• No results found

Security in Mobile Adhoc Security in Mobile Adhoc Security in Mobile Adhoc Security in Mobile Adhoc Networks:Networks:Networks:Networks: Challenges and Challenges and Challenges and Challenges and SolutionsSolutionsSolutionsSolutions

N/A
N/A
Protected

Academic year: 2022

Share "Security in Mobile Adhoc Security in Mobile Adhoc Security in Mobile Adhoc Security in Mobile Adhoc Networks:Networks:Networks:Networks: Challenges and Challenges and Challenges and Challenges and SolutionsSolutionsSolutionsSolutions"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Mouliprasad D, IJRIT 707

International Journal of Research in Information Technology

(IJRIT)

www.ijrit.com

www.ijrit.comwww.ijrit.com

www.ijrit.com

ISSN 2001-5569

Security in Mobile Adhoc Security in Mobile Adhoc Security in Mobile Adhoc

Security in Mobile Adhoc Networks: Networks: Networks: Challenges and Networks: Challenges and Challenges and Challenges and Solutions

Solutions Solutions Solutions

Mouliprasad D1, Sushma Deepthi Avvaru2, Sireesha Kandlapalle3, Chandana Mekala4

1, 2, 3, 4 B.Tech , Department of Computer Science and Engineering , JNTUA college of Engineering , Pulivendula

Kadapa , Andhra Pradesh , India

1 itsmoulees@gmail.com

2 Deepthi.avvaru@gmail.com

3sireeshakandlapalle@gmail.com

4 mchandana509@gmail.com

Abstract

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wired networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. In this article we focus on the fundamental security problem of protecting the multi-hop Network connectivity between mobile nodes in a MANET. It identify the security issues related to this problem, discuss the challenges to security design, and review the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multi-hop wireless channel. The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction.

Keywords: Mobile ad-hoc network (MANET); Multicast routing protocol; Taxonomy; Mobile node; Routing table

1. INTRODUCTION

In recent years mobile ad hoc networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. While early research effort assumed a friendly and cooperative environment and focused on problems such as wireless channel access and multi-hop routing, security has become a

(2)

Mouliprasad D, IJRIT 708 primary concern in order to provide protected communication between nodes in a potentially hostile environment.

Although security has long been an active research topic in wired networks, the unique characteristics of MANETs present a new set of nontrivial challenges to security design. These challenges include open network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. Consequently, the existing security solutions for wired networks do not directly apply to the MANET domain.

The ultimate goal of the security solutions for MANETs is to provide security evinces, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. In order to achieve this goal, the security solution should provide complete protection spanning the entire protocol stack. This article considers a fundamental security problem in MANET: the protection of its basic functionality to deliver data bits from one node to another. In other words, it seeks to protect the network connectivity between mobile nodes over potentially multi- hop wireless channels, which is the basis to support any network security services.

2. LITERATURE REVIEW

Mr. Marti [1] proposes watchdog to monitor packet forwarding on top of source routing protocols like DSR. It assumes symmetric bidirectional connectivity: if A can hear B, B can also hear A. Since the whole path is specified, when node A forwards a packet to the next hop B, it knows B’s next hop C. It then overhears the channel for B’s transmission to C. If it does not hear the transmission after a timeout, a failure tally associated with B is increased. If the tally exceeds a threshold bandwidth, A sends a report packet to the source notifying B’s misbehavior.

Mr.S.Yeng [2] follows the same concept but works with distance vector protocols such as ADOV. It adds a next hop field in AODV packets so that a node can be aware of the correct next hop of its neighbors. It also considers more types of attacks, such as packet modification, packet duplication, and packet jamming DoS attacks. Each independent detection result is signed and flooded; multiple such results from different nodes can collectively revoke a malicious node of its certificate, thus excluding it from the network.

C. E. Perkins [3] describes the AODV protocol which is builds on DSDV algorithm. And also clarify it as a pure-on –demand route acquisition system, since nodes that are not on a selected path do not maintain routing information or participate in routing table exchanges.

3. METHODOLOGY 3.1 ATTACKS:

3.1.1 Denial of Service (DoS):

DoS attack via network-layer packet blasting, in which the attacker injects a large amount of junk packets into the network. These packets waste a significant portion of the network resources, and introduce severe wireless channel contention and network congestion in the MANET.

3.1.2 Attacks against Routing:

In the mobile ad hoc networks, attacks against routing are generally classified into two categories: attacks on routing protocols and attacks on packet forwarding/delivery. Attacks on routing protocols aim to block the

(3)

Mouliprasad D, IJRIT 709 propagation of the routing information to the victim even if there are some routes from the victim to other destinations. Attacks on packet forwarding try to disturb the packet delivery along a predefined path.

3.2. VULNERABILITIES OF MANET:

3.2.1. Lack of Secure Boundaries

One fundamental vulnerability of MANETs comes from their open peer-to-peer architecture. Unlike wired networks that have dedicated routers, each mobile node in an ad hoc network may function as a router and forward packets for other nodes. The wireless channel is accessible to both legitimate network users and malicious attackers.

As a result, there is no clear line of defense in MANETs from the security design perspective. The boundary that separates the inside network from the outside world becomes blurred. There is no well defined place/infrastructure where we may deploy a single security solution.

3.2.2. Threats from Compromised nodes Inside the Network

Attackers may sneak into the network through these subverted nodes, which pose the weakest link and incur a domino effect of security breaches in the system.

3.3. MULTIFENCE SECURITY SOLUTION

There are basically two approaches to securing a MANET: proactive and reactive. The proactive approach attempts to thwart security threats in the first place, typically through various

Cryptographic techniques. On the other hand, the reactive approach seeks to detect threats a posteriori and react accordingly. MANETs should integrate both proactive and reactive approaches, and encompass all three components: prevention, detection, and reaction.

The prevention component is mainly achieved by secure ad hoc routing protocols that prevent the attacker from installing incorrect routing states at other nodes, the detection and reaction components that discover the occasional intrusions and take reactions to avoid persistent adverse effects.

3.3.1INTRUSION DETECTION TECHNIQUES in MANET:

This paper discussion about the intrusion detection techniques in the mobile ad hoc networks was presented in the paper written by Zhang et al... In this paper, a general intrusion detection framework in MANET was proposed, which was distributed and cooperative to meet with the needs of MANET. The proposed architecture of the intrusion detection system is shown below in this architecture, every node in the mobile ad hoc networks participates in the intrusion detection and response activities by detecting signs of intrusion behavior locally and independently, which are performed by the built-in IDS agent.

(4)

Mouliprasad D, IJRIT 710 3.3.2SECURE AD HOC ROUTING

3.2.2.1Dynamic Source Routing

The Dynamic Source Routing (DSR) protocol is completely demand based. It does not need any kind of periodic updates or node announcement messages. Instead, the protocol acquires the needed routing information on demand. The routing protocol is divided into two parts. The first is the route discovery and the second is route maintenance. The discovery phase is initiated when a node needs to send information to another node that is not available in its current path cache. The node broadcasts a special discovery packet with the destination and a unique identification number. The packet is received by all nodes within the wireless transmission range. They, if they are not the destination, add their node address to the path in the packet header and retransmit the discovery packet. A packet with the same identity as has already been seen is discarded. Also, if the node itself is mentioned in the path header the packet is delivered. This technique efficiently cuts down on duplicate packets in the air.

Figure-2: DSR route discovery example with mobile host 1 as the initiator and 8 as the target

(5)

Mouliprasad D, IJRIT 711 3.3.2.2Ad Hoc On-Demand Distance Vector Routing:

Ad hoc On demand Distance Vector (AODV) is an on demand protocol. It borrows the idea of route discovery and maintenance while still using a distance vector approach to the routing. Each node keeps a distance vector for each known destination and its next hop neighbor. If a destination that is needed is not in the list a route discovery is initiated. By issuing a broadcast packet to its neighbors containing source and destination addresses and a sequence number the node hopes to find a path to the destination. If a node, that is not the actual estimation, receives a request it checks its own routing table. If it can find the destination there it replies to the source node with this information.

If, however, this information is not in the node’s routing table it adds the source as a destination in its own table using appropriate hop count, increments the request packet’s hop count and rebroadcasts it to its neighbors. This procedure is continued until the destination is reached and a route reply packet is sent back to the source. After this all data traffic is routed using the discovered path. If the nodes move and some links break a route error packet is sent out to tell the nodes that the path is no longer available. If this happens the source node initiates a new route request. An example of a route discovery and path setup is shown in below figure. To eliminate the need of flooding a large network with route request packages the time to live field is used to limit the number of hops a route request can be sent. If a request fails this is gradually incremented until the destination is reached.

Figure-3: AODV route Discovery

4. CONCLUSION

In this paper, it tries to inspect the security issues in the mobile ad hoc networks, which may be a main disturbance to the operation of it. Due to the mobility and open media nature, the mobile ad hoc networks are much more prone

(6)

Mouliprasad D, IJRIT 712 to all kind of security risks, such as information disclosure, intrusion, or even denial of service. As a result, the security needs in the mobile ad hoc networks are much higher than those in the traditional wired networks. First this paper briefly introduces the basic characteristics of the mobile ad hoc network. Because of the emergence of the concept pervasive computing, there is an increasing need for the network users to get connection with the world anytime at anywhere, which inspires the emergence of the mobile ad hoc network. However, with the convenience that the mobile ad hoc networks have brought to us, there are also increasing security threats for the mobile ad hoc network, which need to gain enough attention.

REFERENCES

[1] S. Marti et al., “Mitigating Routing Misbehavior immobile Ad Hoc Networks,” ACM MOBICOM, 2000.

[2] H. Yang, X. Men, and S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,” ACM Wise, 2002.

[3] C. E. Perkins and E. M. Royer, “Ad-Hoc On Demand Distance Vector Routing”, Proc 2nd IEEE WKSP. Mobile Comp.sys, and Apps, Feb, 1999, pp.90-100.

[4] IEEE Std. 802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,”

1997.

[5] B. Schneier, Secret and Lies, Digital Security in a Networked World, Wiley, 2000.

[6] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks,“

ACM MOBICOM, 2002.

[7] M. Zapata, and N. Asokan, “Securing Ad Hoc Routing Protocols, ” ACM WiSe, 2002.

[8] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks, ”Mobile Computing, T.

Imielinski and H. Korth, Ed., Kluwer, 1996.

References

Related documents

Continual presence of the suggested controller in the loop can make some problems For example, when a pilot decides to perform some maneuvers or even when he aims to hold both the

Children with asthma have increased incidence of pneumonia, and wheez- ing may also accompany pneumonia.4’’ Previous epi- sodes of pneumonia may indicate children at high risk due

Because of high quality, gas metal arc welding (GMAW) is one of the best processes in manufacturing due to its high speed and both manual and automatic modes of welding

The annual bluegrass weevil (ABW), Listronotus maculicollis Kirby, is a native pest of highly maintained turfgrass in the northeastern United States and specific provinces of Canada,

This study examines the influence of personality traits (trait anger, cynicism) and aspects of the physician- patient relationship (promoting patient participation by the

supply'd by the bodies of young lads and maidens, not exceeding fourteen years of age, nor under twelve; so great a number of both sexes in every country being now ready to starve

Objective: To determine the factor structure of the Health Promoting Behaviours (HPB) component of Health Promoting Lifestyle Profile-II among undergraduate students in

We found that this U1 snRNA is mutated in sup-6 The ability of this U1 snRNA mutant to compensate for (st19) animals at the eighth position of the snRNA (Fig- the mutation in the 5