Tuesday, June 4, 2019

Securing MANET From Routing Attacks

Securing MANET From Routing AttacksCHAPTER 3RESEARCH METHODOLOGY3.1 RESEARCH PROBLEMThe increasing demand and utilization of wireless engineering is making the need for more secure wireless networks. From the warranter viewpoint MANET is one of the most interesting research fields. A MANET is generally exposed to vulnerabilities overdue to its open medium, rapidly varying network topology, lack of centralized control and lack of clear line protection and it suffers from a wide range of security threats and endeavors.Attacks can be introduced into all the layers of protocol stack however the polish ups on the routing layer argon most detrimental. The attacks on the routing layer can be every from the outside the network or can take place within the network. The attacks from outside of the network contain no authentication information and can be avoided by employing authentication techniques and cryptographic schemes. The most common insider attacks include blackhole, wormhole, se lective forwarding, RREQ and hello make full, Sybil, sink hole and so on. Insider attackers are more critical compared to the outsider attack as the insider knows the valuable information and holds the access rights. To solve this issue, security solutions have to be proposed in order to secure MANET. The goal of this thesis is to psychoanalyze the impact of blackhole, wormhole and flooding attack under on-demand routing protocols much(prenominal) as AODV and DSR and to propose possible countermeasures to thwart these attacks.3.2 AIM AND OBJECTIVESThe aim of this research work is to secure the MANET from variant routing attacks in order to improve the performance of the network. To achieve this aim, the following objectives are formulatedTo essay the impact of blackhole, wormhole and flooding attack under AODV and DSR routing protocolTo analyse piece of ground sales pitch ratio and end-to-end delay in case of black hole, wormhole and flooding attack using AODV and DSR protoc ol and the results of AODV and DSR are compared to evaluate which of these protocols are more susceptible to these kind of attacks.To develop defence mechanisms against blackhole, worm hole and flooding attack under AODV and DSR protocol.3.3 SCOPE OF THE THESISThere exists various routing attacks in MANET such(prenominal) as blackhole, wormhole, Sybil, selective forwarding and flooding attack and so on. This research work considers only blackhole, wormhole and flooding attack and its impact on on-demand routing protocols such as AODV and DSR is analysed. Efficient detection techniques have been developed to mitigate the effect of these attacks against AODV and DSR routing protocol. The performance of these routing protocols using the detection techniques are evaluated in terms of packet delivery ratio and end-to-end delay.3.4 SYSTEM ARCHITECTUREThis research focuses on blackhole, wormhole and flooding attacks on AODV and DSR protocol. The architecture of the proposed system is given in Figure 3.1. Efficient techniques such as MSBD and ABM, MCHOP and CDCF, MCLUT and TSPS has been developed to detect blackhole, wormhole and flooding attacks under AODV protocol and techniques such as ABM, CDCF and TSPS have been developed to mitigate against blackhole, wormhole and flooding attacks under DSR protocol. The proposed techniques detect these attacks in effect and provide a secure lane.Figure 3.1 An Overview Of Attacks On MANET Routing Protocol And Their undercover work Techniques3.5 DETECTION TECHNIQUES AGAINST BLACKHOLE, WORMHOLE AND FLOODING ATTACKS3.5.1 MultiShared Bandwidth Approach for Blackhole Attack DetectionThe AODV protocol is vulnerable to the long-familiar black hole attack. In this thesis, the multishared approach is designed to prevent any alterations in the default operation of either the intermediate inspissations or the destination thickeners. Here, watchdog mechanism is incorporated with MultiShared Bandwidth (MSBD) approach to detect misbehavi our or abnormal activity of a node, once an abnormal activity is observed MSBD is initiated. The MSBD converts the data into 16 bit and further splits the 16 bit data into multiple shares. When multishared data is received by a node it checks the bandwidth of neighbouring nodes to transmit the data. Then it chooses the nodes with highest bandwidth along the path and sends the data through these selected paths.3.5.2 MCHOP-A Cluster based Approach for Wormhole Attack DetectionIn AODV routing protocol, the trespasser will attack the network using the attack desire wormhole during the route discovery stage. A cluster based algorithm has been proposed to detect a wormhole attack on AODV routing protocol. In this approach, the network is partitioned into several clusters based on density based clustering algorithm. Here, AODV protocol is modified in such manner that it detects the wormhole attack based on the hop count comparison and period taken to receive RREP packets. The cluster he ad is responsible for adding certain fields such as hop count, destination address to the RREQ packet and it broadcasts it to the other cluster head in the network. Whenever the intermediate node receives the RREQ packets, it sends an ACK to the source node with hop count information and broadcasts it to the destination node. The destination node then unicasts the RREP to the source node utilizing the reverse path. The RREP is then validated by source node using the hop count information and time taken for receiving the packet.3.5.3 MCLUT- Clustering Approach for flood Attack DetectionThe proposed MCLUT approach is used to detect the flooding attack node by enabling the clustering approach and calculating the threshold take account of each node in the cluster. Here dynamic threshold rate is used. The threshold value is estimated based on the queue length of a node and its neighbour in the cluster. If a node does not satisfy the threshold value then it is considered as an intruder . Once the cluster head confirms that the node is intruder it then broadcast the message to other nodes to isolate the node from the cluster and the suspicious node is kept in observation.3.5.4 Anomaly based Behaviour monitor algorithm for Black hole Attack Detection under AODV and DSR protocolThe proposed Anomaly based Behaviour Monitoring (ABM) algorithm detects blackhole attack on AODV and DSR protocol. This technique periodically checks and verifies whether the number of packets disseminated between source and destination are equal. Through this comparison, the source node could detect the presence of black hole node.3.5.5 Channel Detection and Cut Defalconin algorithm for Wormhole Attack Detection on AODV and DSRChannel Detection and Cut Defalconin (CDCF) algorithm is proposed to detect wormhole attack on DSR and AODV protocol. This method detects a wormhole attack in the network based on the threshold limit and then provides a new route to forward the packet from source to de stination. The threshold value is determined based on Round Trip Time (RTT) and a delay per hop (DPH) is calculated based on the RTT, while forwarding packet from source to destination with the vindictive nodes, its take less Round Trip Time (RTT) to forward the packets to the destination, when forwarding packet from source to the destination without any malicious node attack, it takes more RRT to forward the packets to the destination. If the DPH of a node is smaller than all other nodes, then it indicates the wormhole attack presence.3.5.6Transmission Sequence Based Packet Scanner Algorithm for Flooding Attack Detection on DSR and AODV.Flooding is a Denial of Service (Dos) that is designed to bring down the service of the network by flooding it with huge volume of traffic. Transmission Sequence based Packet Scanner (TSPS) technique has been proposed to detect flooding attack on DSR and AODV. The TSPS identifies the presence of flooding attack based on source id, empty packet, num ber of hops and transmission sequence number.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.