Vampire Attack Detecting and Preventing in Wireless Sensor Network



Similar documents
SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A New Proof-of-Concept Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security in Ad Hoc Network

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

DENIAL OF SERVICE RESILIENCE IN ADHOC SENSOR NETWORKS WITH CUSTOM DEFINED FIREWALL

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Securing MANET Using Diffie Hellman Digital Signature Scheme

SPINS: Security Protocols for Sensor Networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Anomaly Detection through Firewall Policies and Vampire Attacks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

A Catechistic Method for Traffic Pattern Discovery in MANET

Wireless Sensor Networks Chapter 14: Security in WSNs

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Prediction of DDoS Attack Scheme

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Denial of Service in Sensor Networks

CHAPTER 1 INTRODUCTION

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

A Novel Packet Marketing Method in DDoS Attack Detection

TOPOLOGIES NETWORK SECURITY SERVICES

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks


Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Security for Ad Hoc Networks. Hang Zhao

Introduction to Wireless Sensor Network Security

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Problems of Security in Ad Hoc Sensor Network

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

EFS: Enhanced FACES Protocol for Secure Routing In MANET

Intrusion Detection for Mobile Ad Hoc Networks

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

International Journal of Advanced Research in Computer Science and Software Engineering

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Routing Protocols Security in Ah Hoc Networks

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

A Security Architecture for. Wireless Sensor Networks Environmental

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

Wireless Sensor Network: Challenges, Issues and Research

Security Threats in Mobile Ad Hoc Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Energy Consumption analysis under Random Mobility Model

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Transcription:

International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in Wireless Sensor Network M Kusuma M. Tech Student, Department of CSE S V College of Engineering Tirupati B Ramakanth Reddy Assistant Professor, Department of CSE S V College of Engineering Tirupati Abstract: Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. A single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. This paper will use two attack on stateless protocol in which first Carousel attack is an adversary sends a packet with a route composed as a series of loops, such that the same node appears in the route many times. Second Stretch attack where a malicious node constructs artificially long source routes, causing packets to traverse a larger than optimal number of nodes. The vampire attack are very difficult to detect and more over very difficult to prevent. Keywords: Wireless network, carousel attack, stretch attack, routing, Vampire attack, Denial of services, Malicious discovery attack 1. INTRODUCTION Wireless ad-hoc network is needed to explore in sensing and pervasive computing. The security work till now focuses on denial of communication at the routing or medium access control levels. The Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. Vampire attack as the composition and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination, although using different packet headers. All the protocols are devastating, difficult to detect and easy to carry out using as few as one malicious insider sending only protocol compliant messages. The proposed system discuss the methods to detect and mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. 1.1. Classification DOS attacks represents in wired networks are frequently characterized by amplification an adversary can amplify the resources it spends on the attack the cumulative energy of an entire network, amplification attacks are always possible, given that an adversary can compose and send messages which are processed by each node along the message path. Vampire attack as the composition and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination, although using different packet headers. 1.2. Protocols and Assumptions All routing protocols employ at least one topology discovery period, since ad-hoc deployment implies no prior position knowledge. a single Vampire may attack every network node simultaneously, meaning that continuous recharging does not help unless Vampires are more resource-constrained than honest nodes Vampire attacks may be weakened by using groups of nodes with staggered cycles: only active-duty nodes are vulnerable while the Vampire is active; nodes are safe while the Vampire sleeps this defense is only effective when duty cycle groups outnumber Vampires, since it only takes one IJEERT www.ijeert.org 306

M Kusuma & B Ramakanth Reddy Vampire per group to carry out the attack. 1.3. Overview In the first attack that is Carousal attack an adversary composes packets with purposely introduced routing loops It targets source routing protocols by exploiting the limited verification of message headers at forwarding nodes, allowing a single packet to repeatedly traverse the same set of nodes. In the second attack that is stretch attack an adversary constructs artificially long routes, potentially traversing every node in the network. The assumption has been made that only messages originated by adversaries may have maliciously-composed routes. Fig(a). An honest route would exit the loop Fig (b) honest route is dotted while immediately from Node E to sink. Malicious code is dashed immediately from Node E to sink. Malicious code is dashed. Above figure shows Malicious route construction attacks on source routing: carousel attack Fig (a) and stretch attack Fig (b). 2. RELATED WORK Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. [1,2,3] the most permanent denial of service attack is to entirely deplete nodes batteries. This is an instance of a resource depletion attack, with battery power as the resource of interest. some of the individual attacks are simple, and power-draining and resource exhaustion attacks have been discussed before [4,5,6], prior work has been mostly confined to other levels of the protocol stack, e.g. medium access control (MAC) or application layers, and there has been a little discussion, and no thorough analysis or mitigation, of routing-layer resource exhaustion attacks. Vampire attacks are not protocol-specific, in that they do not rely on design properties or implementation faults of particular routing protocols, but rather exploit general properties of protocol International Journal of Emerging Engineering Research and Technology 307

Vampire Attack Detecting and Preventing in Wireless Sensor Network classes such as link-state, distance-vector, source routing and geographic and beacon routing. 3. ATTACKS ON STATELESS PROTOCOL Fig(c). Node energy distribution under various attack scenarios Figure (a) Honest scenario: node 0 sends a single message to node 19 Fig(b). Carousel attack (malicious node 0): the nodes traversed by the packet are the same as in (a), but the loop over all forwarding nodes roughly triples the route length (the packet traverses the loop more than once). International Journal of Emerging Engineering Research and Technology 308

M Kusuma & B Ramakanth Reddy Note the drastically increased energy consumption among the forwarding nodes. The carousel and stretch attacks (Fig (a) & Fig (b)) in a randomly-generated 30-node topology and a single randomly-selected malicious DSR agent, using the ns-2 network simulator. Malicious nodes are not driving down the cumulative energy of the network purely by their own use of energy. (c) Stretch attack (malicious node 0): the route diverts from the optimal path between source and destination, roughly doubling in length. Note that while the per-node energy consumption increase isnot as drastic as in (b), the region of increased energy consumption is larger. Overall energy consumption is greater than in the carousel attack, but spread more evenly over more network nodes 3.1. Mitigation Methods The carousel attack can be prevented when a loop is detected, the source route could be corrected and the packet sent on, but one of the attractive features of source routing is that the route can itself be signed by the source. The stretch attack is more challenging to prevent. Its success rests on the forwarding node not checking for optimality of the route. 4. ATTACKS ON STATEFUL PROTOCOLS Routes in link-state and distance-vector networks are built dynamically from many independent forwarding decisions, so adversaries have limited power to affect packet forwarding, making these protocols immune to carousel and stretch attacks. Vampires have little control over packet progress when forwarding decisions are made independently by each node, but they can still waste energy by restarting a packet in various parts of the network. In directional antenna attack. Vampires have little control over packet progress when forwarding decisions are made independently by each node, but they can still waste energy by restarting a packet in various parts of the network. In Malicious discovery attack the attack on all previously-mentioned routing protocols (including stateful and stateless) is spurious route discovery. 5. PROVABLE SECURITY AGAINST VAMPIRE ATTACKS The no backtracking property, satisfied for a given packet if and only routes. This already means the adversary cannot perform carousel or stretch attacks, no node may unilaterally specify a suboptimal path through the network. 6. CONCLUSION The first sensor network routing protocol that provably bounds damage from Vampire attacks by International Journal of Emerging Engineering Research and Technology 309

Vampire Attack Detecting and Preventing in Wireless Sensor Network verifying that packets consistently make progress toward their destinations Derivation of damage bounds and defenses for topology discovery, as well as handling mobile networks, is left for future work. REFERENCES [1] Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004. [2] John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003. [3] Jing Deng, Richard Han, and Shivakant Mishra, Defending against pathbased DoS attacks in wireless sensor networks, ACM workshop on security of ad hoc and sensor networks, 2005. [4] Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006. [5] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology 58 (2009), no. 1. [6] Frank Stajano and Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, International workshop on security protocols, 1999. [7] Amitabh Saxena and Ben Soh, One-way signature chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security 2 (2008), no. 3. [8] Michael Scott, Neil Costigan, and Wesam Abdulwahab, Implementing cryptographic pairings on smartcards, CHES, 2006. International Journal of Emerging Engineering Research and Technology 310