Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Similar documents
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Introduction to Wireless Sensor Network Security

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Security for Ad Hoc Networks. Hang Zhao

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

International Journal of Advanced Research in Computer Science and Software Engineering

A Catechistic Method for Traffic Pattern Discovery in MANET

A Security Architecture for. Wireless Sensor Networks Environmental

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Wireless Sensor Network: Challenges, Issues and Research

Technology Longowal, Punjab, India

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Figure 1. The Example of ZigBee AODV Algorithm

Security Threats in Mobile Ad Hoc Networks

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

How To Write A Transport Layer Protocol For Wireless Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Implementation and Prevention of DOS Attack in Malicious Environment on AODV Routing Protocol Varsha G. Tank 1 Dhaval Patel 2

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

How To Prevent A Malicious Node From Attacking Manet With A Ddos Attack

An Efficient AODV-Based Algorithm for Small Area MANETS

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Cooperative OCEAN Based Technique for Isolating Attack in Wireless Sensor Network

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Reduce flooding based DDoS attack and improve network performance parameters by using NS-2 Simulator

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

DERIVATIVE THRESHOLD ACTUATION FOR SINGLE PHASE WORMHOLE DETECTION WITH REDUCED FALSE ALARM RATE

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Vampire Attack Detecting and Preventing in Wireless Sensor Network

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Securing MANET Using Diffie Hellman Digital Signature Scheme

Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Survey on different attacks in Wireless Sensor Networks and their prevention system

Optimized Load Balancing Mechanism Using Carry Forward Distance

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

Security in Ad Hoc Network

CHAPTER 1 INTRODUCTION

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Survey on DDoS Attack Detection and Prevention in Cloud

SBSCET, Firozpur (Punjab), India

ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES


Routing Protocols Security in Ah Hoc Networks

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

Performance Metrics Evaluation of Routing Protocols in MANET

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

LIST OF FIGURES. Figure No. Caption Page No.

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.

Transcription:

Performance Analysis of Modified Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Ms. Shagun Chaudhary 1, Mr. Prashant Thanvi 2 1 Asst. Professor,Dept. of ECE, JIET School of Engg. And Technology for Girls Jodhpur, Rajasthan, INDIA shagun.chaudhary17@gmail.com, 9413421380 2 Asso. Professor,Dept. of EEE, JIET School of Engg. And Technology for Girls Jodhpur, Rajasthan, INDIA Abstract Security of wireless sensor networks is an important concern due to the open and unaided nature of wireless sensor networks. The absence of central monitoring unit makes it vulnerable to several attacks. Denial of service attack (Dos) is an active internal attack which results in performance degradation of the wireless sensor network. This attack can be localized or distributed in nature based on intent of attack. In this paper, I am using modified variant of Ad-hoc On Demand Distance Vector () protocol to analyze the effect of Dos attack on system performance and later apply the prevention scheme to analyze the change in network performance. Keywords WSN,, Modified, Dos, NS-2, Route disruption, Resource consumption INTRODUCTION Denial of service (Dos) attacks is one of the most common types of attack which is possible in WSNs [1] [7] [8] [9] [11] [13]. DoS attacks are most common in networks which are distributed in nature i.e. lack a central control and each node operates on individual as well as cooperative basis and therefore WSNs are easily targeted by such attacks [1] [2] [4] [14]. Also the shared nature of network resources like power management and available bandwidth makes the WSNs more vulnerable to Dos attacks [3] [4] [5] [10] [12] [14]. Denial-of-service (Dos) consists of three components: authorized users, a shared service, and a maximum waiting time. A DoS situation can occur due to any kind of incident that diminishes, eliminates, or hinders the normal activities of the network [6] [8] [11] [12]. DoS indicate to a particular condition in a network and is termed DoS attack only when the intentions are to disrupt the normal working of the WSN [10]. Dos attack may limit or eliminate the network functionality than the normal expected standards [6] [4]. Dos attack may occur at any layer of OSI Model [3] [10] [11]. Dos attack is dangerous as it penetrates the efficiency of targeted networks by affecting its associated protocols. Dos attacks may consume the resources, destruct or alter the infrastructure configuration and physically destroy the network components [3] [4] [7] [10]. PROPERTIES OF As stated by Anthony D. Wood and John A. Stankovic [6], the Dos attack has following properties:- Malicious- This act is performed intentionally. Accidental failures are the domain of fault-tolerance and reliability engineering. Since such failures can potentially produce equally disruptive results as DOS attacks, these fields have important contributions to make to the robustness of WSNs. They are not considered DOS, however, due to the lack of malice. Disruptive- A successful DOS attacks destroy few services in the WSN. If the effect is not measurable, we may still say that an attack has occurred, but DOS has not. It can be said that damaging the affected service may not be the only goal of the attacker. Asymmetric- Usually the effect of an attack is much greater than the effort required to mount it. In Dos attack, the effort in making a malicious node and using it to create flood of unwanted data traffic is less compared to the effort required in delivering normal data traffic to the nodes in network. This creates asymmetry in the network which results in high vulnerability and easy attack scenarios. 486 www.ijergs.org

Remote- In distributed systems; an attacker can carry out an attack in the network. Often this is done by unauthenticated or lightly authenticated users. The high profile of DOS attacks make physical -presence uncomfortable for the attacker. METHODOLOGY OF Dos ATTACKS All Dos attacks works by either of the below mentioned parameters Node Isolation - Here a malicious node or attacker establishes a route between the source and itself consuming all the data from the source node and isolating it from the overall network. Thus the sender node becomes isolated from the network Route Disruption - The malicious node establishes itself between the sender and receiver nodes and disrupts the route of data packages by making false entries in routing tables. This is achieved by sending fake RREP packages in response to RREQ from the sender node. Resource Consumption - The malicious node consumes precious network resources as power and bandwidth by broadcasting large number of irrelevant packages and thus the nodes actually requiring those resources are denied of them. PROPOSED SIMULATION MODEL NS-2 was used to simulate a WSN with 80 nodes. The simulation parameters are as below: Simulator NS2 (version 2.35) Simulation Time 300 (s) Number of Nodes 20, 30,..., 80 Simulation Range 1000 1000 m Routing Protocol Attack Type Black-hole, Dos, Sybil Traffic CBR Pause Time 10 (m/s) Max Speed 20 (m/s) Attack detection is progressed by comparison of sequence number of RREP packet when sender node receives a reply packet. Seven different traffic scenarios and seven different network topologies were made for simulation purpose. 60 simulations for normal working, 60 for Dos attack and its prevention were carried out yielding results in trace and NAM files for further analysis. Fig. 1 Topology Scenario for 80 nodes 487 www.ijergs.org

Fig 2 Simulation in progress RESULTS AND ANALYSIS The performance of the WSN under Dos attack and later under the effect of modified for Dos attack prevention was analyzed on the basis of four parameters: End to end delay, throughput, packet delivery ratio and packet drop ratio. Average End-to-End Delay - The performance of WSN under normal working with unmodified shows the smallest delays in the network. Under Dos attack the average End-to-End delay rises due to network congestion and route disruption. By using the new modified protocol the performance of the network can be increased by reducing the delay in real time. As the number of nodes increases the effect of delay is less visible. 0.6 0.5 0.4 0.3 0.2 0.1 0 PREVENTION Fig. 3 Average end to end delay analysis Throughput - The throughput of a normal WSN with unmodified is maximum as shown in the figure below. With introduction of Dos attack the throughput is reduced as compared to previous condition. To improve the network efficiency the modified protocol is used which results in increase in throughput on every node as is clear from the figure below. 488 www.ijergs.org

140 135 130 125 120 115 110 105 100 PREVENTION Fig. 4 Throughput analysis Packet delivery ratio - Maximum number of packets is delivered in case of normal working of WSN with unmodified. As Dos attack is introduced, the packet delivery ratio decreases due to more package loss. The modified increase the net packet delivery efficiency. 105 100 95 90 85 80 75 20 30 40 50 60 70 80 Fig. 5 packet delivery ratio analysis Packet drop ratio - The unmodified results in lowest number of drops in the system as shown in the simulation result below. Introduction of Dos attack in the system results in more packet drop by rerouting the traffic through the malicious nodes. The modified protocol compares the routing tables on sender and malicious and isolates the route to the malicious nodes resulting in fewer packet drops. 489 www.ijergs.org

50 45 40 35 30 25 20 15 10 5 PREVENTION Fig. 6 Packet drop analysis CONCLUSION AND FUTURE SCOPE Dos attack results in overall degradation of the capabilities of a WSN by affecting different parameters like end to end delay, packet delivery ratio, throughput and number of dropped packets. For successful attack detection various methods have been proposed over time. The technique used by me based on comparison on RREP sequence number of packet received by the sender from its neighbors broadcasting the availability of fresher or shorter routes. In future applications the intrusion detection can be made more robust and universal rather than attack specific. Also the malicious node isolation result in lesser nodes available for communication and thus a robust algorithm which quarantines the affected nodes without removing them from the system is proposed. The currently proposed method can detect an isolated incidence of Dos attack and minimizes its adverse effects but the attack can also be distributed in nature and therefore the detection and prevention algorithm has the potential of further improvement. REFERENCES: [1] Mieso K. Denko, Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme, Systemics, Cybernetics and Informatics Volume 3 - Number 4. [2] Y anchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang, Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks, IEEE Journal On Selected Areas In Communica Tions, Vol. 24, No. 2, February 2006. [3] Shio Kumar Singh, M P Singh and D K Singh, A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks, International Journal of Computer Trends and Technology - May to June Issue 2011. [4] Dr. G. Padmavathi and Mrs. D. Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009. [5] Md. Safiqul Islam and Syed Ashiqur Rahman, Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches, International Journal of Advanced Science and Technology, Vol. 36, November, 2011. [6] Anthony D. Wood, John A. Stankovic, A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press, 2004. [7] Al-Sakib Khan Pathan, Denial Of Service In Wireless Sensor Networks: Issues And Challenges Advances in Communications and Media Research ISBN 978-1-60876-576-8. [8] Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos and Grammati Pantziou, A Survey on Jamming Attacks and Countermeasures in WSNs IEEE Communications Surveys & Tutorials, Vol. 11, No. 4, Fourth Quarter 2009. [9] Marpu Devadas and K.R.Koteeswa Rao, Security Framework against Denial of Service Attacks In Wireless Mesh Networks Volume No: 1(2014), Issue No: 10 (October) ISSN No: 2348-4845. [10] Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta and Neha Garg, Analysis of Denial of Service (Dos) Attacks In Wireless Sensor Networks, IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-7308. [11] Huda Bader Hubboub, Denial of service attack in wireless sensor networks, Islamic University Gaza Deanery of Higher Studies, Faculty of Engineering, Computer Engineering Department. 490 www.ijergs.org

[12] Najma Farooq, Irwa Zahoor, Sandip Mandal and Taabish Gulzar Systematic Analysis of DoS Attacks in Wireless Sensor Networks with Wormhole Injection, International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 173-182 International Research Publications House. [13] Vijay Bhuse, Ajay Gupta and Leszek Lilien, DPDSN: Detection of packet-dropping attacks for wireless sensor networks. [14] Afrand Agah and Sajal K. Das, Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach, International Journal of Network Security, Vol.5, No.2, PP.145 153, Sept. 2007. [15] Jing Deng, Richard Han, and Shivakant Mishra, Defending against Path-based DoS Attacks in Wireless Sensor Networks 491 www.ijergs.org