collection of mobile
nodes consists of both a wireless transmitter and receiver
communicating via each other using bidirectional wireless
links. Acting as a peer to peer system infers that each node or
user in the network behaving as a data endpoint or
intermediate repeater. MANETs are usually a self-forming,
self- maintained and self-repairs itself process allowing for
extreme network flexibility, which is generally used in critical
mission applications like military purposes or emergency
recovery. Having the minimum configuration and quick
distribution of nodes in preparation for work make MANET
ready to be used in emergency circumstances. Now a day,
MANET is becoming more and more widely implemented in
the industry. Taking into the consideration MANET is popular
among critical mission applications; importance of a network
security plays in a vital role. Unfortunately, the open medium
and remote distribution of MANET make it physical to
various types of attacks. Communication between distinct
nodes are maintaining effectively by Routing protocols.
Routing protocol not only discovering the topology of a
network but also creates a route for forwarding data packets
and dynamically maintaining the routes between any pair of
2
Mrs.Vidya Dhamdhere
Faculty, Department of Computer
Engineering
G.H.R.C.E.M
Pune, India
Vidya.dhamdhere@gmail.com
communicating nodes. Due to mobility of nodes, the routing
protocol are such designed that to adapt frequent changes in
the network system.
EAACK is the pleasantly new approach decides the preceding
approaches problems by the combination of Digital signature
and the RSA concepts. EAACK is an acknowledgement based
on the Intrusion Detection System. Acknowledgement based
detection scheme consist of three parts of EAACK are ACK,
Secure Acknowledgement (S-ACK) and misbehavior report
authentication (MRA). In EAACK, it is significant to ensure
all acknowledgement packets are reliable and undamaged. In
another way, if the attackers are easily to produce
acknowledgement packets, all of the three schemes will be
susceptible. For that we can use a concept of digital signature
in the EAACK scheme. The concept of the digital signature
scheme is that all the acknowledgement packets are digitally
signed before they are sent out in the scheme and authenticate
until they are obtained. Additional resources required in the
digital signature, which are used in the MANETs. To
implement these things, we can apply both DSA and RSA
digital signature scheme.
To build up this security in the mobile ad hoc networks, we
could be use as a deviceful approach called Hybrid
Cryptography Technique, because it is aspired to correspond
data with high security. The Hybrid Cryptography Technique
can be a combination of both symmetric and asymmetric
cryptography techniques. By including the symmetric key it
can be used to accomplish both the Confidentiality and
Integrity. By making a combination of both the cryptography
techniques i.e. symmetric and asymmetric, the hybrid
cryptography technique could be considered for better
security.
RELATED WORK
Elhandi M. Shakshuki, Nan Kang, Tarek R. Sheltami, the
author has explains various intrusion detection in MANETs
and its disadvantages. EAACK supported for solving false
misbehavior report problem and described some new
techniques, which are related to the enhanced adaptive
acknowledgement. The techniques which are used, solves the
problem of ACK, TWO ACK & Watchdog scheme. On
acknowledged packets the techniques depend on that, so the
attacker prevent by Digital Signature from attacking the
packets. ACK, S-ACK, MRA & Digital Signature are the
parts which namely consist by EAACK. A novel intrusion
detection system called as EAACK protocol that is uniquely
designed for MANETs and taking the comparison across other
popular way scheme through simulations [1].
Tiranuch Anantualee and Jie Wu, the author has study and
provides survey on mobile ad hoc network of various
intrusion detection implementation like stand alone intrusion
detection systems, distributed and cooperative intrusion
detection system, hierarchical intrusion detection system and
mobile agent for intrusion detection system and having the
survey on sample intrusion detection system for MANETs and
intrusion detection techniques like node cooperation in
MANETs. Node in the network performs some quality work,
which is similar to social behavior of human in a community.
A node tries to expand its interest by choosing whether to
cooperate in network. [2].
Nan Kang Elhadi M.Shakshuki and Tarek R. Sheltami, the
author has explain the security which is based on the
acknowledgements packets, that how to secure those packets
from attacks and explain intrusion detection system scheme
for MANETs and there improvement which increases a slight
in network overhead, using EAACK2 which is called as
improved version of EAACK, EAACK2 which performs
better in the existence of false misbehavior and partial
dropping not only brings out a better performance in the
presence of forged acknowledgement packets, but also
encourage the packets integrity when potential attack occur.
The author also had a plan to investigate other authentication
scheme and evaluate the performance in the algorithm. Due to
this, memory space of mobile nodes preserves better battery
[3].
Vehbi C. Gunger and Gerhard P. Hancke, author tells about
various applications of wireless networks, which are used in
the industries and aim to provide a new look at the current
state of the art in industrial wireless sensor network and
examine the issues in the field which is still open research and
explain various challenges like resource constraints, dynamic
topologies & harsh environment condition, quality of service
and many more. The author studied about the designing of
goals in different applications requirements and classified the
design principles and technical approaches into three
categories hardware development, software development and
system architecture and protocol design. Descriptions of
standardization activities are briefly described in Industrial
wireless sensor networks. [4].
Kejun Liu, Jing Deng, Pramod K. Varshney and Kashyap
Balkrishnan, in this paper, the author has explains that it is
necessary to work for TWO-ACK on routing protocols such
as Dynamic Source Routing (DSR). The advantage of the
two-acknowledgement scheme described has the flexibility to
control the network overhead and checked the performance
degeneration caused by such misbehaving nodes in MANETs
also explains a technique, term TWO-Acknowledgement to
distinguish and reduce the effort of such routing misbehavior.
The TWO-Acknowledgement technique is situated on a
simple TWO-Acknowledgement packet, which is sent back by
the receiver of the next hop link, having the comparison with
other approaches to conflict the problem, such as the
overhearing technique, the TWO-Acknowledgement scheme
reduces several problems including uncertain collision,
receiver collision and limited transmission power. The TWOAcknowledgement scheme can be used as an add-on facility
to routing the protocol such as Dynamic Source Routing
(DSR) in MANETs. It is examine that how to add the TWOAcknowledgement scheme to the other types of routing
scheme and the open networks [5].
Ramya K, Beaulah David and Shaheen H, this paper tells
about the novel intrusion detection system, which provides
security in the mobile ad hoc networks called as EAACK. In
this paper, it also includes the concept of digital signature in
EAACK, which prevents the attackers from initiating forged
acknowledgement attacks and explains the strength of the
security which is in the mobile ad hoc networks and
introduced new way called as Hybrid Security Protocol. It
provides integrity, confidentiality and authentication. Hybrid
Security Protocol, which consists of cryptography, based on
elliptic curve, Dual RSA algorithm for authentication and
MD-5 for integrity and the concept of using a combination of
both symmetric and asymmetric cryptographic techniques
using this techniques it carry out better security with integrity
[6].
R. L. Rivest, A. Shamir and L. Adleman, in this paper the
authors has explain about the significant ways of enveloping
packets with public key cryptosystems and digital signature
and also the concept of public key cryptosystems, privacy,
signature, the encryption and decryption method and proposed
a mechanism for achieving a public key cryptosystem whose
security break in part on the complication of factoring in large
number. Method proves to be capable in our security then it
gives permission to secure communication to be settled
without using the couriers to carry keys and it also gives
permission one to sign digitized document [7].
Rutvij H. Jhaveri, Sankita J. Patel, and Devesh C. Jinwala, in
this paper, author has explains brief view about routing as
well as security concerns for MANET and take a survey about
the security concerns in which routing attacks and attack on
different layers of protocols stack can be classified. This paper
described some operations of Denial of service like warmhole
attack, blackhole attack, grayhole attack [8].
D. Sandhiya, K. Sangeetha and R. S. Latha, in this paper
author has explain about the Diffie-Hellman key exchange
mechanism, which results in lower routing overhead than
existing intrusion detection system and explains the concept
of key exchange mechanism for MANET and uses One Hop
ACK which is used to make better misbehavior detection
rates. To exclude the condition of predistributed keys
proposed a system consider Diffie-Hellman key exchange
algorithm and also explains briefly the encryption and
decryption algorithms [9].
B.Suruthi and N. V. Rajeesh Kumar, in this paper author done
the comparison of both DSA and RSA algorithms. It states
that DSA produces lesser network overhead than RSA and
hybrid cryptography technique, which reduces the network
overhead. When the number mischievous node is increases
then the network overhead increases because the
acknowledged packet count increases. Author proposed a
scheme called as EAACK provides better achievement
comparing to all other existing approaches. The EAACK
scheme appliances digital signature which causes network
overhead which can be more reduced by Hybrid
Cryptography. This techniques uses RSA, AES for maintain
security and Zone Routing Protocol (ZRP), which is used for
finding the route between source and destination [10].
Lakshmi S. M, Bhavana S. and Sujata Terdal, in this paper,
author has study of secure Intrusion Detection System for
determining malicious nodes and attacks on MANETs is
conferred and also an overview of Intrusion Detection System
architecture for build up the security level of MANETs which
is based on the security attributes and various types of
algorithm like RSA and DSA are described and a hybrid
cryptography intrusion detection system which is used to
reduce the network overhead caused by Digital Signature
which is determined. Regarding to the security issue it is vey
important in MANETs, hybrid cryptography making a
planning for tackle the issue in an efficient manner [11].
In above figure: S=Source, D=Destination and A, B,
C…X=Nodes which shown the example of receiver collision
in which after node A packet 1 sends to the node B, it tries to
overhear if node B forwarded this packet to node C,
meanwhile node X is forwarding packet 2 to node C. In such
case, node A overhears that node B has successfully delivered
packet 1 to node C but unable to detect that node C did not
accept the packet due to a collision between packet 1 and
packet 2 at node C.
Fig. 2. Limited transmission power problem too weak to
receive packet 1, which point to C from B but it, can be
overhear by A.
Above figure shown the example of limited power
transmission in order to preserve its self battery resources,
node B intentionally check its transmission power so that it is
strong suitable to be overhead by node A but not strong
suitable to be received by node C.
Anusha. K and Rajyalakshmi G.V., in this paper, an author
has proposed and implement an intrusion detection system
named as Improved Intrusion Detection System (IIDS) for
MANETs and taking the comparison against other systems in
another scenario through the simulations. Then the results are
determining assured performances against AACK in the
receiver collision case, false misbehavior report and the
limited transmission power. To incorporate security an effort
is taken to avoid the attackers from begin forged data attacks
[12].
EXISTING SYSTEM
Intrusion Detection system in MANETs are established in
each and every node. Following are the basic intrusion
detection systems, which are available, are
i.
ii.
iii.
Adaptive Acknowledgement
TWO ACK Scheme
Watchdog Scheme
The above scheme having various types of disadvantages like
receiver collision, limited transmission power and false
misbehavior report.
Fig. 3. False misbehavior report delivered by node A, to the
node S, still B forwarded packet 1 to node C.
Above figure shown the example of false misbehavior, still
node A successfully overhead that node B forwarded packet 1
to node C, node A still reported node B as misbehaving.
Then in Enhanced Adaptive Acknowledgement some new
techniques are popularized. That technique solves all the three
above existing problems. On acknowledged packets the
technique depends on that, so the attackers prevent by Digital
Signature from attacking the packets. Following are the three
parts, which namely consist by EAACK.
1.
2.
3.
4.
Fig. 1. Receiver Collisions occurs at receiver C because both
nodes B and X are trying to send packets at same time.
Acknowledgement (ACK)
Secure Acknowledgement (SACK)
Misbehavior Report Authentication (MRA)
Digital Signature
In ACK scheme, source node need to be get the
acknowledgement packet within the predefined time period,
receiving the packet at the destination node and when
receiving it assumes that any kind of malicious node not
present in the route, or else the ACK scheme send secure
ACK packet.
In this paper, we can propose Hybrid Cryptography
Technique that helps to reduce the network overhead. The
count of acknowledged packet increases when the number of
malicious node in network increases due to this reason,
network overhead increases. Therefore, to reduce the network
overhead we can use Hybrid Cryptography Technique.
Fig. 4. Acknowledgement Scheme
SACK node is generally used to find mischievous node,
which are forming by every three nodes into a single group. In
SACK, first node sends packet to the next node, then the third
node is recommended to send back SACK packet to the first
node else ways second and third node are mischievous.
Fig. 4. System Architecture
Fig. 5. Secure ACK
In MRA scheme is used for checking in case misbehavior
report is original by looking that reported receiver via some
other route receives missing packet. In this, packet is already
receives in the destination node then node which generates
this report is consider as mischievous otherwise false
misbehavior report is dependable and the destination node
consider as mischievous.
Digitally sign packets are used by the Digital Signature both
at the sender and the receiver side for avoiding the forging of
packets. For implementing digital signature the required
resources need to be integrated and both the algorithms DSA
and RSA are used.
The Proposed system uses the technique of RSA and DES
(Data Encryption Standard) due to which Hybrid
Cryptography scheme provides three cryptography primitives
called as Integrity, Confidentiality and Authentication. A key
exchange mechanism eliminating the requirement of predistributed key, which examine the possibilities of adopting.
For providing security novel encryption mechanism and RSA
key exchange mechanism is to be considered. To perform
encryption and decryption technique each node must have
approach to other nodes neighborhood key. At origin,
neighborhood key is encrypted with the public key of the
receiver and transmitted to the terminal node. At terminal
neighborhood key is decrypted with the node’s own private
key.
Encryption Algorithm:
Each node having its own symmetric key are said to be as
neighborhood key, which is in encrypted form. The MAC
(machine) address is generated when using the message
specific key encrypts message. Then, the sender attaches the
terminal nodes intrusion detection and transmitted the
message to the authenticated neighbors.
Decryption Algorithm:
Fig. 7. Digital Signature
PROPOSED SYSTEM
At the receiving end, the matching of the node of intrusion
detection is recipient and decryption is done with
neighborhood key of sending node and the plain text message
is gained. The original message is obtained by further
decryption is done with the specific key message. If the node
is not the proposed recipient, it again performs re-encryption
on message with the neighborhood key and transmitted to
neighbor node, which is authenticated. This procedure is
performing again and again until destination node is found
and the original message is decrypted at the terminal node.
Implementing two different encryption procedures, one is
encrypt the message and another is the neighborhood key with
the message specific key is having the advantage of making it
to improve the security of the message being forwarded in the
wireless ad hoc network, which is responsive for more
accessible attacks.
CONCLUSION AND FUTURE WORK
This paper provides brief view about providing the security in
the mobile ad hoc networks as well as using a novel intrusion
detection system called as EAACK. Adding digital signature
in EEACK is used for to prevent the attackers from beginning
forged acknowledgement attacks. All acknowledgement
packets are digitally signed in EAACK before they sent out
and verified until they are accepted. Improvement of the
packet delivery ratio is done but the consumption of resources
is more. So to overcome this problem the DES and RSA
schemes are used in the mobile ad hoc networks. For
improving the security we must use Hybrid Cryptography
Technique. In that combination of symmetric and asymmetric
cryptography techniques are used. For future work, we have a
key management, in that we do not require any kind of trusted
third party (TTP) for key management. A new node and group
leader in the key management system authenticates each other
before
joining
the
network.
REFERENCES
[1] E. M. Shakshuki, N Kang, and T. R. Sheltanmi, “EAACK-A Secure Intrusion Detection System for MANETs ”, IEEE
Trans. Indust. Elect, Vol. 60, no. 3, March 2013.
[2] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security.
New York: Springer- Verlag, 2006.
[3] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf.
AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.
[4] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical
approach,” IEEE Trans. Ind. Electron. Vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
[5] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing
misbe- haviour in MANETs,” IEEE Trans. Mobile Comput, vol. 6, no. 5, pp. 536–550, May 2007.
[6] Ramya K, Beaulah David and Shaheen H, “Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgement
Secure in MANET”, IOSR–JCE, e-ISSN:2278-0661, p-ISSN:2278-8727 Volume 16,Issue 1,Ver VIII, Feb 2014.
[7] R. L. Rivest, A. Shamir, and L. Adleman, ”A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
”,1978.
[8] R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, “Dos Attacks in Mobile Ad-hoc Networks: A Survey,” Second Int. Conf. ACCT,
IEEE Computer Society, 2012.
[9] D. Sandhiya, K. Sangeetha, R. S. Latha, “Adaptive Acknowledgement Technique with Key Exchange Mechanism for
MANET ”, 2012.
[10] B. Suruthi and N. V. R. Kumar, ”An Enhanced Intrusion Detection System for MANETs using Hybrid Key Cryptography”,
IJCSIT, Vol 5, 2014.
[11] Lakshmi S. M, Bhavana S., Sujata T., “Enhancement of Security Levels Using a Secure Intrusion Detection System in
Manets”, IOSR–JCE, e-ISSN: 2278-0661, p-ISSN: 2278-8727 Volume 16,Issue 3,Ver V, May-Jun 2014.
[12] Anusha. K and Rajyalakshmi G.V, ”Secure Adaptive Acknowledgement Algorithm for Intrusion Detection System” Int.
Journal of ERIMT, ISSN: 2278-9359, vol-2, 2013.
Download