INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.10, No.6, Jun. 2018

Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism

Full Text (PDF, 592KB), PP.40-51


Views:50   Downloads:5

Author(s)

Shahnawaz Ahmad

Index Terms

MANET;authentication;encryption;SAODV;ARAN;SEAODV;SMAODV;Malicious Nodes

Abstract

MANET is a family of ad hoc networks that spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET towards the attacks is huge as compared to its wired counterparts. MANETs are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared media, constrained resources, etc. The ramification being that the security needs of MANETs become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANETs comes from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open making it reachable to both the legitimate users of the network as well as the malicious nodes. Consequently, there is a bankruptcy of clear line of defense from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. The occurrences of the attacks of this type in ad hoc networks result in the situation where even the standard routing protocols do not provide the required security.  The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attacks. But, the attack on availability which is the most common and easiest of them all cannot be avoided by the authentication and encryption because even the authentic user can be the attacker. Also, the encryption cannot be helpful to prevent such attacks. Therefore, in such a situation if a proper solution is not provided the entire MANET operation will get crippled. The main aim of this paper is to guarantee a security solution which provides defense against these attacks. To achieve this, a Multipath On-demand security Mechanism, called Secure Multipath Ad hoc On-demand Distance vector routing protocol (SMAODV), is presented which eliminates the malicious nodes from the network thereby preventing MANETs from the effects of such malicious nodes.

Cite This Paper

Shahnawaz Ahmad,"Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.6, pp.40-51, 2018.DOI: 10.5815/ijcnis.2018.06.04

Reference

[1]ElhadiM.Shakshuki, Nan Kang, Tarek R. Sheltami, “EAACK – A Secure Intrusion Detection System for MANETs”, in: IEEE Transactions on Industrial Electronics, vol 60,No. 3, March 2013.

[2]G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol—A review,” J. Comput.Sci., vol. 3, no. 8, pp. 574–582,2007.

[3]B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004.

[4]Roy Friedman, Daniela Gavidia, Luis Rodrigues, AlineCarneiroViana, Spyros Voulgaris, “Gossiping on MANETs: the Beauty and the Beast”, in: ACM Operating Systems Review, October 2007

[5]A. C. Viana, M. D. Amorim, Y. Viniotis, S. Fdida, and J. F. Rezende, “Twins: a dual addressing space representation for self-organizing networks”, in: IEEE Transactions on Parallel and Distributed Systems, 17(12):1468–1481, Dec. 2006.

[6]PrasanjitChoudhury, AnirbanSarkar, Narayan C. Debnath, “Deployment of Service Oriented Architecture in MANET: A Research Roadmap”, in: IEEE 2011

[7]TommiHalonen, TimoOjala, “Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network”, 5th International Conference on Mobile And Ubiquitous Multimedia, 2006.

[8]Microsoft Developer Network (MSDN), “Consuming Web Services with the Microsoft.NET Compact Framework”, March 2003.

[9]X. Gu and K. Nahrstedt, “Dynamic QoS-Aware Multimedia Service Configuration in Ubiquitous Computing Environments”, 22nd International Conference on Distributed Computing Systems, pp 311 – 318, 2002.

[10]OASIS-Open Organization, “Introduction to UDDI: Important Features and Functional Concepts”: http://uddi.xml.org/files/uddi- tech-wp.pdf.

[11]OASIS-Open Organization, “UDDI Version 3.0.2.”, http://www.oasis open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm

[12]TommiHalonen, TimoOjala, “Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network”, 5th International Conference on Mobile And Ubiquitous Multimedia, 2006.

[13]Neema, H.; Kashyap, A.; Kereskenyi, R.; Yuan Xue; Karsai, G.;“SOAMANET: A Tool for Evaluating Service-Oriented Architectures on Mobile Ad-Hoc Networks”, 2010 IEEE/ACM 14th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), pp179 – 188, 2010.

[14]L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a survey”, Mob. Comput.1 (1) 2012.

[15]C.Siva Ram Murthy & B.S Manoj, “Mobile Ad Hoc Networks- Architectures & Protocols”, Pearson Education,New Delhi, 2004.

[16]An Introduction to Wi-Fi‖ 019-0170 • 090409-B USA 2007-2008.

[17]Behrouz A Forouzan, Data Communications and Networking‖, Special Indian Forth Edition, 2006.

[18]N. Srinath [CS07M035] WiMAX - An Introduction.

[19]N. Gupta and G. Kaur, WiMAX: Applications,ser. The WiMAX Handbook, S. Ahson and M. Ilyas, Eds. CRC Press (Taylor and Francis Group), ch. 3: “WiMAX Technology for Broadband Wireless Communication”, pp. 35 – 54, ISBN 9781420045474, 2008.

[20]Ajay Jangra, NitinGoel, Priyanka, Komal Kumar Bhatia, “IEEE WLANs Standards for Mobile Ad-hoc Networks (MANETs): Performance Analysis”, in: Global Journal of computer science and technology, pp 42-47, Nov 2010.

[21]Chlamtac, I., Conti, M., and Liu, J. J.-N. “Mobile ad hoc networking: imperatives and challenges Ad Hoc Networks”, 1(1), pp. 13–6, 2003.

[22]HaoYang, Haiyun & Fan Ye “Security in mobile ad-hoc networks : Challenges and solutions”, Pg. 38-47, Vol 11,issue 1, Feb 2004.

[23]Hao Yang, HaiyonLuo, Fan Ye, Songwu Lu, Lixia Zhang, “Security in Mobile Ad hoc networks: Challenges and solutions”, in : IEEE Wireless Communications, 2004.

[24]AnkurO.Bhang, PrabhakarL.Ramtake, “MANET: History, Challenges and Applications”, in: IJAIEM, pp 249-250, 2013.

[25]Rashid Sheikh, Mahakal Singh Chandel, Durgesh Kumar Mishra, “Security Issues in MANET: A Review”, in: IEEE 2010.

[26]Y. Haung and W. Lee, “A Cooperative Intrusion Detection system for Ad hoc Networks”, in Proceedings of the 1st ACM Workshop on security of Ad hoc  d sensor Networks, Fairfax, Virgining, pages 135-147, 2003.

[27]V.S. Yadav, S. Misra, M. Afaque, “Security of Wireless and Self-Organising Networks: Security in Vehicular Ad Hoc Networks”, CRC Press, pp.227-250, 2010.

[28]A. Stampoulis, Z. Chai, “A survey of Security in Vehicular Networks”, Project CPSC 534, 2007.

[29]Q. Yi, N. Moayeri, “Design of secure and application-oriented VANETs”, in: Vehicular Technology Conference. VTC Spring IEEE, pp. 2794-2799, 2008.

[30]S. Biswas, J. Misic, “Proxy signature-based RSU message broadcasting in VANETs”, in: 25th Biennial Symposium on Communications (QBSC), pp. 5-9, 2010.

[31]P. Papadimitratos, L. Buttyan, T.Holczer, E.Schoch, J. Freudiger, M.Raya, et al., “Secure vehicular communication systems: design and architecture”, IEEE commun. Mag.46, 100-109, 2008.

[32]J.T.Isaac, S.Zeadally, J.S. Camara, “Security attacks and solutions for vehicular ad hoc networks”, IET commun, 4 894-903, 2010-04-30.

[33]M. Raya, P. Papadimitratos, J.P. Hubaux, “Securing vehicular communications”, IEEE Wirel. Commun,13, 8-15, 2006.

[34]F. Armknecht, A. Festag, D. Westhoff, K. Zheng, “Cross-layer privacy enhancement and non-repudiation in vehicular communication”, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, pp. 1-12, 2007.

[35]B. Parno, A. Perrig, “Challenges in securing vehicular networks”, in: Workshop on Hot Topics in Networks (HotNets-IV), 2005.

[36]D.B. Johnson, D.A. Maltz, Y. Hu, “The dynamic source routing protocol for mobile ad hoc network”, IETF Internet Draft, draft-ietf- MANET-dsr-09.txt, April 2003.

[37]X. Lin and I. Stojmenovic, “Location-based localized alternate, disjoint and multi-path routing algorithms for wireless networks”, in: Journal of Parallel and Distributed Computing, pp. 22–32, January 2003.

[38]H.D. Trung, W. Benjapolakul, “Routing protocols in mobile ad hoc networks, in: Encyclopedia of Wireless and Mobile Communications”, CRC Press, Book Chapter, in press.

[39]S.R. Das, R. Castaneda, and J. Yan, “Simulation based performance evaluation of mobile, ad hoc network routing protocols”, in: ACM/ Baltzer Mobile Networks and Applications (MONET) Journal, pp. 179–189, July 2000.

[40]C. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers”, in: Proceed- ings of the Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM ’94), London, United Kingdom, pp. 234–244, August–September 1994.

[41]C.E. Perkins, E.M. Belding-Royerand, I.D. Chakeres, “Ad Hoc On- Demand Distance Vector (AODV) Routing”, IETF Internet Draft, draft-perkins-MANET-aodvbis-01.txt, January 2004.

[42]C.E. Perkins and E. Royer, “Ad hoc on-demand distance vector (AODV) routing”, in: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100, February 1999.

[43]M.K. Marina and S.R. Das, “On-demand multipath distance vector routing in ad hoc networks”, in: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), pp. 14–23, 2001.

[44]NAVSTAR GPS operations. Available from: <http://tycho.usno.na- vy.mil/gpsinfo.html>/.

[45]Peter H. Dana’s Page at Colorado University. Available from: http:// www.colorado.edu/geography/gcraft/notes/gps/gps.html/.

[46]G. Dommety and R. Jain, “Potential Networking Applications of Global Positioning Systems (GPS)”, Technical Report TR-24, CS Dept., The Ohio State University, April 1996.

[47]D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS)”, in: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), San Antonio, vol. 5, pp. 2926–2931, November 2001.

[48]E.D. Kaplan, “Understanding GPS: Principle and Application”, Artech House, Boston, MA, 1996.

[49]M. Mauve, A. Widmer, and H. Hartenstein, “A survey on position- based routing in mobile ad hoc networks”, in: IEEE NetworkMagazine, vol. 15, pp. 30–39, November 2001.

[50]R. Jain, A. Puri, and R. Sengupta, “Geographical routing using partialinformation for wireless ad hoc networks”, in: IEEE PersonalCommunications, vol. 8, pp. 48–57, February 2001.

[51]B. Karp and H.T. Kung, “Greedy perimeter stateless routing for wireless networks”, in: Proceedings of the 6th Annual ACM/IEEE International Conference Mobile Computing Networks, pp. 243–254, August 2000.

[52]P. Bose et al., “Routing with guaranteed delivery in ad hoc wireless networks”, in: Proceedings of the 3rd ACM International Workshop in Discrete Algorithms and Methods for Mobile Computer and Communications, pp. 48–55, 1999.

[53]S. Capkun, M. Hamdi, and J. Hubaux, “GPS-free positioning in mobile ad hoc networks”, in: Proceedings of the International Conference in System Sciences, pp. 1–15, January 2001.

[54]H.D. Trung and W. Benjapolakul, “Location-aided multipath routing method for mobile ad hoc wireless networks”, in: Proceedings of the International Conference on Communications and Electronics (ICCE’06), Hanoi, Vietnam, pp. 7–12, October 2006.

[55]Y.-B. Ko and N.H. Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks”, in: Wireless Networks, vol. 6, pp. 307–321, July 2000.

[56]Ha DuyenTrung, WatitBenjapolakul, PhanMihnDuc, “Performance evaluation and comparison of different ad hoc routing protocols”, in: Elsevier, pp. 2478-2496, 2007.

[57]Jon Von Mulert, Ian Welch, Winston K.G Seah, “Security threats and solutions in MANETs: A case study using AODV and SAODV”, in: Elsevier, pp. 1249-1259, 2013.

[58]Guerrero-Zapata M. “Secure ad hoc on-demand distance vector routing”, ACM SIGMOBILE Mobile Computing and Communications Review;6(3):106–7, 2002.

[59]Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM. “A secure routing protocol for ad hoc networks”, In: Proceedings of the 10th IEEE international conference on network protocols (ICNP), Paris, France, p. 78–89, 2011.

[60]Mohammadizadeh M, Movaghar A, Safi SM. “SEAODV: secure efficient AODV routing protocol for MANETs networks,” in: Proceedings of the 2nd interna- tional conference on interaction sciences: information technology, culture and human (ICIS), Seoul, Korea, p. 940–44, 2009.

[61]Mahmoud HashemEiza, Thomas Owens, Qiang Ni and Qi Shi, “Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks”, IEEE transactions on vehicular technology, vol. 64, no. 12, December 2015.

[62]Tarunpreet Bhatia and A.K. Verma, “Performance Evaluation of AODV under Blackhole Attack”, in I. J. Computer Network and Information Security, 2013, 12, 35-44. DOI: 10.5815/ijcnis.2013.12.05

[63]P.Periyasamy and Dr.E.Karthikeyan, “Survey of Current Multipath Routing Protocols for Mobile AD Hoc Networks” in I. J. Computer Network and Information Security, 2013, 12, 68-79. DOI: 10.5815/ijcnis.2013.12.09

[64]J.Sathiamoorthy, B.Ramakrishnan,"CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.64-71, 2016.DOI: 10.5815/ijcnis.2016.02.08