- Open Access
- Total Downloads : 356
- Authors : Ashwini Jeerge, Prof. Dayanand Jamkhandikar, Prof. Rajshekahar Gaithond
- Paper ID : IJERTV2IS80801
- Volume & Issue : Volume 02, Issue 08 (August 2013)
- Published (First Online): 29-08-2013
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Minimizing the risk of routing attacks in MANET by using DRCIF
Minimizing the risk of routing attacks in MANET by using DRCIF
Ashwini Jeerge
-
ech Computer Science Engg. Guru Nanak Dev Engineering College, Bidar, India
Prof. Dayanand Jamkhandikar Computer Science Engg. (CS) Guru Nanak Dev Engineering
College, Bidar, India
Prof. Rajshekhar Gaithond Information Science Engg. (IS)
Guru Nanak Dev Engineering College, Bidar, India
Index Terms Ad hoc networks, Dempster-Shafer theory, Dempster rule of combination with important factors (DRCIF).
-
Mobile Ad Hoc Networks (MANET) is distributed and self configuring wireless network. MANET does not have a predefined network infrastructure. Application of MANET is benefited in areas such as military services, disaster relief and mine site operations. Each node communicates with the other acting as routers. The co-operation and trust between the nodes are depended for the proper functioning of this network. Since the network topology in MANET changes unpredictably and rapidly it is highly vulnerable to various kinds of attacks. Attack prevention methods such as intrusion detection system, intrusion prevention, authentication and encryption can be
used in defense for reducing certain attack possibilities. MANET is considered one of the most promising fields in research and development of wireless networks. There exist many intrusion response mechanisms for routing attacks. The existing techniques usually attempt to isolate the malicious nodes from the topology there by causing the partition of network topology. Methods such as binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naive fuzzy responses could lead to uncertainty in countering routing attacks in MANET. Several intrusion detection techniques have been introduced for detecting the malicious nodes and preventing the neighbor nodes compromised by the malicious nodes. Even though many mechanisms and routing protocols are introduced each of them has one or more vulnerabilities. Research on MANET and implementation has become a huge amount of task to be done. When a malicious node is being identified the node has to be either repaired or another route has to be established. In most of the existing techniques the nodes when found slightly malicious is completely isolated from the network which will make splitting of the network and thereby causing communication problems between the nodes. In MANET scenario, improper countermeasures may cause the unexpected network partition, bringing additional damage to the network infrastructure. To address the above-mentioned critical issues, more flexible and adaptive response should be investigated. However, risk assessment is still a nontrivial, challenging problem due to its involvements of subjective knowledge, objective evidence, and logical reasoning. Subjective knowledge could be retrieved from previous experience and objective evidence, and objective evidence could be retrieved from previous experience and logical reasoning. Subjective knowledge could be obtained from observation while logical reasoning requires a formal foundation.
-
The Dempster-Shafer mathematical theory of evidence it is both a theory of evidence and a theory of probable reasoning.
While Dempsters rule of combination is the procedure to aggregate and summarize the evidences. However, previous research efforts identify several limitations of the Dempsters rule of combination (DRC).
-
Associative- For DRC, the order of the information in the aggregated evidences does not impact the result, a non associative combination rule is necessary in many cases.
-
Nonweighted- DRC implies that we trust all evidences equally. Here we should consider various factors for each evidence.
Evidence Collection: In this Module, we can collect the evidence of attacker node. There are two types to collect the evidence.
-
IDS-Gives an Attack Alert.
-
RTCD- How many changes on the routing table.
Select source
Select source
In this module, Intrusion Detection system (IDS) gives an attack alert with a confidence value, and then Routing Table Change Detector (RTCD) runs to figure out how many changes on routing table are caused by the attack.
-
-
DEMPSTERS RULE OF COMBINATON WITH IMPORTANT FACTORS
In this section, we propose a Dempsers rule of combination with important factors. The algorithm for extended Demster- Shafer theory is given below.
Algorithm MUL-EDS-CMB
INPUT: Evidence pool Ep
OUTPUT: One evidence
-
|Ep|= sizeof(Ep);
-
While |Ep|>1 do
-
Pick two evidences with the list IF in Ep, named E1
Select destina tion
Select destina tion
IDS
RTC D
Choose path
Choose path
Transm it data
Transm it data
Fake node
Comb ine
Comb ine
and E2;
-
Combine these two evidences, E= <m1+m2 ,(IF1+IF2)/2>;
-
Remove E1 and E2 from Ep;
-
Add E to Ep;
-
End
-
Return the evidence in Ep.
-
-
DESIGN MODULES
Routing table: includes local routing table recovery and global recovery. Local routing recovery is performed by victim nodes that detect the attack and automatically recover its own routing table. Global routing recovery involves with sending recovered routing messages by victim nodes and updating their routing table based through protocols like (AODV/OLSR).
After attacked
Routing Table Information will be changed
Recovery Routing Table
After attacked
Routing Table Information will be changed
Recovery Routing Table
After Recovery you will get original
After Recovery you will get original
Figure 1: This figure shows the Routing table.
Figure 2: This figure shows the Evidence collection.
Risk assessment: Alert confidence from IDS and the routing table changing information would be further considered as independent evidences for risk calculation and combined with the extended D-S theory. Risk of countermeasures is calculated as well during a risk assessment phase. Based on the risk of attacks and the risk of countermeasures, the entire risk of an attack could be figured out.
Calculate risk attacks
Risk assessment
Risk assessment
After evidence collection
Calculate countermeasur es
Figure 3: This figure shows the Risk assessment.
Node isolation: It is the most intuitive way to prevent further attacks from being launched by malicious nodes in MANET. To perform a node isolation response, the neighbours of the malicious node ignore the malicious node by neither forwarding packets through it nor accepting packets from it. On the other hand, a binary node isolation response may result
in negative impact to the routing operations, even bringing more routing damages than the attack itself.
each node randomly selects the moving direction and when it reaches to the boundary of simulation area, it bounces back and continues to move. The mobile speed of each node was from 1 to 25 m/s. Constant Bit Rate (CBR) is used as traffic type. The transmission range was 150m. Data packet size used was 250 bytes.
Perman ent isolation
Perman ent isolation
Attac ker node
Attac ker node
Node isolation
Tempor ary isolatio
Tempor ary isolatio
Tofulfill user
To fulfill user
Figure 4: This figure shows the Node isolation.
-
We propose adaptive risk-aware response mechanism with the extended D-S evidence model, considering damages caused by both attacks and countermeasures. The addictiveness of our mechanism allows us to systematically cope with MANET routing attacks. We evaluate our response mechanism against representative attack scenarios and experiments. Our result clearly demonstrates the effectiveness and scalability of our risk-aware approach.
-
The network simulation-2 implementation contains the following parts.
-
Generating wireless environment.
-
Creating UDP and FTP agent.
-
Various modules are added to simulate node mobility and wireless networking such as mobile nodes, ad-hoc routing such as MAC 802.1, AODV.
Table 1 Show the simulation parameters where the simulation was implemented by using NS2 (network simulator 2.35) [14].
Table 1: Simulation parameter
Simulator
NS-2.35
Routing protocol
AODV,OLSR
Number of nodes
Max 80
Simulation area
2000X2000
Simulation time
500sec
Traffic type
CBR
Mobility speed(m/s)
5,10,15,20
Data packet size
250 bytes
Mobility model
Random way point model
Node transmission range
150m
The below figure 5 shows the simulation at NAM. This simulation modeled in a network area 900X900 m with 80 mobile nodes, routing protocols that we used here are AODV and OLSR. Mobility model used is random way point model,
Figure 5: Simulation at NAM
-
-
Figs. 6-8, describe the performance of the system that is packet overhead, byte overhead, Packet delivery ratio with the different number of nodes. Fig. 6 shows that the packet overhead increases as the number of nodes increases.
Figure 6: Packet overhead Ratio against number of nodes.
Analysis: In this DRCIF risk-aware response, the number of nodes which isolate the malicious node is less than the other methods. From the figure 6 and 7, we can notice that as the number of nodes increases, the packet overhead and the byte overhead using this DRCIF risk-aware response are slightly higher than those of the other mechanisms.
Figure 7: Byte overhead against number of nodes.
Figure 8 describes the packet delivery ratio, as the number of nodes increases packet delivery ratio also increases because there are more route choices for packet transmission.
Figure 8: Packet Delivery Ratio Against number of nodes.
-
In this work, an adaptive risk-aware mechanism with extended trusted centre has been proposed which reduces the MANET routing attacks. Risk-aware approach is based on D-S theory with important factors, and hence it provides maximum trust worthiness and more security in MANET routing. Based on several metrics we also investigated the performance and practicality. The experiment result clearly demonstrated the effectiveness and scalability of our risk aware approach. Based on the promising results obtained through these experiments, we would further seek more systematic way to accommodate node reputation and attack frequency in our adaptive decision model.
-