IJME - International Journal of Computing and Corporate Research

advertisement
An Position Secure Efficient Ad Hoc Distance
(PSEAD)Protocol Compare with Dynamic Remote Routing
based
Mobile Adhoc Networks
RAJARAM.M1, Dr.V.SUMATHY2
M.Rajaram Assistant Professor Department of Electronics and Communication Engineering
Park college of Engineering and Technology, Coimbatore, India
2
Dr.V.Sumathy Associate Professor, Department of Electronics and Communication Engineering
Government College of Technology Coimbatore, India
Email: happyramm900@gmail.com
__________________________________________________________________________________________
Abstract: A secure on-demand ad hoc network routing protocol which prevents the compromised nodes from
tampering with the uncompromised routes, and the Position secure efficient ad hoc distance (PSEAD) which is
a position secure routing protocol, using efficient one-way hashing functions and not using asymmetric cryptographic operations . In addition to the aforementioned techniques, an attack detection by network monitoring,
which can detect attacks[1] from inside MANETs, has also been proposed. Network monitoring nodes are selected to be able to collect all the packets within a cluster, and the decision agents in the nodes are used to detect
and classify the security violations. Compare wirth DRR (Dynamic Remote Routing) [2]and AODVThe concern
of this method is that the monitoring nodes will consume a large amount of energy . I proposed a dynamic training method in which the packet flow is observed at each node. are both traffic and topology related are defined.
Moreover, in they constructed an extended finite-state automaton (EFSA) according to the specification[3] of
the DRR &AODV routing protocol, envisioned normal condition modeling, and detected attacks with both specification-based and anomaly-based detection schemes.The simulation results are done NS2 to achieve scalability
benefits.
Keywords: MANETS, DRR,PSEAD,AODV
I. INTRODUCTION
A mobile ad-hoc network (MANET) consists of mobile computing entities such as laptop and palmtop computers which communicate with each other through wireless links and without relying on a static infrastructure such
as a base station or access point. [2] Without centralized administration, a MANET is highly unpredictable due
to its unstable links and resource-poor as most of the nodes have limited battery power. Due to these physical
limitations, nodes require the cooperation of other nodes to successfully send a message to a destination. Figure
1.1 shows the mobile Ad hoc network.
1
Figure 1 Mobile Ad hoc network.
There are numerous scenarios that do not have an available network infrastructure and could benefit from
the creation of an ad hoc network:
 Rescue/Emergency operations: Rapid installation of a communication infrastructure during a natural/environmental disaster (or a disaster due to terrorism) that demolished the previous communication
infrastructure.
 Law enforcement activities: Rapid installation of a communication infrastructure during special operations.
 Tactical missions: Rapid installation of a communication infrastructure in a hostile and/or unknown territory.
 Commercial projects: Simple installation of a communication infrastructure for commercial gatherings
such as conferences, exhibitions, workshops and meetings.
 Educational classrooms: Simple installation of a communication infrastructure to create an interactive
classroom on demand.
1.1 CHARACTERISTICS OF MOBILE AD HOC NETWORKS
Because of their very nature, mobile ad hoc networks have a certain number of peculiarities like the
following:
i. They can be independent of any provider.
ii. Dynamic topologies: Due to the presence of mobile nodes, the network topologies varies from time to
time.
iii. Bandwidth–constrained, variable capacity links: Wireless links have significantly lower capacity than
their hardwired counterparts. Moreover, the realized throughput of wireless communications is often
much less than a radio’s maximum transmission rate.
1.2 ROUTING IN AD HOC NETWORKS
Even though these ad hoc networks are more attractive, the implementation of these networks is very
difficult. The advantages of fixed networks can be stated in two ways by their static nature. First, the network
topology information is distributed proactively among the nodes and the routing is performed by each node by
pre computing through that topology with the help of relatively inexpensive algorithms. Second, for fixed networks, the routing hints are embedded in node addresses because the complete topology[2] of a large network is
too widely to process or distribute globally.Neither of the techniques works well for networks with mobile nodes
because movement invalidates topology information and permanent node address cannot include dynamic location information. However assumption of topology is made and it works well for radio-based ad hoc networks:
nodes that are physically close are likely to be close in the network topology[5] that is they will be connected by
a small number of radio hops. Grid uses geographic forwarding to take advantage of the similarity between
physical and network proximity.
1.3 CHALLENGES IN AD-HOC NETWORKS
The following are the current challenges in the ad-hoc wireless networks[5]
i) Multicasting ii)Qos support iii) Power aware routingiv) Location aided routing
II. EXISTING SYSTEMS
i. “Specification based intrusion detection” system for AODV.
ii. Set of constraints and security specifications.
iii. Network monitor used to monitor request reply flow.
iv. Specification based configuration” system Manets.
v. Location is in Complex
vi. Problems in non metropolitean areas
vii. Set of constraints and security specifications are not satisfied
viii. Tracking and power consumption are very bad.
ix. It does not detect RECONFIGURATION directly.
x. Detect the effect of the reconfigurations of MANETS
xi. Establishes routes between source and destination on demand basis
xii. If RERR message is sent, linkage break occurs
xiii. Packet transfer is deferred
xiv. Eliminates the periodical messages like Route REQuest, Route REPly, etc
xv. Packet transfer is a slow process
xvi. Hop by Hop routing mechanism is used for packet transfer
III
PROBLEM STATEMENT
i) To detect vulnerable attack in AODV control signal packets.ii)To secure route path information in AODV
protocol. iii) To improve the performance of the MANET.iv)location and detection analysis
IV PROPOSED SYSTEM
A secure on-demand ad hoc network routing protocol which prevents the compromised nodes from tampering
with the uncompromised routes, and the Position secure efficient ad hoc distance (PSEAD) which is a secure
routing protocol, using efficient one-way hashing functions and not using asymmetric cryptographic operations .
In addition to the aforementioned techniques, an attack detection by network monitoring, which can detect attacks from inside MANETs,[3] has also been proposed. For instance, Kachirski and
Guha proposed a method that detects attacks by employing distributed mobile agents. Network monitoring
nodes are selected to be able to collect all the packets within a cluster, and the decision agents in the nodes are
used to detect and classify the security violations. The concern of this method is that the monitoring nodes will
consume a large amount of energy [1].
I proposed a dynamic training method in which the packet flow is observed at each
node. are both traffic and topology related are defined. In specification-based detection, the attacks were detected as deviant packets from the conditions defined by EFSA. In addition, in anomaly detection, the normal
conditions are defined as the baseline with which the condition of EFSA [4]and also the amounts of transition
statistics are compared. The deviations from those conditions are then used to detect the potential attacks. For
determining the baseline profiles, in both methods, the training data are extracted beforehand from the same
network environment where the test data are applied.[3]However, we note that the MANET topology can rather
easily be changed, and the differences in network states grow larger with time. Furthermore, these methods cannot be applied to a network where the learning phase has been conducted in another network.
V. DYNAMIC REMOTE ROUTING
In order to avoid perimeter mode, we introduce the concept of anchors, which are imaginary locations used to
assist in routing. source S uses three anchors to route the packet to D. The anchors are geographical locations,
not nodes.[2]The list of anchors is written by the source into the packet header, similar to IP loose source routing information. The packet is sent by intermediate nodes in the direction of the next anchor in the list until it
reaches a node close to an anchor, at which point the next anchor becomes the 32 following in the list. The location of the final destination takes the role of the last anchor. DRR is used when the packet comes close to the
final destination, as previously shown. [7]The use of well-chosen anchors greatly reduces the number of hops
taken by the packet compared to perimeter forwarding, for two reasons. First, anchors may lead to an overall
better routing strategy. Second, even when perimeter and anchored paths use similar directions, perimeter mode
paths tend to be more contorted and use more hops (because they are constantly trying to escape the problem
area). We include a method for a source to detect whether anchors should be used. It is based on a novel method
for the source to find the distribution of the number of hops along the direct (non anchored) path. The source
sends some packets using DRR without anchors[8][2] and receives the feedback about the number of hops it
took the packet to reach the destination. The source decides that anchors are needed if the packet path is significantly longer than estimated from the distribution of the number of hops along the greedy path.
VIII. SIMULATION
The Dynamic numbers of nodes are created. Each node in network model has unique value of each network
parameter. The network parameter includes energy, bandwidth, node id etc. Node selects the random source and
destination for making the communication. The source and destination are highlighted from the other nodes in
the network. Source and destination selection based upon two protocols AODV , PSEAD and DRR packets carry only the destination address. DRR[2] has potentially less routing overheads than other protocol and DRR
route replies only carry the destination IP address and the sequence number. The advantage of DRR is that it is
adaptable to highly dynamic networks. DRR broadcast the Route error message to all its neighbors. Route maintained in routing table and DRR allows frequent route discovery and route discovery based on shortest and
freshest. AODV performs multiple route discovery and no route repair methods in DRR[2]. So AODV has more
end-to-end delay, it increases the throughput of the network. DRR has less routing overhead and end-toend(E2E) delay which has high throughput. Number of sending and receiving packets increases in DRR due to
less E2E delay. After Route Identification, The attacker models is simulated and construct some attackers to
simulate the concepts of EACCK. The attackers were marked with the red color. The 45 transmission of packet
starts, then the attackers starts their process. Packets are transferred through the nodes, if any packet loss is simulated and the alternate route is selected.
Figure 2: Network creation
The figure 2 shows that the dynamic number of nodes are created. Each node in network model has unique value of each network parameter. The network parameter includes energy, bandwidth, node id etc.
Figure 3 Source and destination selection
The figure no 3 shows that the selection the random source and destination for making the communication.
The source and destination are highlighted from the other nodes i the network.
Figure 4 Attacker Model
The figure no 4 shows that the attacker model is simulated and construct some attackers to simulate the concepts
of PSEAD. While the transmission of packet starts, then the attacker starts their process.
VIII Performance Analysis:
This section presents a comparative analysis of the performance metrics generated with the employment of the
use of Network Simulator 2.34. The following metrics are applied to comparing the protocols.first we analsyis
as AODV and DRR.Secondly PSEAD ,DRR with AODV.
i)Packet Delivery fraction Ratio: The ratio between the number of data packets originated by the “application
layer" CBR sources and the number of data packets received by the CBR sink at the final destination.
Figure 5 Comparsion result of PDR with DRR Vs AODV protocol.
iii) Performance Based on Packet Loss Ratio (PLR):
The packet delivery ratio between DLR and AODV protocols are shown in figure 5.10. It shows that the PLR of
DLR protocol is decreased as the number of node increases than the performance of AODV. DRR gives lesser
PLR of 17% than the AODV protocol.
Figure 7Comparsion result of PLR with DRR Vs AODV protocol.
5.3.4Performance Based on Throughput:
The throughput between DRR and AODV protocols are shown in figure 5.11. It shows that throughput of DRR
protocol is increased as the pause time increases than the performance of AODV. DRR provides 23% network
throughput greater than the AODV protocol.
Figure 8Comparsion result of Throughput with DRR Vs AODV protocol
Next The following metrics are applied to comparing the protocols.first we analsyis as AODV, DRR& PSEAD
Figure 9Comparsion result of Throughput with PSEAD, DRR Vs AODV protocol
Figure 9Comparsion result of PDR with PSEAD, DRR Vs AODV protocol
Figure 10.Comparsion result of PLR with PSEAD, DRR Vs AODV protocol
IX. RESULTS
a. Scalability benefits
S.NO
PDR(%)
Node Mobility
Packet loss
DRR
21% Improved
38% Improved
17% Improved
Table 1 Results
b. Results
S.NO
1
2
3
PARAMETERS
PDR
THROUGHPUT
PACKET LOSS
AODV
4.6%
5.72%
6.02%
DRR
9.2%
8.53%
1.87%
PSEAD
9.3%
8.54
1.89%
Table 2 Results
X. CONCLUSION:
Dynamic Remote Routing aims to support location-based routing on irregular topologies with mobile nodes. It
achieved its goal by combining a Position secure efficient ad hoc distance (PSEAD) with a link state-based
mechanism. Further, it introduced the concept of a novel IDS named PSEAD protocol specially designed for
MANETs, to address the issues of attackers through malicious node. It uses the DSA algorithm to produce the
security key for message authentication. The performance analysis shows that, the routing overhead was low
and efficiently solved the attacks of mallicious node. The proposed protocol is simulated using the NS 2.32 simulator and the results show that the proposed protocol outperforms the existing AODV protocol.
REFERENCES:
[1]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, (2010) A Dynamic Anomaly Detection Scheme forAODV-Based
Mobile Ad Hoc Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 5, JUNE 2009.
[2]. Ljubica Blazevic,(2004) Member, IEEE, “Location-Based Routing Method for Mobile Ad Hoc Networks:”, Ieee Transactions
On Mobile Computing, Vol. 3, No. 4, October-December 2004.
[3]. Elhadi M.Shakshuki, Nan Kang,Tarek R.SheltamiK.(2013)EACCK-A Secure Intrusion Detection System for MANETS IEEE
Trans.Industrial Electronics, vol. 60,no. 3,pp. 1089-1098.
[4]. N.Naser and Y.Chen(2007) ―Enhanced Intrusion Detection Systemsfor Discovering Malicious Nodes in Mobile Adhoc Network inproc.IEEE Int.conf.commun.,Glasgow,Scotland, vol .147 no.18 pp.384-387.
[5]. G. Jayakumar and G. Gopinath,(2008) ―Ad hoc mobile wirelessnetworks routing protocol—A review, J. Comput. Sci., vol. 3,
no. 8,pp. 574–582.
[6]. Khalid Kaabneh, Azmi Halasa , An Effective Location-Based Power Conservation Scheme for Mobile Ad Hoc Networks: American Journal of Applied Sciences 6 (9): 1708-1713, 2009
[7]. Tracy Camp, Jeff Boleng, Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks : Department of Math. and Computer SciencesColorado School of MinesGolden, CO 80401.
[8]. S. Mangai and A.Tamilarasi, An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in
Mobile Ad Hoc networks : Journal of Computer Science 7 (4): 505-511, 2011.
AUTHORS PROFILE
Rajaram M. received his degree in Electronics and Instrumentation and Engineering from Bharathiar University, Coimbatore (India) in
2003.He received M.E degree in 2006 from Government college of Technology Cimbatore, and currently he is working as an Assistant
Professor in Park college of Engineering and Technology Coimbatore His research interest includes Routing, Embedded systems , and
Network Security.
Dr.V.Sumathy: received her Ph.D degree in Networking Professor in Government college of Technology Combatore Her research interest
includes Adhoc networks, Embedded systems , Network Security and Vlsi. She guided ten Ph.D Research scholars and several number of
Research and development Projects Under the Department of Information and Communication Engineering from Anna University, Chennai
(India) in 2006., and currently she is working as an Associate and motivated students to get high carrier based developments.
Download