SECURE DATA TRANSMISSION USING MOBILE AD-HOC NETWORK

Similar documents
Mobile Ad Hoc Networking: Imperatives and Challenges

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Security in Ad Hoc Network

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Security for Ad Hoc Networks. Hang Zhao

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

IJMIE Volume 2, Issue 7 ISSN:

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

A Catechistic Method for Traffic Pattern Discovery in MANET

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Security Threats in Mobile Ad Hoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Wireless Sensor Networks Chapter 14: Security in WSNs

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Problems of Security in Ad Hoc Sensor Network

TOPOLOGIES NETWORK SECURITY SERVICES

CHAPTER 1 INTRODUCTION

EPL 657 Wireless Networks

ECE/CS 372 introduction to computer networks. Lecture 13

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

6LoWPAN Technical Overview

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Cross-layer security and resilience in wireless mesh networks

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Adaptive DCF of MAC for VoIP services using IEEE networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Fundamentals of Mobile and Pervasive Computing

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

mlab: A Mobile Ad Hoc Network Test Bed

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Denial of Service in Sensor Networks

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

8 Conclusion and Future Work

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

SBSCET, Firozpur (Punjab), India

Propsim enabled Mobile Ad-hoc Network Testing

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

A survey on Wireless Mesh Networks

A Review of Secure Ad-hoc Routing

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Djenouri Djamel & Nadjib Badache

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

LIST OF FIGURES. Figure No. Caption Page No.

Security in Wireless Local Area Network

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Module 15: Network Structures

other. A B AP wired network

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

10. Wireless Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Computer Networking: A Survey

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing

Secure Forwarding in Personal Ad Hoc Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Wireless Mesh Networks under FreeBSD

Real-Time (Paradigms) (51)

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Transcription:

SECURE DATA TRANSMISSION USING MOBILE AD-HOC NETWORK (S.SARANYA,MCA-II YEAR, IFET College of Engineering.) ABSTRACT: A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. The Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. It represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ad-hoc network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure. The vision of traveling computing with its everywhere access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. In the open, collaborative MANET environment practically any node can maliciously or selfishly disrupt and deny communication of other nodes. The Secure Message Transmission (SMT) protocol, which safeguards the data transmission against arbitrary malicious behavior of other nodes. SMT is a lightweight, yet very effective, protocol that can operate solely in an end-to-end manner. It exploits the redundancy of multi-path routing and adapts its operation to remain efficient and effective even in highly adverse environments. SMT is capable of delivering up to 250% more data messages than a protocol that does not secure the data transmission. Moreover, SMT out performs an alternative single-path protocol, a secure data forwarding protocol we term Secure Single Path (SSP) protocol. The security of data transmission is achieved without limiting assumptions on the network nodes trust and network membership, without the use of intrusion detection schemes, and at the expense of moderate multi-path transmission overhead only. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile adhoc networks play in the evolution of future wireless technologies. 1. INTRODUCTION: Wireless cellular systems have been in use since 1980s. We have seen their evolutions to first, second and third generation's wireless systems. Wireless systems operate with the aid of a centralized supporting structure such as an access point. These access points assist the wireless users to keep connected with the wireless system, when they roam from one place to the other. The presence of a fixed supporting structure limits the adaptability of wireless systems. In other words, the technology cannot work 1

effectively in places where there is no fixed infrastructure. Future generation wireless systems will require easy and quick deployment of wireless networks. This quick network deployment is not possible with the existing structure of current wireless systems. Recent advancements such as Bluetooth introduced a new type of wireless systems known as mobile ad-hoc networks. Mobile adhoc networks or "short live" networks operate in the absence of fixed infrastructure. They offer quick and easy network deployment in situations where it is not possible otherwise. Ad-hoc is a Latin word, which means "for this or for this only." Mobile adhocnetwork is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. An Ad-hoc network is a collection of wireless mobile nodes which dynamically forming a temporary mobile nodes which dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. The proliferation of mobile computing and communication devices, (e.g., cell phones, laptops, handheld digital devices) is driving a revolutionary change in our information society. The communication in mobile ad hoc networks comprises two phases, the route discovery and the data transmission. In an adverse environment, both phases are vulnerable to a variety of attacks. First, adversaries can disrupt the route discovery by impersonating the destination, by responding with stale or corrupted routing information, or by disseminating forged control traffic. This way, attackers can obstruct the propagation of legitimate route control traffic and adversely influence the topological knowledge of benign nodes. However, adversaries can also disrupt the data transmission phase and, thus, fraudulently redirecting, or even dropping data traffic or injecting forged data packets. To provide complete security, both phases of MANET communication must be safeguarded. It is important that secure routing protocols, which ensure the correctness of the discovered topology information, cannot by themselves ensure the secure and undisrupted delivery of transmitted data. This is so, since adversaries could abide with the route discovery and be placed on utilized routes. But then, they could tamper with the in-transit data in an arbitrary manner and degrade the network operation. Currently, most of the connections among these wireless devices are achieved via fixed infrastructure-based service provider, or private networks. Fig. 1 : Mobile Network There are, furthermore, situations where user required networking connections are not available in a given geographic area, and Providing the needed connectivity and network services in these situations becomes a 2

real challenge. More recently, new alternative ways to deliver the services have been We de ne a network node as a process with:1) a unique identity, 2) a public/private key pair, 3) a module implementing the networking protocols, e.g., routing, data transmission; and 4) a module providing communication across a wireless network interface. The combination of an Internet protocol (IP) address and a public key can uniquely identify a node. We assume that any two nodes and that wish to communication in a secure manner are capable to establish an end to end security association (SA). Since symmetric-key cryptographic primitives are computationally more efficient than public-key ones, we assume that a symmetric shared key instantiates the SA between the end nodes, the source and the destination. Can be established through an authenticated Dif e Hellman exchange integrated with the initial route discovery. Other methods to bootstrap associations are surveyed in. We emphasize that the operation of SMT and SSP does not require that and are securely associated with any of the remaining, intermediate network nodes, which assist the S, communication. We make no assumptions on the behavior or the motivation of the intermediate nodes; they are either correct, that is, comply with the protocol rules, or adversaries, deviating from the protocol dentition in an arbitrary manner. Characteristics of MANET Network is not depending on any fix infrastructure for its operation. Easy of deployment Speed of deployment emerging. This paper demonstrates the impetus behind mobile ad hoc networks, and presents a representative collection of technology solutions used at the different layers of the network. 2. NETWORK AND SECURITY MODEL Dynamic Changing Topology of nodes Multi-hop network each node is working as intelligent node not any mediator networking device is required for communications Each node is work as a DTE (Data Terminal Equipment) and DCE (Data Communication Equipment). 3. AD-HOC APPLICATIONS Tactical networks: Military Communication automated Battle fields. Sensor Network: Remote weathers for sensors, earth activities. Emergency Services: Disaster recovery, earthquakes, crowd control and commando operations. Educational Applications: Setup virtual class &conference rooms. Entertainment: Multi-user games, robotics. Location Aware Services: Automatic Call forwarding, advertise location specific services, Location dependent travel guide. In this paper, we describe the ongoing research activities and the challenges in some of the main research areas within the mobile ad hoc network domain. To present the huge amount of research activities on ad hoc networks in a systematic/organic way, we will use, as a reference, the simplified architecture shown in as shown in the figure, the research activities will be grouped, according to a layered approach into three main areas: 3

Enabling technologies; Networking; Middleware and applications. In addition, as shown in the figure, several issues (energy management, security and cooperation, quality of service, network Simulation) span all areas, and we discuss them separately. Ad hoc networks can be classified, depending on their coverage area, as : Body (BAN), Personal (PAN), Local (LAN),Metropolitan (MAN) and Wide(WAN) area networks. Ad-hoc singlehop BAN, PAN and LAN wireless technologies are already common on the market, these technologies constituting the building blocks for constructing small, multi-hop, ad hoc networks that extend their range over multiple radio hops. For these reasons, BAN, PAN and LAN technologies constitute the Enabling technologies for adhoc networking. The success of a network technology is connected to the development of networking products at a competitive price. A major factor in achieving this goal is the availability of appropriate networking standards. Currently, two main standards are emerging for ad hoc wireless networks: the IEEE 802.11 standard for WLANs, and the Bluetooth specifications 3 for short-range wireless communications. 4.SECURE DATA TRANSMISSION: A. Secure Message Transmission (SMT) Protocol:- SMT uses an active path set (APS) comprising node-disjoint paths, determined and deemed operational at the source, for communication with a specie c destination. disperses each outgoing message, adding limited redundancy to the data and dividing the resultant information into pieces, which are transmitted across the APS routes one piece per route. A message authentication code (MAC), calculated with, and a sequence number are appended to each piece, so that can validate their integrity and origin authenticity, and reject replayed traffic. Reports successfully received pieces back to, through cryptographically protected and dispersed feedback. Validates the feedback messages, unless a retransmission timer (RTO) expires when none of the message or feed-back pieces are received. B. Fault Detection: Each path in the APS is associated with a rating. Explicit allows SMT additional versatility and robustness, because it can compose routes from the discovered routes and can correlate loss/delivery with specific links. Assumed to be Secure Routing Protocol, 4

Path Discovery This path rating scheme is not sensitive to the attack pattern an intelligent adversary selects. In general, an adversary could select an attack pattern in an attempt to maximize the number of packets it tampers with, while it remains undetected and the route it controls in use. We showed in that for any arbitrary selection of packets the attacker tampers with, the band-width loss (BWL) over a path, that is, the fraction of discard decor corrupted packets without the route deemed nonoperational, Minimize Regret and Bandwidth Loss (BWL) Path Survival S: number of Samples t: current path age d: maximum transmission time τ: lifetime of route Provides end-to-end security effectively protects against data loss Requires no advance knowledge of node trustworthiness automatically adapt to environment mechanism not subject to abuse by adversaries Tactical systems that operate in hostile environments Civilian systems compromised by selfish users and rogue network device. 5. MAC PROTOCOL Bluetooth and IEEE 802.11 technologies exemplify the two main categories in which multiple access networks can be categorized into: random access (e.g., CSMA, CSMA/CD) and controlled access (e.g., TDMA, token passing schemes, etc.). The lack of an infrastructure, and the peer-to-peer nature of ad hoc networking, make random access protocols the natural choice for medium access control in ad hoc networks. Indeed, most proposals of MAC protocols for ad hoc networks are based on the random access paradigm; in addition, the CSMA/CA scheme was selected (due to the inherent flexibility of this scheme) by the IEEE802.11committee as the basis for its standards. On the other hand, demand assignment access schemes (even though generally more complex) are more suitable for environments that need guarantees on the Quality of Service (QoS) perceived by its users. Several controlled access schemes exist, e.g.,tdma, CDMA, token-passing, etc. Among these, TDMA is the most commonly used in ad hoc networks. In the TDMA approach, the channel is generally organized 5

in frames, where each frame contains a fixed number of time slots. The mobile hosts negotiate a set of TDMA slots in which to transmit. The mobile multi-hop ad hoc environment brings fresh challenges to TCP protocol. The dynamic topologies, and the interaction of MAC protocol mechanisms (e.g., 802.11 exponential back-offs cheme) with TCP mechanisms (congestion control and time-out)lead in a multihop environment to new and unexpected phenomena. 6. NETWORK SECURITY AND COOPERATION Wireless mobile ad hoc nature of MANET brings new security challenge to the network design. Mobile wireless networks are generally more vulnerable to information and physical security threats than fixed wired networks. Vulnerability of channels and nodes, absence of infrastructure and dynamically changing topology, make ad hoc networks security a difficult task. Broadcast wireless channels allow message eavesdropping and injection (vulnerability of channels). Nodes do not reside in physically protected places, and hence can easily fall under the attackers_ control (node vulnerability). The absence of infrastructure makes the classical security solutions based on certification authorities and on-line servers inapplicable. Finally, the security of routing protocols in the MANET dynamic environment is an additional challenge. The self-organizing environment introduces new security issues that are not addressed by the basic security services provided for infrastructure based networks. Security mechanisms that solelyen force the correctness or integrity of network operations would thus not be sufficient in MANET.A basic requirement for keeping the network operational is to enforce ad hoc nodes contribution to network operations, despite the conflicting tendency (motivated by the energy scarcity) of each node towards selfishness. 7. SIMULATION AND PERFORMANCE EVALUATION There are two main approaches in system performance evaluation: the first uses measurements; the second is based on are presentation of the system behavior via a model Measurement techniques are applied to real systems, and thus they can be applied only when a real system, or a prototype of it, is available. Currently, only few measurements studies on real ad hoc tesbed scan be found in the literature. The Uppsala University APE testbed is one of the largest, having run tests with more than thirty nodes. The results from this testbed are very important as they are pointing out problems that were not detected by preceding simulation studies. An important problem, related to the different transmission ranges for 802.11b control and data frames, is the so-called communication gray zones problem. This problem was revealed by a group of researchers at the Uppsala University, while measuring the performance of their own implementation of the AODV routing protocol in an IEEE 802.11b ad hoc network. Observing an unexpected large amount of packets_ losses, mainly during route changes, it was found that increase in packet loss occurred in some specific geographic areas termed called communication gray zones. In such zones, the packet loss experienced by a station may be extremely high, up to 100%, thus severely affecting the performance of applications associated with a continuous 6

packet flow (e.g., file transfers and multimedia streaming). It was also found that the reason for this phenomenon is that a station inside a gray zone is considered (using the routing information) reachable by a neighboring station, while actual data communication between the stations is not possible. The same problem was found to affect other routing protocols, such as OLSR. It is important to point out that communication gray zone problem cannot be revealed by commonly used simulation tools (e.g., NS-2, Glomosim), as in these 802.11 models both unicast and broadcast transmissions are performed at 2 Mbps, and hence have the same transmission range. Constructing a real ad hoc network testbed for a given scenario is typically expensive and remains limited in terms of working scenarios, mobility models, etc. Furthermore, measurements are generally non-repeatable. For these reasons, protocols scalability, sensitiveness to users mobility patterns and speeds are difficult to investigate on a real testbed. Using a simulation or analytic model, on the other hand, permits the study of system behavior by varying all its parameters, and considering a large spectrum of network scenarios. Evaluating system performance via a model consists of two steps: (i) defining the system model, and (ii) solving the model using analytical and/or simulative techniques. Analytical methods are often not detailed enough for the ad hoc networks evaluation and in terms of accounting for mobility, in their infancy. On the other hand, simulation modeling is a more standardized, mature, and flexible tool for modeling various protocols and network scenarios, and allows (by running the simulation model) collection and analyses that fully characterize the protocol performance in most cases. Mobility models: The ability of ad hoc networks protocols to correctly behave in a dynamic environment, where devices position may continuously change, is a key issue Network simulators : Most MANET simulative studies are based on simulation tools. The main advantage of these tools is that they provide libraries containing predefined models for most communication protocols. 8. CONCLUSIONS In coming years, mobile computing will keep flourishing, and an eventual seamless integration of MANET with other wireless networks, and the fixed Internet infrastructure, appears inevitable. Ad hoc networking is at the center of the evolution towards the 4 th generation wireless technology. Its intrinsic flexibility, ease of maintenance, lack of required infrastructure, auto-configuration, self-administration capabilities, and significant costs advantages make it a prime candidate for becoming the stalwart technology for personal pervasive communication. The opportunity and importance of ad hoc networks is being increasingly recognized by both the research and industry community. In moving forward towards fulfilling this opportunity, the successful addressing of open technical and economical issues will play a critical role in achieving the eventual success and potential of MANET technology. Finally, I would like to state that in the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. 7

Since network scenarios cannot rely on centralized and organized connectivity and can be conceived as applications of Mobile Ad-hoc Networks. Provides end-to-end security effectively protects against data loss Requires no advance knowledge of node trustworthiness automatically adapt to environment mechanism not subject to abuse by adversaries Tactical systems that operate in hostile environments Civilian systems compromised by selfish users and rogue network device. 9.REFERENCES 1)P. Papadimitratos and Z.J. Haas, Secure Routing for Mobile Ad Hoc Networks. 2)M.O. Rabin, Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. 3)H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, Feb. 1997. 4) A. Tsirigos and Z.J. Haas, Multipath Routing in the Presence of Frequent Topological Changes, IEEE Comm. Magazine, pp. 132-138, Nov. 2001. 8