Providing Intrusion Detection and Preventing System by using DTMO Protocol in MANET

DOI : 10.17577/IJERTV2IS121080

Download Full-Text PDF Cite this Publication

Text Only Version

Providing Intrusion Detection and Preventing System by using DTMO Protocol in MANET

V. Nikhil Srivatsav, D. Veeraiah

Vignan University

Abstract: – Recent days wireless communication have become wide spread all over the world. In wireless communications, Mobile Ad-hoc NETwork (MANET) is one of the applications, i.e. mostly used. MANET is decentralized system architecture, i.e. architecture is dynamic in nature and changes according to the situation. In MANET each and every act as a transmitter and receiver. Each and every node can communicate with other nodes directly or indirectly. In indirect communication, source nodes rely on intermediate nodes for transferring the packets to destination nodes. Simply MANET has become very popular due to self configuring of nodes. MANET is used in military applications, emergency services like earth cakes, disasters, personal Area Network (PAN).Due to open medium and dynamic infrastructure of MANET, MANET has become vulnerable to malicious attacks. For overcoming this nature, Intrusion Detection System (IDS) is proposed. Present days this IDS is used in MANET for providing security. In this paper, I going to purpose the new technique called

DYNAMIC MANET ON DEMAND

(DYMO) Routing Protocol and it is implemented in this paper.

Index Terms: – Digital signature, Diffie Hellman Key Exchange, DYMO Routing Protocol,Mobile Ad-hoc NETwork (MANET)

  1. INTRODUCTION

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure network of mobile devices connected by wireless. Ad hoc is derived from Latin and the meaning is for this purpose.

    Each device in a MANET is free to move independently in any direction and it will change the links with other devices dynamically. Each and every mobile node has a tendency to transmit and receive the packet from other mobile nodes. Communication

    can be taken place in two ways. They are:

    1. Single Hop

    2. Multiple Hop

    1. Due to Dynamic Topology and decentralized system architecture, MANET is more vulnerable to attacks. Two types of attacks are present in MANET. They are:-

      1. INTERNAL ATTACKS

      2. EXTERNAL ATTACKS

    1. participate in this type of attack. Internal attacks cannot be detected easily because

      1. Internal node are more trusted nodes

      2. It can generate wrong routing information and it can be send to all other nodes which are present in the network.

      1. Passive attack

      2. Active attack

        1. modification of packets cannot be taken place but intruder watches traffic between source to destination and study the data in packets. This type of attacks cannot be identified by authorized

          users because data in packets are not modified by an intruder.

        2. This type of attacks can be easily identified by delaying of packets from source to destination or by checking the

          authentication, confidentiality and integrity. Again Active attacks are classified in to four types. They are:

          1. Dropping Attacks

          2. Modification attacks

          3. Fabrication attacks

          4. Timing attacks

    1. and destination is lost. There is no mechanism in routing protocols to detect whether packets are forwarded by a source node or not.

    2. modification attack. In Sinkhole attack,

      compromising node advertises itself as the shortest path from source to destination and captures the routing information. From this routing information, modification of packets

      Can be taken place.

    For overcoming this attack, Intrusion Detection System (IDS) is introduced.

  2. BACKGROUND

    1. DIFFIE HELLMAN KEY EXCHANGE

      This algorithm is proposed by Diffie and Hellman, so it is referred to as Diffie Hellman Key Exchange. The purpose of this algorithm is to enable the two users to exchange the secret key securely. That can be used for encryption of messages. This algorithm is limited to the exchange of the keys. Their two publicly known numbers: a prime number q and an integer . suppose user A and B want to exchange the keys. This Diffie Hellman Key Exchange algorithm is explained in the following way.

      Q Prime number a

      a<q and a a primitive root ofq

      Select private key

      < q

      Calculate public key

      = mod q

      Select private key

      < q

      Calculate public key

      = mod q

      K = ( ) mod q

      K = ( ) mod q

    2. IDS in MANET

      Nodes in MANET assume that other nodes always cooperate to each other to relay data. This assumption leaves the attackers to relay on network. For overcoming this problem this problem, Intrusion Detecting System (IDS) is introduced.

      An ID acts as a second layer to the MANET. An ID consists of three approaches. Namely Watchdog, Twoack and Adaptive ACK (AACK).

      is very useful. Throughput means number of messages has been delivered to a communication channel over a period of time. Generally, Throughput is measured in Bits per second (bps).Watchdog consists of two parts namely: Watchdog and pathrater. Watchdog acts as IDS. It checks each and every node whether it is working properly or not. If a node is not unable to send the packet, watchdog increases the failure counter in hopcount. If the failure counter increases more than the threshold value, watchdog inform to the pathrather. Pathrather informs to the source node and destination node that this node in the path is not working properly. But watchdog is incapable of detecting the links rather than nodes. Watchdog is unable to detect to malicious behaviors with the presence of following:

      1. Ambiguous collision

      2. Receiver collision

      3. False misbehavior report

      4. Limited transmission power

      5. Collision

      6. Partial dropping

      B C X D

      A

      PA CK

      PA CK

      PA CK

      PA CK

      T W

      T W

      T W

      T W

      Fig 1 TWOACK scheme

      Basically, TWOACK works on successive three nodes. Form above example Fig 1, packet 1 sent from node A to node B and then, node B forwards the packet 1 to node C. Node C sends TWOACK back to node B and then, node B sends back

      TWOACK to node A. On successful retrieving of acknowledgement from node C to node A indicates that packet is successfully transmitted from node A to node C. If node A does not receives acknowledgment in predefined time, node A thinks that nodes B and C are malicious nodes. This process is continued for every consecutive three packets until it reaches the destination. But there will be a limited transmission power in MANET. Due to this, degradation of life span will be taken place in the network.

      acknowledgement from destination to source. If acknowledgement is not received in particular period, AACK switches to TACK. But both TWOACK and AACK suffers from a problem that they fail to detect malicious nodes with the presence of false misbehavior report and forged acknowledgement packets.

      PA

      PA

      S A B C X D PACKET 1

      PA

      PA

      PA

      PA

      PA

      PA

      A

      A

      A

      A

      A

      A

      A

      A

      A

      A

      Fig 2: ACK Scheme

      Signature is a mathematical scheme for demonstrating the authentication of document. A valid digital signature gives that message is created by a known sender. Digital signature came from crytography. Cryptography is the study of providing security to the information while transmitting from source to destination. The aspects of providing security are authentication, integrity, confidentiality and non repudiation.

      Digital Signature can be divided into two categories. They are:-

      1. Digital signature with appendix

      2. Digital signature with message recovery

      1. EX: – Digital Signature Algorithm (DSA)

      EX: – RSA

      In this paper, we proposed the both RSA and DSA

  3. PROBLEM DESCRIPTION

    In this paper, EAACK is proposed for handling weakness of WATCHDOG scheme. EAACK can handle three out of six weaknesses, namely,

    FALSE MISBEHAVIOUR REPORT, LIMITED TRANSMISSION

    POWER and

    RECEIVER COLLISION.

    In this section, explanation of these three weaknesses can be taken place.

    1. S A B C X D

      PA

      PA

      F

      F

      PA OVE

      Fig 3: FRA

      As the name suggests, FALSE MISBEHAVIOUR REPORT, as

      particular node working properly, another node reports has it is not working properly to main node or source node. For this FALSE MISBEHAVIOUR REPORT (FRA),

      example is explained in fig 3.

      In fig 3, source node S sends a packet to destination node D via intermediate nodes A, B, C, and X. As node B sends packet to node C and node B gives reply to node A. As node A overhears the message of node B and gives a false report to source node S, i.e., node B is not working properly and node B does not sends the packet to node C. This process is known as FALSE MISBEHAVIOUR REPORT (FRA).

    2. too weak to be received by the true recipient.

      OVE

      PA

      OVE

      PA

      S A B C X D

      Fig 4: LRA

    S A B C X D

    PA

    PA

    PA

    OVE

    PA

    Fig 5: RC

    IN this RECEIVER COLLISIONS,

    source node S sends packet 1 to destination node D and at the same time destination node D sends a packet 2 to source node S. Node B sends the packet 1 to node C and tells to node A that packet 1 is transmitted to node C but node B doesnt know that node X also sends a packet 2 to

    node C. At node C, both the packets collide each other and both the packets are dropped at same time. This procedure is known as RECEIVER COLLISION.

  4. SCHEME DESCRIPTION

To overcome the problems in watchdog, DYMO Routing Protocol is used.

Dynamic MANET On Demand Routing protocol is a combination of reactive and proactive routing protocol. It is extension of AODV and DSR. As like DSR, it also consists of RREQ and RREP. Every node forwards RREQ to other nodes for destination node. In this manner, each and every node learns about other nodes in the network. DYMO Protocol consists of two protocols. Route discovery and route maintenance.

Route discovery is to discover the route from source node to destination node. This process is done by flooding i.e., broadcasting the packet to all other nodes in the network. While transmitting the packet to destination node, intermediate node adds its IP

ADDRESS to the packet header. Due to this RREP is possible from destination to source node in reverse path.

Each node maintains routing table with information about other nodes. Each entry in routing table consists of:

Route Maintenance is the process of responding the changes in the network that happens when a route is created. To maintain the path, nodes actively monitor the links between them. If destination node receives the packet without a valid path i.e., from source to destination,

then Route Error (RERR) has been occurred.

In RERR, nodes maintain the list of address and sequence number as unreachable node

REFERENCES:

  1. Study of routing protocols and secure routing of MANET in AD HOC & SENSOR NETWORKS by DHARMA PRAKASH AGGRAWAL & CARLOS DE MORAIS CORDEIRO.

  2. Study of routing protocols and MANET in MOBILE AD HOC NERTWORK FROM WIRELESS LANS TO 4G NETWORKS by GEORGE AGGLEOU

  3. Nan Kang, Elhani M.Shakshuki and Tarek R.Sheltami.Detecting Forged Acknowledgements in MANET. Published in 2011 IEEE Conference on Advanced Information Networking ang Applications.

  4. Aishwarya Sagar Anand Ukey and Meenu Chawla Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET. Published in International Journal of Computer Science Issues, Vol 7, Issue 4,No 1, July 2010.

  5. Tarag Fahad & Robert Askwith Misbehavior Detection Mechanism for Mobile Ad-hoc Networks.

  6. Johann Lopez, Jose M.Barcelo, Jorge Garcia-Vidal ANALYSING THE OVERHEAD IN MOBILE ADHOC

    NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

  7. Md Foyzer Mondal & Akshai Aggarwal A REPORT ON STUDY OF MANET ROUTING PROTOCOLS BY GLOMOSI SIMULATOR

  8. Ashwini K.Pandey and Hiroshi Fujinoki STUDY OF MANET ROUTING PROTOCOLS BY GLOMOSIM SIMULATOR. International Journal of Network Management

  9. Tiranuch Anantvalee and Jie Wu A SURVEY ON INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

  10. Akash Singh, Manish Maheswari, Nikhil and Neeraj Kumar SECURITY AND TRUST MANAGEMENT IN MANET.

  11. Diffie Hellman Key Exchange algorithm in NETWORK SECURITY ESSENTIALS by WILLIAM STALLINGS

  12. Elhadi M.Shakshuki, senior member of IEEE, Nag Kang and Track R.Sheltami, Member of IEEEEAACK-A SECURE INTRUSION-DETECTION SYSTEM FOR MANET IEEE Transactions on industrial Electronics. Vol 60 NO 3 march 2013

  13. Priyanka Goyal, Vinti Parmar, Rahul Rishi MANET VULNERABILITIES, CHALLENGES, ATTACKS, APPLICATIONS published in International Journal of computational Engineering & Management. Vol 11 January 2011.

  14. Vivek Arya and Charu A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANET Published in international journal on AD HOC NETWORKING SYSTEM Vol 3 No 3 July 2011.

  15. Meenakshi Patel and Sanjey SharmaDETECTION OF MALICIOUS ATTACKS ON MANET A BEHAVIOURAL APPROACH.

  16. Hariom soni, Asst.prof. Preeti Varma A SURVEY ON PERFORMANCE BASED SECURE ROUTING PROTOCOLS IN

    MANET. Published in International Journal of Advanced Research in Computer Science & Engineering. Vol 2 ISSUE 1, January 2013

  17. Bounpadith Kannhavong, Hidehisa Nakayama, Yokhiaki Nemoto, And Nei Kato A SURVEY OF ROUTING ATTACKS IN MOBILE ADHOC NETWORKS.

Leave a Reply