Node Auto-configuration Protocols in MANET: A Review

Similar documents
A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Network

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Abstract. In a wired network, layer three address assignment is a task that is mostly performed by

New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM)

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

A Distributed Protocol for Dynamic Address. Assignment in Mobile Ad Hoc Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Single Sign-On Secure Authentication Password Mechanism

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

A Catechistic Method for Traffic Pattern Discovery in MANET

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Keywords: EAACK, ACK, S-ACK, MRA, DIGITAL SIGNATURE, IDS

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

LIST OF FIGURES. Figure No. Caption Page No.

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

SEcure Neighbour Discovery: A Report

Analysis of IP Spoofed DDoS Attack by Cryptography

Client Server Registration Protocol

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Swarm Intelligence and Network Administration: Applications in Ad Hoc Wireless Auto-Configuration

A PKI over Ant Colony based Routing Algorithms for MANETs AntPKI

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Midterm. Name: Andrew user id:

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Tema 5.- Seguridad. Problemas Soluciones

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Layer 3 Routing User s Manual

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Wireless Encryption Protection

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

RAA: A Ring-Based Address Autoconfiguration Protocol in Mobile Ad Hoc Networks

Efficient Detection of Ddos Attacks by Entropy Variation

Research on the Implementation of VoIP Service. in Mobile Ad-hoc Network

Security vulnerabilities in the Internet and possible solutions

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

An Adaptive Load Balancing to Provide Quality of Service

CCT vs. CCENT Skill Set Comparison

DDoS Attack Traceback

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

Module 15: Network Structures

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Security in Ad Hoc Network

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

Survey on DDoS Attack Detection and Prevention in Cloud

The next generation of knowledge and expertise Wireless Security Basics

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Security in Structured P2P Systems

An Energy Efficient Location Service for Mobile Ad Hoc Networks

Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Network Security. Mobin Javed. October 5, 2011

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

United States Trustee Program s Wireless LAN Security Checklist

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Survey on DDoS Attack in Cloud Environment

An Overview of ZigBee Networks

Two State Intrusion Detection System Against DDos Attack in Wireless Network

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Unit 3 - Advanced Internet Architectures

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Secure Routing for Mobile Ad hoc Networks

RESOURCE DISCOVERY IN AD HOC NETWORKS

Secure Routing in Wireless Sensor Networks

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Wireless Sensor Network: Challenges, Issues and Research

Transcription:

Node Auto-configuration Protocols in MANET: A Review G. K. Ghosh Department of Computer Science Engineering H.S College of Engineering & Science, Nagpur, Maharashtra E-mail: gautamghosh9@gmail.com Abstract Mobile ad hoc network (Manet) is a kind of wireless ad-hoc network, and is a self configuring network of mobile outers connected by wireless links. It is a wireless network without infrastructure. Mobile devices are free to join or leave the network. There is no any central server to assign unique IP Address to each node. Various research communities are working in field of MANET and trying to adopt the protocols and technology in other applications as well. One of the important research areas in MANET is establishing and maintaining the ad hoc network through the use of routing protocols. Therefore, a protocol is needed which will assign unique IP Address to each node in a dynamic way. In this paper, apart from the differences between laptops and mobile design, the differences between ios and Android machines that have an impact on app design are also discussed. Keywords: Mobile Ad hoc network, MANET, Rabin Cryptosystem, Node Auto-configuration, FAP INTRODUCTION A mobile ad hoc network (MANET) is an autonomous self organizing independent wireless mobile nodes or groups of Mobile nodes, which is infrastructure-less and spontaneously form an Ip-based network. The topology of such networks changes dynamically as node joins or leaves the network. The wired network address assignment mechanisms (manual configuration or DHCP) are not suitable for wireless highly mobile networks. New specific protocols must be conceived and optimized to achieve a fast convergence to support the mobility. [1].In this type of network, a route between any two hosts may consist of multiple hops through one or more nodes. So mobile nodes are acts as router which forwards the packets to the correct destination node. The primary 1 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic [2]. AUTO-CONFIGURATION IN MOBILE AD HOC NETWORK To interchange messages with each other, each node must have a unique IP address. As discussed above nodes in this type of network joins or leaves the network dynamically. It means there is no fixed infrastructure in mobile ad hoc network. So there should be a mechanism which will assign unique IP address to each node in a network dynamically. A node autoconfiguration protocol assigns a unique IP Address to each node. Due to the dynamic topology of mobile ad hoc networks, auto-configuration protocols are faced with various problems in guaranteeing the uniqueness of IP addresses and in allowing network partitioning and merging [3]. If a node leaves the network then that IP Address should be available to another node. If there is any loss of messages or node failure then protocol should operate to prevent two or more nodes from having same IP Address. If any node of the network is having free IP Address then it should assign or give it to the requesting node. It should minimize the overhead of additional packet traffic in the network. It must be flexible to partitioning and merging of mobile ad hoc network. As the topology changes dynamically, so the protocol must conduct synchronization to ensure the configuration of the network is as up to date as possible. The protocols must achieve the following objectives for correct functioning of the network: Assign unique IP Address to every node of the network. The node auto-configuration protocols can be classified according to address management: 2 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

A. Stateful In this mode, every node maintains the network state. Each node keeps updated copy of tables with IP Address of the nodes. B. Stateless In this, every node assigns a random IP Address to itself and then performs duplicate IP address detection to check their uniqueness. C. Hybrid This is mixed type of mechanism of above two. PROTOCOLS FOR NODE AUTO- CONFIGURATION IN MANET A. FAP Protocol FAP maintains a distributed database stored in filters that contain the currently allocated addresses in a compact form. This protocol has an aim to dynamically auto-configure network addresses which further leads to resolve collisions with a low control load, even in joining or merging events. In order to achieve all these objectives, FAP uses a distributed compact filter to represent the current set of allocated addresses. There are two types of filters, Bloom filter and a proposed filter, called Sequence filter, to design a filter-based protocol that assures both the univocal address configuration of the nodes joining the network and the detection of address collisions after merging partitions. The hash of this filter as a partition identifier, providing an important feature for an easy detection of network partitions. Hence, here introduce the filters to store the allocated addresses without incurring in high storage overhead. They have used hash of these filters as partition identifier for an easy detection of network partitions. Out of these two filters, the best filter is selected for FAP is based on network characteristics like estimated number of nodes in the network and available addresses. Procedures of FAP: a) Network initialization It has two types of initializations. They are, abrupt and gradual. In abrupt initialization, where joining of the nodes at the same time in large manner takes place. But in gradual initialization, joining of the node at different intervals of time happens. Initial node selects the partition identifier and the rest of the nodes are managed by first node. The node uses HELLO messages to show its current status and partition identifier. AREQ message is used 3 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

to differentiate other nodes generated AREQ messages but with same address. b) Node joining During the node joining the network Host node checks the messages whether for the joining procedure or for partition procedure.if it does not receive any response from the network nodes then it is concluded that there is no network exists and it starts the network. If it receives the response as HELLO message then node joins the network. c) Assignment of address The node which wants to join a network selects an address randomly by using the address range and creates an empty address filter and starts a network initialization phase. In this, it floods the network with AREQ messages to make sure that all initiator nodes have received AREQ messages. Then node sends HELLO messages that are hash of filter. If the initiator node receiver AREQ message with selected address and different identified number then there is address collision. Then node has to wait for some period and have to select a different available address and has to send a different AREQ message. d) Network merging To detect merging, the neighbour nodes in the network is checked if the signature in the message is same as its own, after receiving of HELLO message. Then joining node will ask for that host node to send the address filter of network using Address Filter (AF) message. After the host node receives the AF, it will check the bit I. If I=1 then it shows that the message has originated from the joining node. After that host node replies to the request with AF with R bit set as 1, suggesting that AF is in reply to a previous filter request. If joining node receives an AF reply message then address filter is stored and random available address is selected and then network is flooded with an AREQ message to allocate the latest address which then updates filter messages of other nodes. B. MANETConf MANETConf protocol is based on common distributed database which contains the list of all assigned IP Addresses in MANET. If any new node wants to join a network will broadcast joining request to the nodes and waits for the response. Whoever firstly response to that message will be selected as an initiator node which is responsible to provide a unique IP Address. An initiator node 4 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

selects a free IP address from his address table and assigns it to the requestor node after receiving the permission from rest of the network nodes. Because it may possible that other node may have chosen same address and his table is not totally synchronized because of message delays or it may possible that two nodes to simultaneously choose same IP address to assign it to different arriving nodes[6]. If it receives positive response from other nodes then that IP address is assigned to that requestor node. And it will broadcast this action to other nodes that keep their tables updated. If one or many nodes reply negatively then initiator concludes that the address is already assigned to a node and it then repeats the same procedure. If there is any node which does not reply then that node put in direct contact with it and then initiator waits for his reply to continue his configuration process. If that concerned node has left the network or does not replying from long time, initiator concludes that concerned node has left the network and it floods this information to all other nodes about his departure. When two or more networks meet each other than their differentiation is done using Network ID which is a 2- tuple i.e. Lowest IP address used in the network and unique identifier of that node. When a network gets partitioned, one partition will save its network ID and other will detect the partitioning with the first IP assignment then only it will know the new node with lowest ID that will generates the new network ID and floods it within the network. When two or more nodes comes in communication range then they exchange their network identities, if received network identity is different than nodes network identity then network is merged [6]002E. The main advantage of this protocol is that it guarantees unique assignment of address and each node has ability to assign a new address. C. Rabin cryptosystem Rabin cryptosystem proposed in [7] proposes a model for secure IP Autoconfiguration using public key cryptography. This model assigns a unique address and secure public key distribution when any new node joins MANET. Security is provided using Rabin cryptosystem which uses asymmetric key encryption. To assign an IP Address dynamically, they have considered an autonomous ad hoc network which has no gateway or any connection to the external world. 5 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

The nodes are categorized according to their protocol as follows: Allocator: It is a node which maintains all currently allocated lists of addresses. It will allocate a new address to a joining node. Initiator: It is an intermediate node between allocators and requestor node that communicates messages between them. Requestor: It is a node who wants to join a network and which request for an IP Address. Normal: All other nodes are come into this category. In this protocol MAC address of a requester node is used as nonce. Working of their protocol is shown by following pictorial presentation: Fig. 1 Rabin cryptosystem [7] 6 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

In this, a requester node enters in a network and it broadcasts an INITIATOR_SEARCH message to find an initiator node. After receiving response, it will send his MAC address MAC_ADD to initiator and asks for allocator s public key PKA and certificate PKCA. Then receiver forwards this message to allocator node which sends his own public key PKA=n and certificate PKCA to initiator. Requestor sends his own encrypted MAC address E(MACR_ADD)n to initiator node and requests for unique IP Address. This message is forwarded to allocator which decrypts MAC address by using his private keys tuple(p,q) as D(MACR_ADD)p,q. If (Derived MACR_ADD==initial MACR_ADD) then allocator assigns free address to MACR_ADD as IPR_ADD. Then allocator encrypts assigned IP address using requestor s public key PKR=m as E(IPR_ADD)m and send it to initiator. It forwarded to requestor which decrypts it using his private key tuple (r,s) as D(IPR_ADD)r,s. At last Requestor configures itself using that given unique IP address IPR_ADD.[8] D. ADIP Algorithm Authenticated Dynamic IP (ADIP) Algorithm provides authentication based dynamic IP configuration scheme. This protocol utilizes nodes in the network as proxies and can generate IP addresses from its own IP for a new authenticated host. The address configuration [3] authentication is done with the help of trusted third party and as such capable of handling the security threats associated with a general dynamic IP configuration. During IP address allocation process every host uses two distinct secret keys to authenticate the host. [9]Their scheme has capability to handle security threats associated with dynamic address configuration such as address spoofing, address exhaustion, false address conflict, false deny message. Out of these security threats Address spoofing is a common problem occurs during address allocation which means spoofing of IP address by a malicious host to hijack the network traffic. Their proposed scheme has solved the problem of network partitions and mergers along with arrival and departure of a host efficiently [10]. CONCLUSION In this paper, we reviewed the autoconfiguration mechanism that provides a dynamic protocol for mobile ad-hoc nodes and allows the creation of a selforganizing network. We also studied that address auto-configuration protocols are classified by the way they maintain the available addresses. 7 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

REFERENCES [1] Wiley Series on Parallel and Distributed Computing, Albert Zamya,Series Editor Algorithms and Protocols for Wireless Mobile Ad hoc networks Edited by AZZEDINE BOUKERCHE. [2] http://en.wikipedia.org/wiki/mobil e_ad_network. [3] L. Villalba, J.G. Martinez, A. Orozeo and J. Diaz, Autoconfiguration Protocols in Mobile ad hoc networks, Sensors, pp 3652-3666, 2011. [4] Natalia Castro Fernandes, Marcelo duffles Donato Moreira, and Otto Carlos Muniz Bandeira Duarte, An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks, IEEE transactions on networking vol. 21, no. 3, pp 845-856, June 2013. [5] S. Nesargi, R. Prakash, MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network IEEE INFOCOM, 2002 ieeexplore.ieee.org. [6] Bachar Wehbi Address Autoconfiguration in Ad Hoc Networks Institute National des Telecommunications-INT- Department Logiciels Reseaux LOR-Internal Report, May 2005 [7] Jagrati Nagdiya, Shweta Yadav, Secure Autoconfiguration in Mobile Ad hoc networks using Rabin cryptosystem, ISSN 2250-2459, ISO 9001:2008 Certified Journal, vol. 4, Issue 4, April 2014 www.ijetae.com. [8] Soyean Ahn, Namhoon Kim, Woohyun Kim and Younghee Lee, A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad hoc Networks, Information and Communications University, Korea Science and Engineering Foundation [9] Carlos de Morais, Cordeiro & Dharma P Agarwal, Mobile Ad hoc Networking, OBR Research Center for Distributed & Mobile Computing, ECECS, OH 45221-0030-USA [10] Natalia Castro Fernandes, Marcelo Duffles Donato Moreira 8 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved

and Otta Carlos Muniz Bandeira Duarte, An Efficient and Robust Addressing Protocol for Node Auto Configuration in Ad Hoc Networks, IEEE/ACM Transactions on Networking, 2013. 9 Page 1-9 MANTECH PUBLIATIONS 2016. All Rights Reserved