Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Similar documents
Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks


W. Gracy Theresa and S. Sakthivel. Depatment of Computer Science, Adhiyamaan College of Engioneering, Hosur, India

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Implementation: Detection of Blackhole Mechanism on MANET

Detection of Vampire Attack in Wireless Adhoc

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

CAODV Free Blackhole Attack in Ad Hoc Networks

Introduction and Statement of the Problem

Cross Layer Detection of Wormhole In MANET Using FIS

IJMIE Volume 2, Issue 6 ISSN:

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Intrusion Detection and Prevention in Internet of Things

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

ABSTRACT I. INTRODUCTION

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Chapter 7 CONCLUSION

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Packet Estimation with CBDS Approach to secure MANET

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Performance Evaluation of MANET through NS2 Simulation

Detection of Sybil Attack in Wireless Sensor Network

International Journal of Advance Engineering and Research Development

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Defending MANET against Blackhole Attackusing Modified AODV

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

EFFECT OF BLACKHOLE INTRUSION IN WIRELESS NETWORKS Mr. Vishal S. Badgujar 1, Prof. Sudhir N. Dhage 2

A Robust Trust Aware Secure Intrusion Detection for MANETs

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Performance Analysis of Aodv Protocol under Black Hole Attack

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

MANET ROUTING ATTACKS

Comparing the Impact of Black Hole and Gray Hole Attacks in Mobile Adhoc Networks

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

Security in DOA routing protocol for Mobile Adhoc Networks

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, Jul-Aug 2014

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Security in Mobile Ad-hoc Networks. Wormhole Attacks

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Running Reports CHAPTER

Intrusion Detection for Routing Attacks in Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Australian Journal of Basic and Applied Sciences. Detecting Collaborative Blackhole Attack in MANET Using Sequence Number Mitigation Mechanism

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

A Survey - Energy Efficient Routing Protocols in MANET

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

An Improvement to Mobile Network using Data Mining Approach

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Avoiding Blackhole Attacks Using CBDA Approach in MANETS

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Detection of Wormhole Attacks in Wireless Sensor Networks

MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK. J. Gautam, M. Kasi Nivetha, S. Anitha Sri and P. Madasamy

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Saving Wireless Networks By Detecting, And Designing Efficient From Masquerade Attacks

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

Challenges in Mobile Ad Hoc Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

DDOS Attack Prevention Technique in Cloud

A Study on Issues Associated with Mobile Network

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Transcription:

European Journal of Applied Sciences 8 (1): 41-46, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.1.22852 Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks 1 2 K. Jayarajan and A. Sabari 1 Anna University, Chennai, Tamil Nadu, India 2 Department of Information Technology, K.S.Rangasamy College of Technology, Tiruchengode, Tamil Nadu, India Abstract: The modern wireless adhoc networks has more impact of routing attacks due to the topology changes and the problem of routing attack detection has been performed in number of approaches. The earlier methods suffer with the problem of poor detection accuracy and the performance of mitigation approaches. To overcome the issue of routing attack detection, a novel quadratic route factor estimation technique has been proposed in this paper. The method maintains route details and network information at each time frame based on different quarters of geographic network region. The method splits the region of entire network into four quarters and for each quadratic region, a time based snapshot and route details are stored. Based on the route trace and snapshot of the network the routing attack is mitigated in different locations of the entire network. The method selects a few set of nodes in the network to perform the detection of routing attack where the selection of node is performed based on various parameters. The distributed detection of routing attack increases the performance of the network and improves the throughput ratio also. Similarly for the detection of routing attack, the method uses the snapshot and route traces with the help of packet information. Key words: Wireless Adhoc Networks Quadratic Route Factor Routing Attacks Sink Hole Attack Botnet Attacks INTRODUCTION The modern wireless adhoc network is the collection of number of wireless devices moving across the geographic region of the network. There are numbers of services the users of the network accessing and the user is able to move throughout the network and could access the services from anywhere in the network. The mobility of the wireless nodes makes the topology of the network to change and the routing in the network is performed in collaborative manner where all the nodes participate in routing of packets. The mobility of the network makes the topology to change at each time window and from the topology being identified the method can obtain the number of routes available in the network. The entire region of the network can be split into regions and by splitting the region of the network into four quarters, the network can be split into four numbers. For each quadratic region, there will be number of nodes and there exists more number of routes to reach the sink node of the network. The required service may be available in any node present in the network, in order to access the service the service request has to be moved from the source node to the sink node where the service is available. To deliver the request from the source node to the destined node, the route request packet has to be routed in the network. The request packet can be transferred through any route and for each route in the network, the route factor can be computed. The route factor is the value which represents the trustworthy of the route in transmitting the packet towards the sink node. The route factor can be computed according to the packet information like the number of packets being transmitted in any time window, the payload of packets, the number of nodes present in the route and their participation in routing attack and so on. Based on the route factor the routes trustworthy can be computed and helps identifying the presence of malicious nodes in the route. Corresponding Author: K. Jayarajan, Anna University, Chennai, Tamil Nadu, India. 41

The routing of packets in any network has the threat the consistency of the CPU usage. Thus, the proposed of different attacks and one among them is the routing algorithm is able to differentiate between the malicious attack. The routing attack includes generation of sink and the legitimate nodes. holes, longest route forwarding, eaves dropping of A sinkhole attack detection scheme in Mintroute packets and many more. The sink whole attack is one wireless Sensor Networks [4], where the vulnerabilities of which generates a hole around the sink node and makes Mintroute protocol to sinkhole attacks are discussed and the routes unusable through the node. This reduces the the existing manual rules used for detection are number of routes to be reduced which increases traffic in investigated using different architecture. other routes and makes the other nodes to suffer with Network Forensics using JADE [5-9], is proposed by energy. In case of longest route forwarding attack, the Asha Nagesh for the detection of denial of service malicious nodes choose the longest route even there exist attacks. It captures the underlying network packets and shortest routes to reach the destination, which reduces hands that are to the popular intrusion detection system. the energy of entire nodes of the network. In eaves Snort has used the intrusion detection system and dropping attack, the malicious node drops the packet functions with the support of rule set provided. The blindly. This paper considers the above mentioned framework is used to find out the attacks carried out and attacks and how they can be mitigated using the the signature of the packets. The purpose is to improve proposed approach. the intrusion detection system and provide support to the network administrator. It analyzes the packets to find out Related Works: There are number of methods has been the attack using predefined rules, so that new kind of discussed for the mitigation of routing attacks in wireless attacks cannot be identified. adhoc networks and this section discusses about few Host Based intrusion Detection system [10] methods discussed earlier. presented an intrusion detection system which informs Detection of wormhole attacks in wireless sensor system administrator about potential intrusion incidence networks using range-free localization [1], propose two in a system. The designed architecture employs statistical wormhole detection procedures for WSNs, based on method of data evaluation that allows detection based on concepts employed in a kind of range-free localization the knowledge of user activity deviation in the computer methods: one of the approaches performs the detection system from learned profile representing standard user simultaneously with the localization procedure and the behavior. other operates after the conclusion of the location Network intrusion detection system NID [11], is discovery protocol. Both strategies are effective in designed as a data mining framework to automatically detecting wormhole attacks, but their performance is fairly detect attacks against computer networks and systems. sensitive to shadowing effects present in the radio An unsupervised anomaly detection technique assigns a channels. score to each network connection that reflects how Detection and Correction of Sinkhole Attack with anomalous the connection is proposed with association Novel Method in WSN Using NS2 Tool [2], uses a pattern analysis module to summarize those network sequence number based sinkhole detection approach. connections that are ranked highly anomalous by the The sender node first requests the sequence number with anomaly detection module. the rreq message, if the node replies its sequence number Network Intrusion Detection System is proposed with rrep message. Transmitting node will match sequence which embedded a NIDS in a smart-sensor-inspired device number in its routing table. If matches then data will be under a service-oriented architecture (SOA) approach. shared otherwise it will be assign the sequence number to Using this embedded NIDS can operate independently the node. If the node accepts the sequence number then as an anomaly-based NIDS, or integrated transparently the node will enter in the network otherwise it will be in a Distributed Intrusion Detection System (DIDS). eradicated from the network. It combines the advantages of the smart sensor approach Intrusion detection of sinkhole attacks in large-scale and the subsequent offering of the NIDS functionality as wireless sensor networks [3], proposes a novel algorithm a service with the SOA use to achieve their integration for detecting sinkhole attacks for large-scale wireless with other DIDS components. It also addresses the sensor networks. We formulate the detection problem as construction of a physical sensor prototype. This a change-point detection problem. Specifically, we prototype was used to carry out the tests that have monitor the CPU usage of each sensor node and analyze demonstrated the proposal's validity, providing detection. 42

An Activity Pattern Based Wireless Intrusion Algorithm: Detection System was designed for wireless network. Input: Node Details Nd, Route Table Rt It exploits pattern recognition techniques to model the Output: Network Topology NT, Route Table Rt. usage patterns of authenticated users and uses it to Start detect intrusions in wireless networks. User activity is Split region into four quarters. 4 monitored and their discriminative features are extracted Rs = Region Split( i 90) to identify intrusions in wireless networks. The detection i= 1 module uses PCA technique to accumulate interested for each region Ri from Rs statistical variables and compares them with the for each time window Ti thresholds derived from users activities data. When the Identify Number of nodes present in the network variables exceed the estimated thresholds, an alarm is region. raised to alert about a possible intrusion in the network. Nd = Nodes (Ri) Ri The novelty of the proposed system lies in its light- generate topology Nt. weight design which requires less processing and memory end resources and it can be used in real-time environment. Stop. We propose a quadratic route factor estimation technique based routing attack mitigation model to The above discussed algorithm computes the perform detection of various attacks in wireless adhoc network topology for each quadratic region being networks and mitigation of them to develop the quality of identified and will be used to perform route discovery. service in wireless adhoc networks. Route Discovery: The route discovery is the process of Quadratic Route Factor Model Based Routing Attack computing available routes in each region topology. Detection: The quadratic route factor model splits the The time orient snapshot only generates the network entire network region into four parts at 90 degress and for structure and from the generated topology, the method each quarter, the method maintains time orient snapshot computes the total number of routes available from the which shows the network topology and from the topology source node to reach the sink node. Once the number of being generated, the method computes the available distinct routes are identified then the method computes routes to reach the sink node. Based on the topology and the hop count for each of the route available. The route information with the support of packet details the computed routes will be used to compute the quadratic method computes route factor for each distinct route route factor in the next stage. available in the network. The entire process can be split into number of stages namely time orient snapshot Algorithm: generation, route discovery, quadratic route factor Input: Topology Set Ts estimation, Routing attack mitigation. Each stage of the Output: Route Table Rt proposed model will be discussed in detail in this section. Start for each entry Ti from Ts Time Orient Snapshot Generation: This section performs Identify the neighbors of source node Sn. the capturing of network details and generates the Ns = Neighbors (Ti, Sn) Transmission Range topology of the network. The Time orient snapshot (Sn) generation mechanism is performed by the sink node at Compute available routes through each neighbor. each time window. The sink node maintains the traces of for each neighbor Ni from Ns packets and the location details of the nodes in different compute routes available. region. Using the mentioned information, the sink node Rts = size( Ni, Neighbor) Route Ti i= 1 generates the network topology at each time window, because the mobility of the nodes makes the topology to Add routes to Rt. change in frequent manner and to support the detection Rt = (Routes Rt) Rts of routing attacks the requirement of network topology is essential. The generated snapshot will be updated with the quadratic routing attack detection nodes. Stop. 43

Europ. J. Appl. Sci., 8 (1): 41-46, 2016 The above discussed algorithm computes the for each route available and if there exist more than available routes in each region to perform routing attack number of malicious routes then the method deploys a detection. temporary sink node where the data will be collected and will perform routing attack detection. The method Quadratic Route Factor Estimation: The quadratic route computes QRF value for each route and based on the factor is the value computed on each region according to value of QRF the method decides whether the route is the packet traces. The method maintains the traces of trustworthy or not. packets which has been transferred in any route and for each route the method compute the packet transfer rate, Algorithm: payload and hop count and so on. Based on the Input: Route Table Nt computed measures, the method computes the quadratic Output: Null route factor which represents the routes trustworthy for Start the packet transfer. The method uses the malicious trace Initialize Malicious Routes MRS. where it has stored number of packet traces which has for each region Ri from Rs been identified and based on the trace the method for each time window Ti computes the QRF value. Generate Snapshot. Perform Route Discovery Algorithm: For each route R Input: Route Table Rt, Network Trace Nt. compute QRF. Output: QRF value if QRF>RTh then Start Add to MRS. for each route Ri from Rt MRS = Routes (MRS) Ri Compute transmission frequency. Traces. Ri Nt Tf = if size(mrs) > ((1/3) size(nt)) then size( Nt. region) Deploy Temporary sink node. Compute average payload. Choose least QRF valued route. APl = ( Traces. Ri Nt). Payload Transmit packet on specific route. size( Nt. region) Compute average hop count AHC. Stop. AHC = ( Traces. Ri Nt). HC size( Nt. region) The above discussed algorithm computes malicious routes and if the number of malicious routes are more than Compute Common Hops present in malicious trace. 1/3 rd of the available routes then the method deploys MCH = Hops (Traces. Ri MH) MH temporary sink on the region identified. Compute number of matches in MCH. NM = Hops (Ri) MCH RESULTS AND DISCUSSION Compute QRF = Tf APL AHC NM The proposed Quadratic Route Factor Estimation Stop. Based network threat identification and mitigation model has been implemented in Network simulator NS2. The above discussed algorithm computes the We have designed network topology with different quadratic route factor for each of the route being scenarios with different number of nodes. The proposed identified in the previous section. The computed QRF methodology has been evaluated with different density value will be used to perform routing attack detection. networks with multiple malicious nodes. The following Table 1 shows the simulation parameters used to Routing Attack Mitigation: The routing attack is detected evaluate the proposed method. NS-2 has written using and mitigated based on the value of quadratic route C++ language and it uses Object Oriented Tool factor. The method computes the quadratic route factor Command Language (OTCL). It came as an extension of 44

Graph 1: Shows the attack detection accuracy Graph 2: Comparison of time complexity Table 1: The parameters used in our simulation Parameters Value Version NS-allinone 2.34 Protocols QRF Area 1000m x 1000m Transmission Range 250 m Traffic model UDP,CBR Packet size 512 bytes Table 2: Shows the comparison results Detection Rate ----------------------------------------- S.No Number of Nodes Protocol False +ve False -ve Throughput PDF 1. 100 GEOSTATICAL HAZARD MODEL 3.5 2.5 92 86.70 2 100 HOST BASED 3.2 2.3 94 89.50 3 100 EAACK 2.8 1.9 95 92.70 4 100 QRF 0.4 0.7 98.8 97.50 Tool Command Language (TCL). The simulations were The Table 2, shows the result of carried out using a WAN environment consisting of 71 comparative analysis of proposed method on wireless nodes over a simulation area of 1000 meters x different parameters. The result shows that the proposed 1000 meters flat space operating for 60 seconds of method produces more efficient result than other simulation time. The radio and IEEE 802.11 MAC layer methods. models were used. The Graph 1, shows the attack detection accuracy The Table 1, shows the details of simulation being produced by different methods and it shows clearly that used to evaluate the performance of the proposed the proposed method has produced more accuracy in method. network threat identification. 45

The Graph 2 shows the comparison of time 2. Singh Tejinderdeep, 2013. Detection and Correction complexity produced by different methods and it shows of Sinkhole Attack with Novel Method in WSN clearly that the proposed method has produced less time Using NS2 Tool, International Journal of Advanced complexity than other methods. Computer Science and Applications, 4(2). 3. Rassam, M.A., 2012. A sinkhole attack detection CONCLUSION scheme in Mintroute wireless Sensor Networks, Telecommunication Technologies (ISTT), pp: 71-75. This paper discusses an efficient quadratic route 4. Qi Jin, 2012. Detection and defence of Sinkhole attack factor estimation based routing attack mitigation approach in Wireless Sensor Network, Communication for wireless adhoc networks. The method splits the entire Technology ICCT, pp: 809-813. geographic region into four quarters in the perspective of 5. Sheela, D., 2011. A non cryptographic method of source node and for each region the method generates sinkhole attack detection in wireless sensor networks, time orient snapshot and topology. From the topology Recent Trends in information Technology, pp: 527- being generated, the method computes the available 532. routes and then for each route the quadratic route factor 6. Salehi, S.A., 2013. Detection of sinkhole attack in is computed. Using the computed QRF value the method wireless sensor networks, Space Science and identifies the trustworthy of the node. Also if the number Communication (IconSpace), pp: 361-365. of routes in any region has more QRF value then the 7. Nagesh Asha, 2007. Distributed Network Forensics method deploys the temporary sink node in the region to using JADE, IEEE transaction on Network security. perform attack detection. The deployment of temporary 8. Vokorokos, L., 2010. Host Based Intrusion Detection sink node increase the possibility of identifying the System, Intelligent Engineering Systems (INES), malicious packet with routing attack in the region itself pp: 43-47. and improves the performance of routing attack detection. 9. Raghunath, B.R., 2008. Network intrusion detection system, Emerging Trends in Engineering and REFERENCES Technology, 2008. ICETET '08, pp: 1272-1277. 10. Macia -Pe rez, F., 2012. Network Intrusion Detection 1. Otero Garcia, 2012. Detection of wormhole attacks in System Embedded on a Smart Sensor, Industrial wireless sensor networks using range-free Electronics and IEEE Transactions on, 58(3): 722-732. localization, Computer Aided Modeling and Design 11. Haldar, N.A.H., 2012. An Activity Pattern Based of Communication Links and Networks (CAMAD), Wireless Intrusion Detection System Information pp: 21-25. Technology, pp: 846-847. 46