SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)



Similar documents
Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

How To Write A Transport Layer Protocol For Wireless Networks

Security in Ad Hoc Network

CHAPTER 1 INTRODUCTION

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Introduction to Wireless Sensor Network Security

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Tema 5.- Seguridad. Problemas Soluciones

To Study the Various Attacks and Protocols in MANET

Security Threats in Mobile Ad Hoc Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Denial of Service in Sensor Networks

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET

Security Issues in Mobile Ad Hoc Networks - A Survey

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Keywords Mobile Ad- Hoc network, fuzzy, dempster-shafer theory.

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Security for Ad Hoc Networks. Hang Zhao

International Journal of Advanced Research in Computer Science and Software Engineering

STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

COSC 472 Network Security

EFS: Enhanced FACES Protocol for Secure Routing In MANET

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Attacks on neighbor discovery

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Security Issues with Integrated Smart Buildings

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

HANDBOOK 8 NETWORK SECURITY Version 1.0

Securing MANET Using Diffie Hellman Digital Signature Scheme

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Authentication and Security in IP based Multi Hop Networks

A Review of Secure Ad-hoc Routing

Firewalls, Tunnels, and Network Intrusion Detection

Chap. 1: Introduction

MOBILE AD HOC NETWORKS SECURITY

Trust Establishment in Mobile Ad Hoc Networks: Key Management

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Research Projects in the Mobile Computing and Networking (MCN) Lab


Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Industrial Communication. Securing Industrial Wireless

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Wireless Security with Cyberoam

Basics of Internet Security

A Catechistic Method for Traffic Pattern Discovery in MANET

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University

Secure Routing in Wireless Sensor Networks

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Notes on Network Security - Introduction

UTMB INFORMATION RESOURCES PRACTICE STANDARD

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Special Properties of Ad-hoc Wireless Network and Security Models

Introduction to Security

Fundamentals of Network Security - Theory and Practice-

CS5008: Internet Computing

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Securing SIP Trunks APPLICATION NOTE.

SECURE DATA TRANSMISSION USING MOBILE AD-HOC NETWORK

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Chapter 6: Fundamental Cloud Security

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Djenouri Djamel & Nadjib Badache

Securing VoIP Networks using graded Protection Levels

Content Teaching Academy at James Madison University

Advanced Security and Mobile Networks

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Technical Brief. Wireless Intrusion Protection

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

Transcription:

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centres. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi- hop network. In a mobile ad- hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, dynamically changing network topology, energy constrained operations and lack of centralized administration. Since all the nodes in the network collaborate to forward the data, the wireless channel is prone to active and passive attacks by malicious nodes, such as Denial of Service (DoS), eavesdropping, spoofing, etc. This paper intends to investigate the security goal, security challenges and different types of active and passive attacks on MANETs. I. INTRODUCTION: With the invent and proliferation of cheaper, small and more powerful mobile devices, mobile ad hoc networks (MANETs) have being growing at a very fast pace. A mobile adhoc network is a system comprising of wireless mobile nodes with routing capabilities the union of which form an arbitrary graph. Any group of them can form an autonomous network that require no infrastructure and has the capability of organizing itself into arbitrary changeable topologies. Such a network may be operated in a standalone fashion, or may be connected to a larger internet (refer fig: 1 & 2). The definition given by the IETF (Internet Engineering Task Force). Minimal configuration and quick development make ad hoc networks suitable for emergency situations like natural or human-induced disasters, military conflicts, emergency medical situations etc. Unlike traditional mobile wireless networks, ad hoc networks do not rely on fixed infrastructure (like base stations, access points etc.) thus making it flexible. This flexibility makes them attractive technology for many applications such as rescue and tactical operations, disaster recovery operations and educational applications where we can setup virtual class or conferences. Figure 1: Infrastructure based 1

The following are the advantages of MANETs: They provide access to information and services regardless of geographic position. These networks can be set up at any place and time These networks work without any pre-existing infrastructure. Figure 2: Infrastructure less Security has become a primary concern in order to provide protect communication between nodes in a potentially hostile environment. In a mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, volatile network topologies, power- constrained operations, and lack of centralized monitoring and management point. II. APPLICATTIONS OF MANETs: With the increase of portable devices as well as progress in wireless communication, ad hoc networking is gaining importance with the increasing number of widespread applications. II. A] MANET Applications Military: Ad hoc networking would allow the military to take advantage of commonplace network technology to maintain an information network between the soldiers, vehicles, and military information head quarter. Consider a scenario as in fig 3, is deployed over a battlefield. The ad hoc network formed by the air vehicle in the sky can provide a backbone for land based platforms to communicate when they are out of direct range or when obstacles prevent direct communication. The adhoc network therefore extends down to the land based forces and allows communication across the battlefield. Voice and video, as well as sensing and data applications can be supported. 2

Figure 3: Military Applications. II. B] MANET Applications: Disaster Relief In cases of disasters, the existing infrastructure is often damaged or destroyed. Natural disasters e.g.: leas to the loss of electricity and thus internet connection. Emergency rescue operations must take place where non-existing or damaged communications infrastructure and rapid deployment of communication network is needed. An ad hoc network can be used in emergency / rescue operations for disaster relief efforts, e.g.: in fire, flood, or earthquake,, to overcome the problems incurred by missing infrastructure, helping to better cope with the consequences of such calamities. Mobile units carry networking equipment to support routing operations. Information is relayed from one rescue team member to another over a small handheld. Other commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law enforcement etc. Figure 4: Disaster Relief Applications 3

3. CHALLENGES IN SECURING THE MANETs: MANETs are much more vulnerable to attack than wired network. This is because of following reasons: 3.1 Absence of Infrastructure Ad hoc networks operate independently of any infrastructure, which makes inapplicable any classical solutions based on certification authorities and on line servers. 3.2 Limited physical security Mobile wireless networks are generally more prone to physical security threats than a fixed- cable nets. The increased possibility of eavesdropping, spoofing, and denial-ofservice attacks should be carefully considered. Existing link security techniques are often applied within wireless networks to reduce security threat. 3.3 Restricted power Supply Due to mobility of nodes in the ad hoc network, nodes will rely on battery as their power supply method, the problem that may be caused by restricted power supply is denial-of-service attacks and selfish manner. 3.4 Dynamically changing network topology Nodes are free to move arbitrarily. The network topology may change randomly and have no restriction on their distance from other nodes. As a result of this random movement, the whole topology is changing in an unpredictable manner, which in turn gives rise to both directional as well as unidirectional links between the nodes[5]. Figure 5: changing network topology 3.5 Lack of Centralized monitoring Absence of any centralized monitoring makes the detection of attacks a very difficult problem because it is not easy to monitor the traffic in a highly and large scale ad hoc network. It is rather common in the ad hoc network that benign failures such as transmission impairments and packet dropping. 4. SECURITY GOALS IN ADHOC NETWORKS The goals of security mechanism of MANETs are similar to that of other networks. Security is a great issue in network especially in MANETs where security attacks can affect the nodes limited resources and consume them or waste the time before rote chain broke. Security is a vectored term of multi systems, procedures and functions that works together to reach certain level of security attributes[6]. 4

Figure 6: Types of Security Goals 4.1 Availability The main goal of availability is to node will be available to its users when expected, i.e. survivability of network services despite denial of service attack. For example, on the physical and media access control layers, an adversary could employ jamming to interfere with communication on physical channel while on network layer it could disrupt the routing protocol and continuity of services of the network. Again, in higher levels, an adversary could bring down high-level services such as key management service, authentication service. 4.2 Confidentiality The goal of confidentiality is to keeping information secret from unauthorized user or nodes. In other words, ensures payload data and header information is never disclosed to unauthorized nodes. The standard approach for keeping information confidential is to encrypt the data with a secret key that only intended receiver s posses, hence achieving confidentiality. 4.3 Integrity The goal of integrity is to guarantee the message being transmitted is never corrupted. Integrity guarantees the identity of the messages when they are transmitted. Integrity can be compromised mainly in two ways. Malicious altering: A message can be removed, replayed or revised by an adversary with malicious goal. Accidental altering:-, if the message is lost or its content is changed due to some benign failures, which may be transmission errors in communication or hardware errors such as hard disk failure. 5

4.4 Authentication The goal of authentication is too able to identify a node with which it is communicating and to prevent impersonation. In infrastructure-based wireless network, it is possible to implement a central authority at a point such as base station or access point. But in MANETs, no central administration so it is difficult to authenticate an entity. 4.5 Non repudiation The main goal of non repudiation is sender of a message cannot deny having sent the message. This is useful when for detection and isolation of compromised nodes. When node P receives an erroneous message from Q, non repudiation allows P to access Q using this message and to convince other nodes that Q is compromised. 4.6 Authorization Authorization is a process in which an entity is issued a credential, which specifies the privileges and permissions it has and cannot be falsified, by the certificate authority. Authorization is generally used to assign different access rights to different level of users. 5.SECURITY ATTACKS ON MANET Malicious and selfish nodes are the ones that fabricate attacks against physical, data link, network, and application-layer functionality[fig-7]. Current routing protocols are exposed to two types of attacks 1.Active attacks In a active attack, information is inserted to the network and thus the network operation or some nodes may be harmed. Through which the misbehaving node has to bear some energy costs in order to perform some harmful operation, and Nodes that perform active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious. 2.Passive attacks In a passive attack, a malicious node either ignores operations supposed to be accomplished by it. That mainly consists of lack of cooperation with the purpose of energy saving Nodes that perform passive attacks with the aim of saving battery life for their own communications are considered to be selfish. Selfish nodes can severely degrade network performances and eventually partition the network. 6

Figure 7: Classification of Attacks 5.1.Denial of service (Data link Attach): In this attack malicious node floods irrelevant data to consume network bandwidth or to consume the resources (e.g. power, storage capacity or computation resource) of a particular node. With fixed infrastructure networks, we can control denial of service attack by using Round Robin Scheduling, but with mobile ad hoc networks, this approach has to be extended to adapt to the lack of infrastructure, which requires the identification of neighbour nodes by using cryptographic tools, and cost is very high. For example, consider the following Fig. 8. Assume a shortest path exists from X to Z and R and Z cannot hear each other, that nodes Q and R cannot hear each other, and that Y is a malicious node attempting a denial of service attack. Suppose X wishes to communicate with Z and that X has an unexpired route to Z in its route cache. Transmits a data packet toward Z with the source route X > P > Q > Y > R > S > Z contained in the packet s header. When Y receives the packet, it can alter the source route in the packet s header, such as deleting S from the source route. Consequently, when R receives the altered packet, it attempts to forward the packet to Z. Since Z cannot hear R, the transmission is unsuccessful. Figure 8: Denial of service attack 7

5.2.Tunneling /Wormhole(Network layer attack): Tunnelling attack is also called wormhole attack. In a tunnelling attack, an attacker receives packets at one point in the network, tunnels them to another point in the network, and then replays them into the network from that point. It is called tunnelling attack because the colluding malicious nodes are linked through a private network connection which is invisible at higher layers [Fig-9]. Figure 9: Wormhole Attack 5.3.Sybil attack : Malicious nodes in a network may not only impersonate one node, they could assume the identity of several nodes, by doing so undermining(destroy) the redundancy(repeating) of many routing protocols. This attack is called the Sybil attack. Sybil attack tries to degrade the integrity of data, security and resource utilization that the distributed algorithm attempts to achieve. Sybil attack can be performed for storage, routing mechanism, air resource allocation and misbehaviour detection. Basically, any peer-topeer network (especially wireless adhoc networks) is vulnerable to Sybil attack. Figure 10: Sybil Attack 8

Table : Security Solutions for MANETs. Attacks Solution Application Repudiation, data corruption Detecting and preventing virus, worms, malicious codes and application abuses by use of Firewalls, Transport Network Data Link Physical 6. CONCLUSION Session hijacking, SYN Flooding Routing protocol attacks (e.g. DSR, AODV etc.),wormhole, blackhole, Byzantine, flooding, resource consumption, location disclosure attacks IDS. Authentication and securing endto-end or point-to-point communication use of public cryptography(ssl, TLS, PCT) etc. Protecting the ad hoc routing and forwarding protocols Traffic analysis, monitoring, disruption MAC (802.11), WEP weakness etc. security support. Eavesdropping, Jamming, Interceptions. Protecting the wireless MAC protocol and providing link layer Preventing signal jamming denialof-service attacks by using Spread Spectrum Mechanism. Importance of MANET cannot be denied as the world of computing is getting portable and compact. Mobile ad hoc Network have the ability to setup networks on the fly in a harsh environment where it may not possible to deploy a traditional network infrastructure. Security is not a single layer issue but a multilayered issue. Due to mobility and open media nature, the mobile ad hoc networks are much more prone to all kinds of security risks, such as information disclosure, intrusion, or even denial of service. As a result, the security needs in the mobile ad hoc networks are much higher than those in the traditional wires networks. It requires a multi fence security solution that provides complete security spanning over the entire protocol stack. The Security research area is still open as many of the provided solutions are designed keeping a limited size scenario and limited kind of attacks and vulnerabilities. MANET are the future networks. because they are practically versatile,easy to use, inexpensive and can instantly updates and reconfigures itself. In this paper we have highlighted the some typical vulnerability which are caused by characteristics of mobile ad hoc networks such as dynamic topology, limited resources (e.g. bandwidth, power), lack of central management s points. And finally we discussed active and passive security attacks on each layer and their solutions. 9