International Journal of Advanced Computer Engineering and Communication Technology (IJACECT) ________________________________________________________________________ DSA - A Reliable Intrusion-Detection System for MANETs 1 Rashmi Bademi, 2Kavya Hegde 1,2 Department of CSE, Srinivas Institute of Technology,Mangalore, VTU, Belgaum Email: 1rashmibademi@gmail.com, 2hegdekavyap@gmail.com Abstract—MANET(Mobile Adhoc NETwork)meant to be work under the Infrastructure less medium, It suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favourable for malicious user to entering into the Network. So we are discussing about the MANET IDs that is,DSA(Digitally Signed Acknowledgements) in which it checks the malicious or misbehaving nodes in three modes of operation i.e. ACK, S-ACK and MRA mode. As the whole system is dependent on the acknowledgements, it is necessary to prove that the acknowledgements are genuine. So to prove that the packet identity, that packet is coming from genuine node we are applying Digital Signature to the both data and acknowledgement packet Fig 1 Example of MANET nodes In the figure 1, The transmission range of each node is represented by the circular ring around that node.The nodes A and B are in the transmission range, they can easily transmit or receive the data, but if node A wants to transmit the data to the node G then it can reach G by either A-B-C-E-G or A-B-D-F-G. In this scenario the nodes B,C,E,D,F acts both as a receiver and transmitter. Keywords— DSA (Digitally Signed Acknowledgements), Digital Signature, MANETs(Mobile Adhoc NETworks), RO(Routing Overhead), PDR(Packet Delivery Ratio),Intrusion Detection system(IDs). I. INTRODUCTION Mobile Adhoc NETwork, Adhoc in Latin means “on purpose”, so we are using the network for particular purpose. A self-configuring infrastructureless character of MANEThelps to make use of this network in critical applications such as disaster recovery, Military applications. The disasters may be either natural disaster like flood, tsunami etc., or man-made disaster like infrastructure failure.In such a situations deploying the network is not possible, and MANET doesn’t need the existing infrastructure, so we can easily make use of the MANET. Due to mobility of nodes in MANET any time any node can enter into the network or it can leave from the network. In MANET all nodes work together to transmit the data but to transmit the data, two nodes which are communicating has to be in the communication range of each other, or else it transmit the data with the help of intermediate node, which is in the communication range of other two nodes. Due to the dynamic topology of the MANET, the topology of the MANET will be keep on changing. There is no centralized management for the MANET. Routing protocols in MAENTs manytimes falsely believes that, all the nodes in the network are cooperative and non malicious, due to this malicious user can easily enter into the network and either malicious user can destroy the whole network or by falsely claiming other node as a malicious, he can partition the network. An Intrusion-Detection systems (IDs) are necessary to protect the MANET from all these harmful activities. II. LITERATURE REVIEW In this section we are giving the brief review about the extant IDs, MANET routing protocols and Digital Signature. A. Existing IDs ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -2, Issue -4, 2013-14 20 International Journal of Advanced Computer Engineering and Communication Technology (IJACECT) ________________________________________________________________________ In this section we are discussing about 4 existing IDs mainly, watchdog, TWOACK, 2ACK and AACK. acknowledging back to first node in a group of three consecutive nodes. Watch dog: Watchdog [1] [2] consists of mainly 2 parts, watchdog and pathrater. Watchdog actively detects if any malicious node is misbehaving in the network.The core theme of watchdog is that, it individually listens to its next hops transmission. If a Watchdog node overhears that its next node fails to forward the packet within a certain period of time, it increases its failure counter. After exceeding a predefined threshold, the Watchdog node reports it as misbehaving. After when the watchdog nodes reports particular node as a malicious,the Pathrater works with the routing protocols to avoid the reported nodes in future data transmission. AACK: AACK [1] is a hybrid scheme which is the combination of ACK and TACK (similar to TWOACK) scheme. ACKnowledgement scheme is an end-to-end ack scheme.After when the source node sends packet, every intermediate node passes the packet to destination and through the same path in reverse order,destination will acknowledges to the source within timeout, if source node doesnt get acknowledgement then it will switch to TACK mode by sending the TACK packet. TACK works similar to TWOACK, where three consecutive nodes work in a group, and the node which is two hop away from the first node will have to acknowledge back to first node. This process continues along the rest of the route. Watchdog scheme unable to detect malicious misbehaviors with the presence of 1) Ambiguous collisions.2) Receiver collisions.3) Limited transmission power. 4) False misbehavior report.5) Collusion. And 6) Partial dropping. B. MANET Routing Protocols TWOACK: In TWOACK [3] three consecutive nodes work in a group to detect misbehaving links in a network.Each node along theroute is required to send back an acknowledgment packet tothe node that is two hops away from it. This process continues from source till destination In this section we are discussing about the routing protocols and the DSR, an underlying routing protocol which is used in the system. There are three different routing protocols that can be used in MANET. They are proactive routingprotocol[5], reactive routing protocol[5], and hybrid routing protocol[5], which is the combination of both proactive and reactive routing protocols. We are discussing mainly about DSR[5], which comes under the reactive routing protocol. Reactive routing protocols discovers the route when it has the data to send Dynamic Source Routing Protocol (DSR) [5] is an on Demand, Source Routing protocol. On-demand means that the paths are discovered to the intended recipient when the source node has data to send. Fig 2 TWOACK Scheme The main two phases of DSR are Route Discovery and Route Maintenance. Consider fig 2 Node 1 first forwards Packet 1 to node 2,and then, node 2 forwards Packet 1 to node 3. When node 3 receives Packet 1, as it is two hops away from node 1, node 3 has to generate a TWOACK packet, which contains reverse route from node 1 to node 3, and sends it back to node A. The retrieval of this TWOACK packet at node 1 indicates that the transmission of Packet 1 from node 1 to node 3 is successful. Otherwise, if this TWOACK packet is not received in a predefined time period, both nodes 2 and 3 are reported as malicious. As every node need to generate the acknowledgement, network overhead increases, but it successfully recognises and solves the receiver collision [1] and limited transmission power [1] problems. When a node in the network has a data to send, first it checks its routing table for any possible routes to the destination, if there is no route for the particular destination or although the route is there but it is expired then the source node will launch the route discovery process. If any link on a route is broken, the source node is notified by an intermediate node that detects the link break when forwarding packet to the next node in the route path. The source node removes any route using this link from its cache, or removes the portion of the route that uses that broken link. The source must also try another path or do a new route discovery if it does not have another path. 2ACK:The 2ACK [4] scheme is an add-on technique for routing schemes which helps to detect routing misbehavior and to remit their adverse effect. The working processs of the 2ACK scheme is same as that of the TWOACK but only a fraction of the received data packets are acknowledged in the 2ACK scheme to reduce the routing overhead that is caused from the generation of 2ACK from every nodewhile C. Digital Signatures Digital Signature is the vital part of the cryptography [6]. Cryptography and encryption [1] [6]means the same, the encryption means that conversion of information from a readable state to apparent nonsense. ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -2, Issue -4, 2013-14 21 International Journal of Advanced Computer Engineering and Communication Technology (IJACECT) ________________________________________________________________________ sent to source node. After when the source node gets the misbehavior report, it switches to MRA mode by sending MRA packet, to check the misbehavior report. 3) MRA: In MRA mode the source node sends the MRA packet to destination through another route to check whether the destination has received the reported missing packet or not. When the destination node receives an MRA packet, it searches its local knowledge base and compares if the reported packet was received. If it is already received, then it concludes that this is a false misbehavior report and whoever generated this report is marked as malicious. Otherwise, the misbehavior report is trusted and accepted. Fig 3: Example of Cryptography Figure 3, depicts the cryptographic method, where the key may be either same or different. Based on the use of key used cryptography is divided into 2 types, they are Symmetric key Cryptography and Asymmetric key cryptography. 4) Digital Signature: To provide the data security the data packets are encrypted and Acknowledgement packets are also encrypted. In turn the system provide security for both data and acknowledgement packets. In Symmetric-key cryptography [1] [6], the same key is used for both encryption and decryption. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. IV. PERFORMANCE EVALUATION In Asymmetric-key cryptography [1] [6], it uses two different but mathematically related keys, which are public key and private key. Asymmetric-key cryptography is also called as public key system. In public-key cryptosystems, we can freely distribute the public key whereas the private key must be secret. In a public-key encryption system, for encrypting the data the public key is used, and while the private or secret keyis used for decryption. In this section we are discussing mainly about simulation Configuration and simulation results. A. Simulation Methods The simulation is carried out to check, the Packet Delivery Ratio and energy consumed by the nodes in the network, when both the data and acknowledgement packets are encrypted. III. SCHEME DESCRIPTION: DSA B. Simulation Configuration Our simulation is carried out with the Network Simulator(NS) 2.34 environment and NS2 can be installed in any UNIX or LINUX flavoured OS (Operating System) such as Ubuntu. Our system is running on Ubuntu 9.10. The system will run on any Core 2Duo T7250 CPU and 3-GB RAM or higher versions, with Graphics card. Both the physical layer and the 802.11MAC layer are included during simulation. Our proposed system DSA solves the receiver collision, limited transmission power, and false misbehaviour problems. Our proposed system DSA, works in three modes of operation, namely ACK, secure ACK (SACK), and MRA. 1) ACK: ACK mode is the first step in our proposed system, which helps to reduce network overhead, when there is no misbehaving node in the network. ACK is an end-to-end acknowledgement scheme, in which the source node sends the data packet to destination, if destination node receives the data packet within time-out then it has to acknowledge back to the source. Otherwise source node will send an S-ACK packet and switch to SACK process. C. Performance Analysis In this section we are discussing about the performance of the DSA. 2) S-ACK: The purpose of the S-ACK is to detect misbehaving nodes in the presence of receiver collision or limited transmission power. In the (Secure – ACK) SACK mode, the source node sends the encrypted data packets over network, to maintain the integrity of the data, also to secure the data from unwanted user. The working of S-ACK is same as that of TWOACK system. In TWOACK every three consecutive nodes work in group for the detection of misbehaving nodes. In the three consecutive nodes the third node has to send an SACK acknowledgement packet to the first node. In a group of three consecutive nodes, if first node doesn’t receive the acknowledgement packet within timeout both second and third nodes are reported as malicious and misbehaviour report is generated by first node and Fig 4: Packet Delivery ratio Initially when there will be no malicious nodes in the network(Assuming no malicious nodes in the network)the PDR value will be high, after some time, ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -2, Issue -4, 2013-14 22 International Journal of Advanced Computer Engineering and Communication Technology (IJACECT) ________________________________________________________________________ Energy Consumption due to the presence of malicious nodes in the network, the PDR value decreases, the main reason of decrease in PDR value is due to the increased packets in the networks and also due to the digital signatures, which is shown in Fig 4. REFERENCES [1] Elhadi M.Shakshuhi, Senior Member, IEEE, Nan Kang, and TarekR. Sheltami, Member, IEEE ” EAACKA Secure Intrusion-Detection System for MANETs,” in IEEE TRANSACTIONS ON INDUSTRIALELECTRONICS, VOL. 60, NO. 3, MARCH 2013. [2] Nidal Nasser and Yunfeng Chen, ”Enhanced Intrusion Detection Systemfor Discovering Malicious Nodes in Mobile Ad hoc Networks,” in IEEE Communications for publication in the ICC 2007 proceedings. [3] Kashyap Balakrishnan, Jing Deng, Pramod K. Varshney ”TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks”, in IEEE transaction2005. [4] Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, ”An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs,”in IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5,MAY 2007. [5] Mr. L Raja, Capt. Dr. S SanthoshBaboo” Comparative study of reactive routing protocol in MANET”, in International Journal Of Engineering And Computer Science, Volume 2 Issue 3 March 2013. [6] R.L. Rivest, A. Shamir, and L. Adleman”A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. 800 600 400 AACK 200 DSA 0 6 8 10 12 14 16 Time Fig 5: Energy Consumption Consider the fig 5, where the energy consumption is high in DSA compared to AACK due to Digital Signature. V.CONCLUSION In this paper we have developed the Intrusion-Detection system for MANETs. A digital signature is applied to both data packets and acknowledgements to secure the data is being transmitted over network but the Digital Signature increases the Network overhead in the system. ACKNOWLEDGEMENT We would like to express our special thanks of gratitude to H.O.D Prof. Shivakumar G.S, Dept. of Computer Science and Engineering, SIT Mangalore. We also convey our thanks to all the staff members of SIT for helping in the project. ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -2, Issue -4, 2013-14 23