JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS TO STUDY, ANALYSIS AND ISSUES OF WIRELESS ADHOC NETWORK 1 Mrs. FALGUNI A SUTHAR , 2 Mrs. UNNATI P. PATEL, 3 Mrs. ASHA K. PATEL 1,2,3 Asst. Prof., Acharya Motibhai Patel Institute of Comp. Studies,Ganpat Vidyanagar, Kherva-382711 Dist. Mehsana, Gujarat, INDIA Falguni.suthar@ganpatuniversity.ac.in,unnati.patel@ganpatuniversity.ac.in, asha.patel@ganpatuniversity.ac.in ABSTRACT— Special wireless Adhoc networks enable new and exciting applications, but also pose significant technical difficulties. In this paper we give a brief overview of ad hoc wireless networks and applications with particular emphasis on energy restriction. In this paper we will discuss security issues and their current solutions in wireless ad hoc network. Vulnerable nature of the required wireless ad hoc network, there are many security threats, which violate the development. First, we analyze the main vulnerabilities in wireless ad hoc networks, which made it much easier to suffer from attacks than traditional wired networks. We then discuss the criteria for wireless network security and provide special basic types of attacks that exist within it. There are a number of issues occur in ad hoc network. Ad-hoc network in this paper are based on the wireless infrastructure. Because of the restrictions radio, multihop realized. The routing tables must maintain the integrity and confidentiality. In order to cope with a variety of ad hoc network, various security models are developed. Fundamental of these models is still the encryption and decryption, however, the symmetric / asymmetric keys facing new changelleges. Keywords: Mobile Payment, Banks, wireless Adhoc network, security, security issues. I. INTRODUCTION The study of wireless ad hoc networks has been going on for decades. History of wireless ad hoc networks can be traced back to the Defence Advanced Research Projects Agency (DAPRPA) packet radio network (PRNet), which has become a robust adaptive network radio (SURAD) program [5]. Ad networks play an important role in military applications, and related research, such as Global Mobile Information System (GloMo) program [6] and in the near term digital radio (NTDR) program [7]. In recent years there has been a new wave of industrial and commercial applications for wireless ad hoc networks, as a viable means of communication and portable computers become more compact and affordable. Since its inception in the 1970s, information regardless of location. There are currently two options for mobile wireless networks: infrastructure and infrastructureless networks. Infrastructured fixed and wired gateways or fixed base stations that are connected other base stations on the wire. Each node within the base stations. "Hands off" is mobile host travels out of range of one base station and in the range of another, and thus, the mobile host can continue communication seamlessly throughout the network. An example of this type include wireless LANs and mobile phone. Another type of wireless network, infrastructureless network, knows how mobile ad hoc networks (MANET). These networks have no fixed routers; each node can be a router. All nodes that can move and can be connected dynamically in an arbitrary manner [4]. Responsibility for organizing and managing the network are distributed among the terminals themselves. Whole network of mobile terminals and some have the right to move freely. In this type of networks, some pair of terminals may not be able to communicate directly with each other and have to rely on some terminals, so that messages are delivered to their destination. Such networks are often judged as a multi-hop or in the store and forward networks. Nodes of these networks function as routers which discover and maintain routes to other nodes in the network. Nodes can be located in or on aircraft, ships, trucks, cars, perhaps even on people or very small devices [4]. Mobile ad hoc networks should be used for disaster recovery, battlefield communications and rescueoperations when the wired network is unavailable. This can provide a feasible means for terrestrial communications and information access. ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 32 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS II. WIRELESS AD HOC NETWORK Wireless ad hoc network is a set of two or more devices / nodes, or terminals with wireless communication and networking capabilities that communicate with each other without the aid of any centralized administrator. Each node in an ad hoc wireless networks and functions as a host and router. Topology of the network as a whole is dynamic, because the link between nodes may change over time due to node mobility, node departures and new arrivals site. Consequently, there is a need for efficient routing protocols, the nodes to communicate. The devices themselves are responsible to organize communication with each other. This means that routing, network management, maintenance, etc., must be made by each node (in general). This is called a peer level, a few jumps and is the basic building block for ad hoc networks. This means that the special devices are more complex than other wireless networks. Thus, the sort of ad hoc networks form clusters efficiently perform such complex operations. The following figure shows some of the nodes forming ad hoc networks. Fig.2 At an airport, where people can access Local- and wide-area networks, Ad hoc Bluetooth connections are used to interconnect carried devices, such as PDAs, CDMA mobile phones and notebook computers. For instance, a user might retrieve e-mail via a HiperLAN/2 interface to a note- book computer in a briefcase, but read messages and reply to them via his or her PDA. Fig.1 Ad hoc network: nodes moving in different directions and speeds An ad-hoc network can be classified into two main types: mobile ad-hoc network (MANET) and mobile ad-hoc sensors network [10]. Today, our vision of ad hoc networking includes scenarios such as those depicted in Figure 2, where people carry devices that can network on an ad hoc basis. A user’s devices can both interconnect with one another and connect to local information points for example, to retrieve updates on flight departures, gate changes, and so on. The ad hoc devices can also relay traffic between devices that are out of range. The airport scenario thus contains a mixture of single and multiple radio hops [11]. Fig.3 Ad hoc network Fig.4 An example of Ad hoc network III. APPLICATION OF ADHOC WIRELESS NETWORK Military applications: Adhoc wireless networks are useful in establishing communication in a battle field. Collaborative and distributed computing: A group of people in a conference can share data in an adhoc networks, Streaming of multimedia objects among the participating nodes. Emergency operations: Adhoc wireless networks are useful in emergency operations such as search and rescue, and crowed control. ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 33 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS IV. CHARACTERS AND FUNDAMENTAL CHALLENGES OF WIRELESS AD-HOC NETWORKS Since wireless ad hoc networks are inherently different from the known wired networks, is a completely new architecture. Thus, some issues raised in two key areas: Self-organization and wireless transport information [8] [9]. In the first place, as wireless ad hoc network nodes can freely move arbitrarily at any time. Since network topology MANET may change randomly and rapidly at unpredictable times. This makes it difficult for routing, since the topology is constantly changing and the nodes can not be assumed to have persistent storage. In the worst case, we do not know whether this site will remain the next minute, because the node will leave the network at any moment. The capacity constraints are also a big problem. Wireless communications have a much lower capacity than their wired counterparts. In addition, due to multiple accesses, fading, noise and interference conditions, etc. wireless links have low bandwidth. Energy limited operation. Some or all nodes in a MANET may rely on batteries. In this case, the most important system design criteria for optimization may be energy conservation. Limited physical security: Mobile networks are generally more prone to physical security threats than fixed-cable networks. There is increased possibility of eavesdropping, spoofing and denial of service in these networks. V. SECURITY GOALS 1) Availability: Ensures survivability despite Denial of Service (DOS) attacks. On physical and media access control layer attacker can use jamming techniques to interfere with communication on physical channel. On network layer the attacker can disrupt the routing protocol. On higher layers, the attacker could bring down high level services e.g.: key management service. 2) Confidentiality: Ensures certain information is never disclosed to unauthorized entities. 3) Integrity: Message being transmitted is never corrupted. 4) Authentication: Enables a node to ensure the identity of the peer node it is communicating with. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. 5) Non-repudiation: ensures that the origin of a message cannot deny having sent the message [27]. VI. SECURITY CHALLENGES IN AD HOC NETWORKS Using the wireless network provides a special subject to attacks ranging from passive link monitoring for active impersonation; message playback and listen to messages distortion [13-15] can an attacker access to sensitive information, thus violating confidentiality. Active attacks can range from deleting messages, injecting erroneous messages to impersonate a node, etc. thus disrupting the availability, integrity, authentication and nonrepudiation. Nodes roaming freely in a hostile environment with relatively poor physical protection, non-negligible probability of being compromised. Therefore, we need to consider malicious attacks, not only outside but inside the network from compromised nodes. Thus the following ways in which security can be breached [16]. Vulnerability of channels: As in any wireless network, messages can be overheard and fake messages can be introduced into the network without the difficulty of having physical access to network components. Vulnerability of nodes: Since the nodes do not usually reside in physically protected places, such as locked rooms, they can be more easily captured and fall under the control of the attacker. Lack of infrastructure: Special networks should operate independently of any fixed infrastructure. This makes the classical security solutions based on certification and on-line servers are not applicable. Dynamic Topology: In mobile ad hoc networks, the permanent changes of topology require sophisticated routing protocols, the security of which is an additional challenge. A particular difficulty is that incorrect routing information can be generated by compromised nodes or as a result of some topology changes and it is hard to distinguish between the two cases. For high survivability ad hoc networks should have a distributed architecture with no central person, the vulnerability of the central increases. Ad hoc network is dynamic due to frequent changes in topology. Even trusting relationship between the individual nodes and change, especially when some nodes have been compromised. Security mechanism must be dynamic and not static and must be scalable. VII. SECURITY MODELS Model based on Third Trusted Party (TTP): Lidong and Zygmunt described a design of authentication and key establishment in ad-hoc network. This infrastructure relies on a key management server which is used to establish symmetric keys. In this case, both encryption and decryption will use same key. Symmetric key itself will ensure integrity of information. [17] Hence the established key could be also used for authentication. They also discussed about public/private key infrastructure. In this case, the key management server could be named as Certificate Authority (CA). Certainly, we must assume that CA has not been compromised and trusted by all of the nodes. The private key of each node need to be stored securely in both of each node itself and the CA. When a node attempts to communicate with others, device A wants to communicate with device B, for example. Device A need to send request to CA for device B’s public ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 34 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS key. Then A will have a secure channel to talk with B, and also the public key could be used to authenticate the identity. Furthermore, nodes have abilities to notify CA to change their key pairs [18]. Security is an important issue for ad hoc networks, especially for those security-sensitive applications. To secure an ad hoc network, I consider the following attributes: availability, confidentiality, integrity, authentication, and non-repudiation. Fig. 5 Communication Model for security VII. ATTACK ON AD HOC NETWORK There are various types of attacks on ad hoc network which are describing following: Place of disclosure: Location disclosure attack that targets confidentiality requirements of the ad hoc network. Through the use of methods of traffic analysis [20], or with a simple sensing and monitoring approaches, an attacker can learn the location of nodes, or even the structure of the network. A black hole: the black hole attack malicious node enters false answers route to route requests it receives [21], advertising itself as having the shortest route to your destination These fake responses can be made to divert network traffic through a malicious node for eavesdropping or simply to drive traffic to it to perform denial of service attack by dropping packets received. Replay: An attacker who performs a replay attack injects into the network routing of traffic that was captured earlier. This attack usually targets the freshness of routes, but can also be used to undermine badly designed security solutions. Wormholes: a wormhole attack is one of the most powerful, presented here, because it involves cooperation between the two malicious nodes that participate in the network [22] to appear one attacker, for example, the site captures the routing of traffic at one point and a network of tunnels them to another point network, the node B, for example, that the shares of private channel of communication with A. Node B then selectively enters the tunnel traffic back to set .network nodes that have the specified routes through the wormhole link is fully controlled by the two colluding attackers. The solution to the wormhole attack is packet leashes. Blackmail: This is an attack against the appropriate routing protocols, which use mechanisms for detecting malicious nodes and spread messages that are trying to blacklist offenders [23] This can be exploited to produce such reports and statements to try to isolate the legitimate sites reliability of nonrepudiation property may be useful in such cases, since it connects a node reports it has generated. Denial of Service: Denial of service attacks aim at the complete disruption of the routing function and therefore the entire operation of the ad hoc network [24]. Specific instances of denial of service attacks include the routing table overflow and the sleep deprivation torture. In a routing table overflow attack the malicious node floods the network with bogus route creation packets in order to consume the resources of the participating nodes and disrupt the establishment of legitimate routes. The sleep deprivation torture attack aims at the consumption of batteries of a specific node by constantly keeping it engaged in routing decisions. Poisoning routing tables: routing protocols maintain tables that store information about routes network. In poisoning attacks of malicious nodes to create and send fabricated signalling traffic, or modify legitimate messages from other nodes in order to create false entries in the tables of the participating nodes [24]. For example, an attacker can send routing updates that do not correspond to real changes in the topology of an ad hoc network. Routing table poisoning attacks will likely result in suboptimal routes, creation of routing loops, bottlenecks, and even certain parts of the network portioning. Rushing Attack: Rushing attack leads to a denial of service when used against all previous on-demand ad hoc network routing protocols [25]. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, Aran, and SAODV, unable to find routes to two hops when subject to this attack. Rushing to develop intrusion prevention (RAP), a common defence against attacks on rush-demand protocols, that can be applied to any existing ondemand routing protocols to the protocol to withstand an attack in a hurry. Breaking neighbour relations: smart filter is placed by an attacker on the relationship between the two ISS (Information System) may modify or edit the information in routing updates or even listen to the traffic belonging to one data session. Masquerading: During the neighbour acquisition process, a outside intruder could masquerade an nonexistent or existing IS by attaching itself to communication link and illegally joining in the routing protocol domain by compromising authentication system. The threat of masquerading is almost the same as that of a compromised IS. ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 35 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS Passive listening and traffic analysis: an attacker can passively collect routing information exposed. Such an attack can not affect the operation of the routing protocol, but it is a violation of user confidence in the routing protocol. Thus, important routing information must be protected. However, the confidentiality of user data is not the responsibility of routing protocol. VIII. ISSUES IN ADHOC WIRELESS NETWORKS During the analysis of this topic, we found some issues in adhoc wireless networks: Medium access scheme: Distributed operation is required., Synchronization is required in TDMAbased system., Hidden terminals are nodes hidden from a sender., Exposed terminals are nodes preventing a sender from sending., Throughput needs to be maximized., Access delay should be minimized., Fairness refers to provide an equal share to all competing nodes., Real-time traffic support is required for voice, video, and real-time data., Resources reservation is required for QoS., Ability to measure resources availability handles the resources., Capability for power control reduces the energy consumption., Adaptive rate control refers to the variation in the data bit rate., Use of directional antennas has advantages including increased spectrum reuse, reduced interface, and reduced power consumption. Routing: Mobility, Bandwidth constraint, Errorprone and shared channel: wireless channel (10-5 to 10-3), wired channel (10-12 to 10-9), Locationdependent contention depends on the number of nodes., Other resources constraints such as computing power, battery power, Minimum route acquisition delay, Quick route reconfiguration, Loopfree routing, Distributed routing approach, Minimum control overhead, Scalability, Provisioning of QoS, Support for time-sensitive traffic: hard real-time and soft real-time traffic, Security and privacy. Provisioning of multiple links among the nodes in an adhoc network results in a mesh-shaped structure. The mesh-shaped multicast routing structure work well in a high-mobility environment. Self-Organization is required in adhoc wireless networks: Neighbour discovery, Topology organization, Topology reorganization. Security: Denial of service, Resource consumption, Energy depletion: deplete the battery power of critical nodes. Buffer overflow: flooding the routing table or consuming the data packet buffer space., Host impersonation: A compromised node can act as another node., Information disclosure: a compromised node can act as an informer., Interference: jam wireless communication by creating a wide-spectrum noise. IX. CONCLUSION Security issues in ad hoc network because of the special properties discussed previously. This article has introduced some of the current security risks, an ad hoc network, as well as some of the models at VII is easy to implement with sufficient resources, however, it would have cost less than beer and relax, than other models. In fact, the ad hoc network is used in many kinds of applications. According to the properties and purposes of each individual application, the entire good security model does not exist. Mobile ad hoc networks are the ideal technology for the creation of instant communication infrastructureless for military use or failure of architecture has been bought out in this position paper. As we have shown, using three main technical themes Wireless Adhoc Networks, we believe that the wireless ad hoc networks are the disadvantages of architecture following technical reasons: The most important thing for the networks is security. It is even important for Wireless Ad hoc Networks because its applications are in military. The MANET cannot appropriately solve the problem of the security. Routing is also a big problem. All the routing protocols for Wireless Ad hoc Networks are need patches. No suitable and stable routing protocols until now. X REFERENCES [1]Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland [2]Security Issues in Mobile Ad Hoc Networks - A Survey Wenjia Li and Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County [3]Design challenges for energy-constrained ad hoc wireless networks andrea j. goldsmith, stanford university stephen b. wicker,cornell university [4]Wireless Ad-hoc Networks Lu Han, October 8, 2004 [5]J. A. Freebersyser and B. Leinerr, “A DoD perspective on mobile ad hoc networks,” in Ad Hoc Networking, C. E. Perkin, Ed. Addison-Wesley, 2001. [6]B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol. 3, no. 6, pp. 34–43, December 1996 [7]R. Ruppe, S. Griswald, P. Walsh, and R. Martin, “Near term digital radio (NTDR) system,” in Proceedings of IEEE MILCOM, vol. 3, November 1997, pp. 1282–1287 [8]M. Satyanarayanan. Fundamental challenges in mobile computing. submitted paper [9]M. Haardt W. Mohr R. Becher, M. Dillinger. Broadband wireless access and futurecommunication networks. Proceedings of the IEEE, 89(1), 2001. ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 36 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER SCIENCE AND APPLICATIONS [10]Video Transport (Video / IP) over Mobile Ad Hoc Networks MS Thesis proposal Hafiz Muhammad Asif [11]Wireless ad hoc networking—The art of networking without a network Magnus Frodigh, Per Johansson and Peter Larsson [12]Design challenges for energy-constrained ad hoc wireless networks andrea j. goldsmith, stanford university stephen b. wicker, cornell university [13]F. Anjum, Anup K. Ghosh, nada golmie, paul kolodzy, radha poovendran, rajeev shorey, d. Lee, jsac, “Security in Wireless Ad hoc Networks”, ieee journal on selected areas in communications, vol. 24, no. 2, February 2006 [14]H.-A. Wen, C.-L. Lin, and T. Hwang, “Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients,” Computers and Security, vol. 25, pp. 106-113, 2006 [15]Yih-chun hu, adrian perrig, “A Survey of Secure Wireless ad hoc routing” IEEE security & privacy May-June 2004]. [16]Yuh-Ren Tsai, Shiuh-Jeng Wang, “Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks” Chung-Shan Institute of Science and Technology, Taiwan, R.O.C., under Grant BC93-B14P and the National Science Council, Taiwan, R.O.C., IEEE 2004. [17]M. Stamp, "Information security: principles and practice," Hoboken, NJ: Wiley, 2006, pp. 54-55, 7681. [18]Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland [19]Wireless Ad-hoc Networks Lu Han October 8, 2004 [20]K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks” Proc. IEEE Wireless Comm. And Networking Conf. (WCNC ’05), Mar.2005. [21]ohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black Hole Attack in Mobile Ad Hoc Networks” ACMSE’04, April 2-3, 2004, Huntsville, AL, USA. [22]Yih-Chun Hu, Adrian Perrig, and David B. Johnson., “Packet Leashes A Defense against Wormhole Attacks in Wireless Ad Hoc Networks” In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003. [23]Patroklos city and Donal O'Mahony Argyroudis, "Secure routing for mobile ad hoc networks," IEEE communications surveys and tutorials of the third quarter of 2005. [24]I. Aad, J.-P. Hubaux, and E-W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,”Proc. MobiCom, 2004 [25]Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols "Wise 2003, September 19, 2003, San Diego, California, USA. [26]A REVIEW PAPER ON AD HOC NETWORK SECURITY Karan Singh, Computer Science and Engineering Department Motilal National Institute of Technology, Allahabad Allahabad, India 211004,Rama Shankar Yadav, Computer Science and Engineering Department Motilal National Institute of Technology, Allahabad, Ranvijay, Computer Science and Engineering Department Motilal National Institute of Technology, Allahabad [27]Security in Ad-hoc Networks Arun Kumar Bayya , Siddhartha Gupte, Yogesh Kumar Shukla, Anil Garikapati, CS 685, Computer Science Department, University of Kentucky ISSN: 0975 – 6728| NOV 10 TO OCT 11 | VOLUME – 01, ISSUE - 02 Page 37