- the Journal of Information, Knowledge and Research in

advertisement
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
TO STUDY, ANALYSIS AND ISSUES OF WIRELESS
ADHOC NETWORK
1
Mrs. FALGUNI A SUTHAR , 2 Mrs. UNNATI P. PATEL, 3 Mrs. ASHA K. PATEL
1,2,3 Asst.
Prof., Acharya Motibhai Patel Institute of Comp. Studies,Ganpat Vidyanagar,
Kherva-382711 Dist. Mehsana, Gujarat, INDIA
Falguni.suthar@ganpatuniversity.ac.in,unnati.patel@ganpatuniversity.ac.in,
asha.patel@ganpatuniversity.ac.in
ABSTRACT— Special wireless Adhoc networks enable new and exciting applications, but also pose significant
technical difficulties. In this paper we give a brief overview of ad hoc wireless networks and applications with
particular emphasis on energy restriction. In this paper we will discuss security issues and their current
solutions in wireless ad hoc network. Vulnerable nature of the required wireless ad hoc network, there are many
security threats, which violate the development. First, we analyze the main vulnerabilities in wireless ad hoc
networks, which made it much easier to suffer from attacks than traditional wired networks. We then discuss the
criteria for wireless network security and provide special basic types of attacks that exist within it. There are a
number of issues occur in ad hoc network.
Ad-hoc network in this paper are based on the wireless infrastructure. Because of the restrictions radio, multihop realized. The routing tables must maintain the integrity and confidentiality. In order to cope with a variety
of ad hoc network, various security models are developed. Fundamental of these models is still the encryption
and decryption, however, the symmetric / asymmetric keys facing new changelleges.
Keywords: Mobile Payment, Banks, wireless Adhoc network, security, security issues.
I.
INTRODUCTION
The study of wireless ad hoc networks has been
going on for decades. History of wireless ad hoc
networks can be traced back to the Defence
Advanced Research Projects Agency (DAPRPA)
packet radio network (PRNet), which has become a
robust adaptive network radio (SURAD) program [5].
Ad networks play an important role in military
applications, and related research, such as Global
Mobile Information System (GloMo) program [6]
and in the near term digital radio (NTDR) program
[7]. In recent years there has been a new wave of
industrial and commercial applications for wireless
ad hoc networks, as a viable means of
communication and portable computers become more
compact and affordable. Since its inception in the
1970s, information regardless of location. There are
currently two options for mobile wireless networks:
infrastructure and infrastructureless networks.
Infrastructured fixed and wired gateways or fixed
base stations that are connected other base stations on
the wire. Each node within the base stations. "Hands
off" is mobile host travels out of range of one base
station and in the range of another, and thus, the
mobile host can continue communication
seamlessly throughout the network. An example of
this type include wireless LANs and mobile phone.
Another type of wireless network, infrastructureless
network, knows how mobile ad hoc networks
(MANET). These networks have no fixed routers;
each node can be a router. All nodes that can move
and can be connected dynamically in an arbitrary
manner [4]. Responsibility for organizing and
managing the network are distributed among the
terminals themselves.
Whole network of mobile terminals and some have
the right to move freely. In this type of networks,
some pair of terminals may not be able to
communicate directly with each other and have to
rely on some terminals, so that messages are
delivered to their destination. Such networks are
often judged as a multi-hop or in the store and
forward networks. Nodes of these networks function
as routers which discover and maintain routes to
other nodes in the network. Nodes can be located in
or on aircraft, ships, trucks, cars, perhaps even on
people or very small devices [4]. Mobile ad hoc
networks should be used for disaster recovery,
battlefield communications and rescueoperations
when the wired network is unavailable. This can
provide a feasible
means for terrestrial
communications and information access.
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 32
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
II.
WIRELESS AD HOC NETWORK
Wireless ad hoc network is a set of two or more
devices / nodes, or terminals with wireless
communication and networking capabilities that
communicate with each other without the aid of any
centralized administrator. Each node in an ad hoc
wireless networks and functions as a host and router.
Topology of the network as a whole is dynamic,
because the link between nodes may change over
time due to node mobility, node departures and new
arrivals site. Consequently, there is a need for
efficient routing protocols, the nodes to communicate.
The devices themselves are responsible to organize
communication with each other. This means that
routing, network management, maintenance, etc.,
must be made by each node (in general). This is
called a peer level, a few jumps and is the basic
building block for ad hoc networks. This means that
the special devices are more complex than other
wireless networks. Thus, the sort of ad hoc networks
form clusters efficiently perform such complex
operations. The following figure shows some of the
nodes forming ad hoc networks.
Fig.2 At an airport, where people can access
Local- and wide-area networks,
Ad hoc Bluetooth connections are used to
interconnect carried devices, such as PDAs, CDMA
mobile phones and notebook computers. For instance,
a user might retrieve e-mail via a HiperLAN/2
interface to a note- book computer in a briefcase, but
read messages and reply to them via his or her PDA.
Fig.1 Ad hoc network: nodes moving in different
directions and speeds
An ad-hoc network can be classified into two main
types: mobile ad-hoc network (MANET) and mobile
ad-hoc sensors network [10].
Today, our vision of ad hoc networking includes
scenarios such as those depicted in Figure 2, where
people carry devices that can network on an ad hoc
basis. A user’s devices can both interconnect with
one another and connect to local information points
for example, to retrieve updates on flight departures,
gate changes, and so on. The ad hoc devices can also
relay traffic between devices that are out of range.
The airport scenario thus contains a mixture of single
and multiple radio hops [11].
Fig.3 Ad hoc network
Fig.4 An example of Ad hoc network
III.
APPLICATION OF ADHOC WIRELESS
NETWORK
Military applications: Adhoc wireless networks are
useful in establishing communication in a battle field.
Collaborative and distributed computing: A group
of people in a conference can share data in an adhoc
networks, Streaming of multimedia objects among
the participating nodes.
Emergency operations: Adhoc wireless networks
are useful in emergency operations such as search
and rescue, and crowed control.
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 33
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
IV.
CHARACTERS
AND
FUNDAMENTAL
CHALLENGES OF WIRELESS AD-HOC NETWORKS
Since wireless ad hoc networks are inherently
different from the known wired networks, is a
completely new architecture. Thus, some issues
raised in two key areas: Self-organization and
wireless transport information [8] [9]. In the first
place, as wireless ad hoc network nodes can freely
move arbitrarily at any time. Since network topology
MANET may change randomly and rapidly at
unpredictable times. This makes it difficult for
routing, since the topology is constantly changing
and the nodes can not be assumed to have persistent
storage. In the worst case, we do not know whether
this site will remain the next minute, because the
node will leave the network at any moment. The
capacity constraints are also a big problem. Wireless
communications have a much lower capacity than
their wired counterparts.
In addition, due to multiple accesses, fading,
noise and interference conditions, etc. wireless links
have low bandwidth. Energy limited operation. Some
or all nodes in a MANET may rely on batteries. In
this case, the most important system design criteria
for optimization may be energy conservation.
Limited physical security: Mobile networks are
generally more prone to physical security threats than
fixed-cable networks. There is increased possibility
of eavesdropping, spoofing and denial of service in
these networks.
V.
SECURITY GOALS
1) Availability: Ensures survivability despite Denial
of Service (DOS) attacks. On physical and media
access control layer attacker can use jamming
techniques to interfere with communication on
physical channel. On network layer the attacker can
disrupt the routing protocol. On higher layers, the
attacker could bring down high level services e.g.:
key management service.
2) Confidentiality: Ensures certain information is
never disclosed to unauthorized entities.
3) Integrity: Message being transmitted is never
corrupted.
4) Authentication: Enables a node to ensure the
identity of the peer node it is communicating with.
Without which an attacker would impersonate a
node, thus gaining unauthorized access to resource
and sensitive information and interfering with
operation of other nodes.
5) Non-repudiation: ensures that the origin of a
message cannot deny having sent the message [27].
VI.
SECURITY CHALLENGES IN AD HOC
NETWORKS
Using the wireless network provides a special
subject to attacks ranging from passive link
monitoring for active impersonation; message
playback and listen to messages distortion [13-15]
can an attacker access to sensitive information, thus
violating confidentiality. Active attacks can range
from deleting messages, injecting erroneous
messages to impersonate a node, etc. thus disrupting
the availability, integrity, authentication and
nonrepudiation. Nodes roaming freely in a hostile
environment with relatively poor physical protection,
non-negligible probability of being compromised.
Therefore, we need to consider malicious attacks, not
only outside but inside the network from
compromised nodes. Thus the following ways in
which security can be breached [16].
Vulnerability of channels: As in any wireless
network, messages can be overheard and fake
messages can be introduced into the network without
the difficulty of having physical access to network
components.
Vulnerability of nodes: Since the nodes do not
usually reside in physically protected places, such as
locked rooms, they can be more easily captured and
fall under the control of the attacker.
Lack of infrastructure: Special networks should
operate independently of any fixed infrastructure.
This makes the classical security solutions based on
certification and on-line servers are not applicable.
Dynamic Topology: In mobile ad hoc networks, the
permanent changes of topology require sophisticated
routing protocols, the security of which is an
additional challenge. A particular difficulty is that
incorrect routing information can be generated by
compromised nodes or as a result of some topology
changes and it is hard to distinguish between the two
cases.
For high survivability ad hoc networks should
have a distributed architecture with no central person,
the vulnerability of the central increases. Ad hoc
network is dynamic due to frequent changes in
topology. Even trusting relationship between the
individual nodes and change, especially when some
nodes have been compromised. Security mechanism
must be dynamic and not static and must be scalable.
VII. SECURITY MODELS
Model based on Third Trusted Party (TTP):
Lidong and Zygmunt described a design of
authentication and key establishment in ad-hoc
network. This infrastructure relies on a key
management server which is used to establish
symmetric keys. In this case, both encryption and
decryption will use same key. Symmetric key itself
will ensure integrity of information. [17] Hence the
established key could be also used for authentication.
They also discussed about public/private key
infrastructure. In this case, the key management
server could be named as Certificate Authority (CA).
Certainly, we must assume that CA has not been
compromised and trusted by all of the nodes. The
private key of each node need to be stored securely in
both of each node itself and the CA. When a node
attempts to communicate with others, device A wants
to communicate with device B, for example. Device
A need to send request to CA for device B’s public
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 34
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
key. Then A will have a secure channel to talk with B,
and also the public key could be used to authenticate
the identity. Furthermore, nodes have abilities to
notify CA to change their key pairs [18]. Security is
an important issue for ad hoc networks, especially for
those security-sensitive applications. To secure an ad
hoc network, I consider the following attributes:
availability, confidentiality, integrity, authentication,
and non-repudiation.
Fig. 5 Communication Model for security
VII.
ATTACK ON AD HOC NETWORK
There are various types of attacks on ad hoc network
which are describing following:
Place of disclosure: Location disclosure attack that
targets confidentiality requirements of the ad hoc
network. Through the use of methods of traffic
analysis [20], or with a simple sensing and
monitoring approaches, an attacker can learn the
location of nodes, or even the structure of the
network.
A black hole: the black hole attack malicious node
enters false answers route to route requests it receives
[21], advertising itself as having the shortest route to
your
destination
These fake responses can be made to divert network
traffic through a malicious node for eavesdropping or
simply to drive traffic to it to perform denial of
service attack by dropping packets received.
Replay: An attacker who performs a replay attack
injects into the network routing of traffic that was
captured earlier. This attack usually targets the
freshness of routes, but can also be used to
undermine badly designed security solutions.
Wormholes: a wormhole attack is one of the most
powerful, presented here, because it involves
cooperation between the two malicious nodes that
participate in the network [22] to appear one attacker,
for example, the site captures the routing of traffic at
one point and a network of tunnels them to another
point network, the node B, for example, that the
shares of private channel of communication with A.
Node B then selectively enters the tunnel traffic back
to set .network nodes that have the specified routes
through the wormhole link is fully controlled by the
two colluding attackers. The solution to the
wormhole attack is packet leashes.
Blackmail: This is an attack against the appropriate
routing protocols, which use mechanisms for
detecting malicious nodes and spread messages that
are trying to blacklist offenders [23] This can be
exploited to produce such reports and statements to
try to isolate the legitimate sites reliability of nonrepudiation property may be useful in such cases,
since it connects a node reports it has generated.
Denial of Service: Denial of service attacks aim at
the complete disruption of the routing function and
therefore the entire operation of the ad hoc network
[24]. Specific instances of denial of service attacks
include the routing table overflow and the sleep
deprivation torture. In a routing table overflow attack
the malicious node floods the network with bogus
route creation packets in order to consume the
resources of the participating nodes and disrupt the
establishment of legitimate routes. The sleep
deprivation torture attack aims at the consumption of
batteries of a specific node by constantly keeping it
engaged in routing decisions.
Poisoning routing tables: routing protocols maintain
tables that store information about routes network. In
poisoning attacks of malicious nodes to create and
send fabricated signalling traffic, or modify
legitimate messages from other nodes in order to
create false entries in the tables of the participating
nodes [24]. For example, an attacker can send routing
updates that do not correspond to real changes in the
topology of an ad hoc network. Routing table
poisoning attacks will likely result in suboptimal
routes, creation of routing loops, bottlenecks, and
even certain parts of the network portioning.
Rushing Attack: Rushing attack leads to a denial of
service when used against all previous on-demand ad
hoc network routing protocols [25]. For example,
DSR, AODV, and secure protocols based on them,
such as Ariadne, Aran, and SAODV, unable to find
routes to two hops when subject to this attack.
Rushing to develop intrusion prevention (RAP), a
common defence against attacks on rush-demand
protocols, that can be applied to any existing ondemand routing protocols to the protocol to withstand
an attack in a hurry.
Breaking neighbour relations: smart filter is placed
by an attacker on the relationship between the two
ISS (Information System) may modify or edit the
information in routing updates or even listen to the
traffic
belonging
to
one
data
session.
Masquerading: During the neighbour acquisition
process, a outside intruder could masquerade an
nonexistent or existing IS by attaching itself to
communication link and illegally joining in the
routing protocol domain by compromising
authentication system. The threat of masquerading is
almost the same as that of a compromised IS.
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 35
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
Passive listening and traffic analysis: an attacker
can passively collect routing information exposed.
Such an attack can not affect the operation of the
routing protocol, but it is a violation of user
confidence in the routing protocol. Thus, important
routing information must be protected. However, the
confidentiality of user data is not the responsibility of
routing protocol.
VIII. ISSUES
IN
ADHOC
WIRELESS
NETWORKS
During the analysis of this topic, we found some
issues in adhoc wireless networks:
Medium access scheme: Distributed operation is
required., Synchronization is required in TDMAbased system., Hidden terminals are nodes hidden
from a sender., Exposed terminals are nodes
preventing a sender from sending., Throughput needs
to be maximized., Access delay should be minimized.,
Fairness refers to provide an equal share to all
competing nodes., Real-time traffic support is
required for voice, video, and real-time data.,
Resources reservation is required for QoS., Ability to
measure resources availability handles the resources.,
Capability for power control reduces the energy
consumption., Adaptive rate control refers to the
variation in the data bit rate., Use of directional
antennas has advantages including increased
spectrum reuse, reduced interface, and reduced power
consumption.
Routing: Mobility, Bandwidth constraint, Errorprone and shared channel: wireless channel (10-5 to
10-3), wired channel (10-12 to 10-9), Locationdependent contention depends on the number of
nodes., Other resources constraints such as
computing power, battery power, Minimum route
acquisition delay, Quick route reconfiguration, Loopfree routing, Distributed routing approach, Minimum
control overhead, Scalability, Provisioning of QoS,
Support for time-sensitive traffic: hard real-time and
soft real-time traffic, Security and privacy.
Provisioning of multiple links among the nodes in an
adhoc network results in a mesh-shaped structure.
The mesh-shaped multicast routing structure work
well in a high-mobility environment.
Self-Organization is required in adhoc wireless
networks:
Neighbour
discovery,
Topology
organization, Topology reorganization.
Security: Denial of service, Resource consumption,
Energy depletion: deplete the battery power of
critical nodes. Buffer overflow: flooding the routing
table or consuming the data packet buffer space.,
Host impersonation: A compromised node can act as
another
node.,
Information
disclosure:
a
compromised node can act as an informer.,
Interference: jam wireless communication by creating
a wide-spectrum noise.
IX.
CONCLUSION
Security issues in ad hoc network because of the
special properties discussed previously. This article
has introduced some of the current security risks, an
ad hoc network, as well as some of the models at VII
is easy to implement with sufficient resources,
however, it would have cost less than beer and relax,
than other models. In fact, the ad hoc network is used
in many kinds of applications. According to the
properties and purposes of each individual
application, the entire good security model does not
exist.
Mobile ad hoc networks are the ideal technology for
the
creation
of
instant
communication
infrastructureless for military use or failure of
architecture has been bought out in this position
paper. As we have shown, using three main technical
themes Wireless Adhoc Networks, we believe that
the wireless ad hoc networks are the disadvantages of
architecture following technical reasons:
 The most important thing for the networks is
security.
 It is even important for Wireless Ad hoc
Networks because its applications are in military. The
MANET cannot appropriately solve the problem of
the security.

Routing is also a big problem.
 All the routing protocols for Wireless Ad hoc
Networks are need patches. No suitable and stable
routing protocols until now.
X REFERENCES
[1]Special Properties of Ad-hoc Wireless Network
and Security Models
Han Zhong Department of
Computer Science, University of Auckland
[2]Security Issues in Mobile Ad Hoc Networks - A
Survey Wenjia Li and Anupam Joshi Department of
Computer Science and Electrical Engineering
University of Maryland, Baltimore County
[3]Design challenges for energy-constrained ad hoc
wireless networks andrea j. goldsmith, stanford
university stephen b. wicker,cornell university
[4]Wireless Ad-hoc Networks Lu Han, October 8,
2004
[5]J. A. Freebersyser and B. Leinerr, “A DoD
perspective on mobile ad hoc networks,” in Ad Hoc
Networking, C. E. Perkin, Ed. Addison-Wesley,
2001.
[6]B. Leiner, R. Ruth, and A. R. Sastry, “Goals and
challenges of the DARPA GloMo program,” IEEE
Personal Communications, vol. 3, no. 6, pp. 34–43,
December 1996
[7]R. Ruppe, S. Griswald, P. Walsh, and R. Martin,
“Near term digital radio (NTDR) system,” in
Proceedings of IEEE MILCOM, vol. 3, November
1997, pp. 1282–1287
[8]M. Satyanarayanan. Fundamental challenges in
mobile computing. submitted paper
[9]M. Haardt W. Mohr R. Becher, M. Dillinger.
Broadband wireless access and futurecommunication
networks. Proceedings of the IEEE, 89(1), 2001.
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 36
JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER
SCIENCE AND APPLICATIONS
[10]Video Transport (Video / IP) over Mobile Ad
Hoc Networks
MS Thesis proposal
Hafiz
Muhammad Asif
[11]Wireless ad hoc networking—The art of
networking without a network Magnus Frodigh, Per
Johansson and Peter Larsson
[12]Design challenges for energy-constrained ad hoc
wireless networks andrea j. goldsmith, stanford
university stephen b. wicker, cornell university
[13]F. Anjum, Anup K. Ghosh, nada golmie, paul
kolodzy, radha poovendran, rajeev shorey, d. Lee, jsac, “Security in Wireless Ad hoc Networks”, ieee
journal on selected areas in communications, vol. 24,
no. 2, February 2006
[14]H.-A. Wen, C.-L. Lin, and T. Hwang, “Provably
Secure Authenticated Key Exchange Protocols for
Low Power Computing Clients,” Computers and
Security, vol. 25, pp. 106-113, 2006
[15]Yih-chun hu, adrian perrig, “A Survey of Secure
Wireless ad hoc routing” IEEE security & privacy
May-June 2004].
[16]Yuh-Ren Tsai, Shiuh-Jeng Wang, “Routing
Security and Authentication Mechanism for Mobile
Ad Hoc Networks” Chung-Shan Institute of Science
and Technology, Taiwan, R.O.C., under Grant BC93-B14P and the National Science Council, Taiwan,
R.O.C., IEEE 2004.
[17]M. Stamp, "Information security: principles and
practice," Hoboken, NJ: Wiley, 2006, pp. 54-55, 7681.
[18]Special Properties of Ad-hoc Wireless Network
and Security Models Han Zhong Department of
Computer Science, University of Auckland
[19]Wireless Ad-hoc Networks Lu Han October 8,
2004
[20]K. Balakrishnan, J. Deng, and P.K. Varshney,
“TWOACK: Preventing Selfishness in Mobile Ad
Hoc Networks” Proc. IEEE Wireless Comm. And
Networking Conf. (WCNC ’05), Mar.2005.
[21]ohammad Al-Shurman and Seong-Moo Yoo,
Seungjin Park, “Black Hole Attack in Mobile Ad Hoc
Networks” ACMSE’04, April 2-3, 2004, Huntsville,
AL, USA.
[22]Yih-Chun Hu, Adrian Perrig, and David B.
Johnson., “Packet Leashes A Defense against
Wormhole Attacks in Wireless Ad Hoc Networks” In
Proceedings of the Twenty-Second Annual Joint
Conference of the IEEE
Computer and
Communications Societies (INFOCOM 2003), April
2003.
[23]Patroklos city and Donal O'Mahony Argyroudis,
"Secure routing for mobile ad hoc networks," IEEE
communications surveys and tutorials of the third
quarter of 2005.
[24]I. Aad, J.-P. Hubaux, and E-W. Knightly,
“Denial of Service Resilience
in Ad Hoc
Networks,”Proc. MobiCom, 2004
[25]Yih-Chun Hu, Adrian Perrig, David B. Johnson,
"Rushing attacks and defense in wireless ad hoc
network routing protocols "Wise 2003, September
19, 2003, San Diego, California, USA.
[26]A REVIEW PAPER ON AD HOC NETWORK
SECURITY Karan Singh, Computer Science and
Engineering Department Motilal National Institute of
Technology, Allahabad Allahabad, India 211004,Rama Shankar Yadav, Computer Science and
Engineering Department Motilal National Institute of
Technology, Allahabad, Ranvijay, Computer Science
and Engineering Department Motilal National
Institute of Technology, Allahabad
[27]Security in Ad-hoc Networks Arun Kumar
Bayya , Siddhartha Gupte, Yogesh Kumar Shukla,
Anil Garikapati, CS 685, Computer Science
Department, University of Kentucky
ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02
Page 37
Download