CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES



Similar documents
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

LIST OF FIGURES. Figure No. Caption Page No.

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

A Catechistic Method for Traffic Pattern Discovery in MANET

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Optimized Load Balancing Mechanism Using Carry Forward Distance

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Routing in packet-switching networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Study of Network Characteristics Incorporating Different Routing Protocols

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols

Wireless Sensor Networks Chapter 14: Security in WSNs

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

SBSCET, Firozpur (Punjab), India

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Securing MANET Using Diffie Hellman Digital Signature Scheme

Final for ECE374 05/06/13 Solution!!

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Customer Specific Wireless Network Solutions Based on Standard IEEE

Secure SCTP against DoS Attacks in Wireless Internet

ITL BULLETIN FOR JANUARY 2011

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Location Information Services in Mobile Ad Hoc Networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Security Threats in Mobile Ad Hoc Networks

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Efficient Load Balancing Routing in Wireless Mesh Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Security for Ad Hoc Networks. Hang Zhao

Figure 1. The Example of ZigBee AODV Algorithm

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Energy Optimal Routing Protocol for a Wireless Data Network

Denial of Service in Sensor Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

An Overview of ZigBee Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

Location-Aided Routing (LAR) in mobile ad hoc networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Tema 5.- Seguridad. Problemas Soluciones

Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks

Transcription:

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather than the usual method of using a single path for data transfer. But the path selected for dispersion depends on the direction of the packet travel. To solve this problem, the dynamic routing technique is proposed. It uses the Backpressure and the Reactive routing techniques to incorporate dynamicity during routing. 6.2 Backpressure Routing The Backpressure Routing algorithm [Lee & Gerla, 2001] does not pre-compute routes for packets. Instead, it computes a route based on the current congestion value of the current node. Our modified form of the Backpressure algorithm does not involve the commodity size during the determination of the route for a particular packet. Since the nexthops are chosen dynamically, depending on the network congestion values, this algorithm can be considered throughput optimal. The Backpressure algorithm works in two stages: Determine the next hops that are to be taken for moving towards the destination Selecting the least congested next-hop for the transmission of the arrived packet 84

6.3 Reactive Routing The Reactive Routing protocol used here is SENCAST [Sun et al. 2007]. In general, the Reactive Routing protocols find a route on demand by flooding the network with Route Request packets. Since sensor networks can have very low data rate, using a proactive protocol for updating routing tables can be very expensive. Instead, reactive approaches might be more appropriate in such scenarios. SENCAST is scalable to a very large ad hoc network and adheres to emerging communication scenarios in emergency systems where mobile nodes typically work as a group and are involved in a collaborative manner. SENCAST distributes information efficiently in mobile scenario. It also discovers paths with low overheads by limiting the scope of route discovery packets to a region of potential paths creation. These processes are made possible by using bandwidth and location information. Packet sending is limited by the usage of route reconfigurations. Hence this algorithm becomes an ideal choice for the transmission of packets in our network. Secret sharing divides a packet into secret shares and transfers them through the network. Reconstruction of the complete message can be made possible by combining a sufficient number of these shares. When a sensor node wants to send a packet, it first divides this packet into M shares. These M shares are performed such that a minimum of T shares (where T<M) are required for the reconstruction of the original information. This ensures that even if a considerable number (< ( M-T)) of shares are lost to the black holes, the receiver will be able to retrieve the original information. The maximum number of shares that one can afford to lose are M-T. The next step is selecting R random nodes (where R=M) from the network. Since this process is carried out in a random format, even the source will not be able to guess before hand which nodes will be selected as the intermediaries. The randomness introduced in this phase serves for initial distribution of packets. The packet shares distributed in this format may not always be moving towards the direction of the sink. So if an adversary listens only in the direction from source to sink, the packets have a probability of taking a different route that is secure and free from black holes. 85

Figure 6.1 BackPressure Routing Each of these M shares are sent to M randomly selected nodes using the Backpressure routing algorithm. The Backpressure routing algorithm takes in the traffic congestion value from the current node for determining the next hop. This way, our shares take the route with minimum congestion, hence this leads to less packet loss and faster transmission. Since traffic during the particular point of time is taken into account, the route for a single node differs from time to time. Figure 6.1 presents the working of the Backpressure routing algorithm. 86

Figure 6.2 SENCAST The shares that are transmitted to these random nodes are then routed to the sink node by using SENCAST [Appavo&Khedo, 2008], the Reactive Routing approach. Since this approach uses bandwidth information and the location information, the shares can be transmitted in an efficient manner. A sample scenario is represented in the Figure 6.4, in which data from the source node is divided and is passed to the random intermediary nodes (denoted by arrows). These nodes then direct the information to the original sink or receiver node (denoted by dotted lines). Figure 6.4 shows transmission of 5 shares from the source to the sink. Block arrows represent the first phase of transmitting packets through backpressure algorithm and the dotted lines represent the second phase of packet transmission from the intermediary nodes to the sink. The packets have a probability of either directly passing into a black hole or can also move into a black hole on its transmission path. Even if both occur, a maximum of 3 packets arrive into the destination. 87

Figure 6.3 Secure data transmission using Dynamic Routing technique Figure 6.3 shows the working of the dynamic routing technique using secure data transmission. 88

Figure 6.4 Packet transmission via a Network The shares that are sent by the source node (Figure6.4) have higher probability of circumventing the black holes. Analysis shows that even if a black hole of maximum size is present in the network, the receiver still gets the minimum number of required packets using which rebuilding of information is possible. 89

Dynamic Routing Algorithm Process followed in the source Node: 1. Divide the packet that is to be sent, into M different shares, of which T shares (where T<M) are sufficient for obtaining the information 2. For every packet, perform the following 2.1 Add the destination node information to the packet header 2.2 Select a random node 2.3 Check if the node has already been used 2.4 If yes goto 2.1 2.5 Else 2.5.1 Save the node information in the node list 2.5.2 Determine the next hop list that is to be taken for reaching the random node. 2.5.3 For each node in the list check for the congestion value and select the node that has the least congestion value 2.5.4 Transmit packet share to that node Process followed in the receiving Node: 1. Check for the packet header whether the particular packet is destined for itself. 2. If yes, check if it has already received T shares. 3. If yes, aggregate the shares to obtain the information. 4. Else Wait for the T shares to arrive 5. If the packet is not destined for the current node, check for the destination node and transmit the packet using SENCAST. 90

No of packets after division Simulation is carried out for different cases, varying the number of nodes and black holes and the number of packets. Analysis of the network shows that the current system shows an increased immunity towards attacks. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes [Lee et al. 2006] (SDC) approach uses the method of transferring the shares of different packets using randomized multipath routing strategy. Comparing our proposed technique to the technique proposed in, we find that our process is much more secure. According to the older approach, the packets are to be directed towards the source node, for minimizing the delay, but it would become an easy target for the adversary if he/she captures nodes in that direction alone. Since packet dispersion takes place in our approach, the adversary will not be able to predict the direction of packet traversal, hence our approach remains more secure. The use of backpressure algorithm helps in optimal transmission of packets by choosing the congestion free path, unlike the traversals which transfers packets only to the neighbours. 35 30 25 20 15 10 5 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Packets to be sent SDC Approach Our Approach Figure 6.5 Packets to be sent(x) Vs No. of packets after division(y) Figure 6.5 shows the number of packets that are to be sent Vs the number of packets created after division. This shows that our method of division produces lesser amount of packets when compared to [Lee et al. 2006] and hence helps in avoiding unnecessary network traffic. 91

Packets received Figure 6.6 shows the number of packets that are to be sent Vs the number of packets actually received by the sink. We can say that the number of packets that the throughput is higher in our approach when compared to other approaches. 30 25 20 15 Our Approach 10 5 SDC Approach 0 5 10 15 20 25 30 Packets Sent Figure 6.6 Packets Sent(X) Vs Packets Received(Y) 6.4 Conclusion Encryption based protocols such as [Boukerche et al. 2004], [Douceur, 2002] and [Shnayder et al. 2004] use cryptography to address security issues. Even though these algorithms are robust and efficient, the encrypted packets are still prone to get lost in the black holes/sink holes and some packets are likely to get lost. This might in turn lead to inadequate number of packets reaching the destination. This might render the user incapable of extracting the original information. Since our approach tries to circumvent black holes to the maximum extent, the receiver has a higher probability of obtaining the complete information. 92