Providing Security and Energy Management in Location Based Routing of Manet s

Similar documents
Energy Aware and Anonymous Location Based Efficient Routing Protocol

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks

LERP: A Secure Location Based Efficient Routing Protocol

PIONEER RESEARCH & DEVELOPMENT GROUP

SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs

II. PROBLEM STATEMENT & DEFINITION: Existing anonymity routing protocols in MANETs can be mainly classified into two categories: hop-by-hop

Anonymity Protection in MANETs By Zone Partitioning

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

Keywords ALERT,anonymity protection,blackhole attacks,r-alert

Challenges in Mobile Ad Hoc Network

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Performance Evaluation of Various Routing Protocols in MANET

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Subject: Adhoc Networks

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Sybil Attack Detection in Mobile Adhoc Network

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Detection of Vampire Attack in Wireless Adhoc

A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Introduction to Mobile Ad hoc Networks (MANETs)

Performance Analysis and Enhancement of Routing Protocol in Manet

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

UNIT 1 Questions & Solutions

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Survey on Traffic Pattern Discovery System For MANETs

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks

Comparative Study of Ids for Manet

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Computation of Multiple Node Disjoint Paths

Privacy Protection over Network Communication in Manet

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Packet Estimation with CBDS Approach to secure MANET

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Survey on Location Based Routing Protocols in MANET

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

Figure 1. Clustering in MANET.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Detection of Wormhole Attacks in Wireless Sensor Networks

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

International Journal of Advance Research in Computer Science and Management Studies

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

The Novel HWN on MANET Cellular networks using QoS & QOD

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Review Paper on Secure Routing Technique for MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Receiver Based Multicasting Protocol for Wireless Sensor Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Energy Efficient EE-DSR Protocol for MANET

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Estimation of Network Partition Problem in Mobile Ad hoc Network

Keywords: AODV, MANET, WRP

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Statistical Traffic Pattern Discovery System For Wireless Mobile Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Part I. Wireless Communication

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Node-Disjoint Multipath Routing with Group Mobility in MANETs

Survey on Multicast Routing Protocols in MANETs

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

Transcription:

Providing Security and Energy Management in Location Based Routing of Manet s Suprita Sambranikar 1, Prathima S D 2 1 Final Year M.Tech Dept. Of ECE, BTL Institute Of Technology And Management, Bangalore, India. 2 Asst. Prof: Dept. Of ECE, BTL Institute Of Technology And Management, Bangalore, India. Abstract- Mobile Ad Hoc Networks (MANETs) use unknown routing protocols that hide from view node identities and routes from outside observers in order to provide ambiguity protection. As we know existing unknown routing protocols depends on hop-by-hop encryption and redundant traffic. It generates high cost and cannot provide full ambiguity protection to packet sources, destination, and routes. Because of high cost the essential resource restriction problem exists in MANETs mainly in multimedia wireless applications. To provide high ambiguity protection at low cost, we offer an Anonymous Location-based Efficient Routing protocol (ALERT) that provides Security and Energy Management in Location Based Routing of MANETs. ALERT dynamically divides the network area into zones and arbitrarily chooses nodes in zones as intermediary relay nodes, which form non detectable unknown route. It also hides the packet initiator/receiver among many initiators/receivers in order to provide anonymity protection to source and destination. Thus, ALERT provides ambiguity protection to sources, destinations and routes. It as well has strategies to successfully oppose intersection and timing attacks. We theoretically examine ALERT in terms of ambiguity and efficiency. Experimental results illustrate reliability with the theoretical examination, and compared to other anonymous routing protocols ALERT achieves improved route anonymity protection at lower cost. The proposed method is inspired with Network Simulator (NS2) to analyze its performance in terms of network life span, packet delivery ratio, Control overhead and end to end delay than the existing schemes. Index Terms- Mobile ad hoc networks, ambiguity, routing protocol, geographical routing I. INTRODUCTION Now day s Mobile ad hoc networks are developing in high-speed, it has lots of wireless applications that can be used in large number of areas such as business, emergency services, military, education and activity. Manet is a continuously identity organizing, communications-less network of mobile devices connected without wires. Each device in a Manet is free to move arbitrarily in any direction, and will therefore connect its links to other devices commonly. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes within the network, partial objective security, active topology, scalability and requires centralized management. Because of these vulnerabilities, MANET is more flat to cruel attacks. Although ambiguity may not be a necessary in civil oriented applications, it is risky in military application. Consider a MANET in military applications, through traffic analysis, enemies may destroy transmitted packets by attacking soldiers, commander nodes, and block the data transmission by comprising relay nodes, thus putting us at a dangerous disadvantage. Unknown routing provides secure communication between two nodes by hiding nodes unique identity and prevents these nodes from traffic analysis attacks of adversaries. In this paper the main goal of unknown routing is to hide identity and location of data sources and route. So attacker cannot easily recognize identity and location in network of nodes. This paper is organized as follows: In Section 2, we explain methodology. We discuss ALERT protocol in section 3. In section 4, we tentatively examined ALERT in terms of ambiguity and efficiency. In section 5 and 6 we have advantages and simulation results. The conclusion and future work are given in Section 7. II.METHODOLOGY The method of providing security and energy management in location based routing of MANETs working will be made in the following steps: Unknown routing: ALERT will give identity, location ambiguity of source and destination and route ambiguity. Low cost: Rather than depending on hop-byhop encryption and redundant traffic, ALERT especially uses randomized routing of one communication copy to provide ambiguity protection. IJIRT 102132 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 1442

Resilience to intersection and timing attacks: ALERT will effectively oppose intersection attacks and also avoids timing attacks. Because of it s not fixed routing paths between source destinations. Extensive simulation: We conducted simulation results and evaluated ALERT performance with other anonymous routing protocols. III.ALERT-NETWORK MODELS INITIAL STAGE Z1 Z2 ALERT is used in different network models with node group patterns. Such as random way position model and group mobility model. Consider MANET used effectively in military appliance. Using network model information intruder may try to find out location of nodes. So ambiguity may be at risk. Therefore, an unknown communication protocol is required to provide strict ambiguity to the sender. Also the attacker tries to block the packets by interrupting packets on a routing path. Therefore, route should also be undetectable. And with help of intersection attack on traffic destination node can be detected, so destination node also needs the protection ambiguity. A. Dynamic Pseudonym and Location of Node Z3 ANOTOMY PATH SELECTION USING RANDOM RELAY NODE Z4 Dynamic pseudonym is another identity specified to node. In ALERT real MAC address can be replaced as pseudonym for the node identifier. Nodes MAC adress can be used to find the nodes presence in the network. Therefore changing MAC address with pseudonym is the main advantage of ALERT protocol. This pseudonym is the mixture of MAC address and Current time crush. But if the attacker knows the information then they can find out the nodes easily. Therefore, to prevent this time crush can be arbitrarily selected. This pseudonym is not permanent it expires after a specific time period so that attacker cannot relate the pseudonym with nodes. One problem with this pseudonym is changing pseudonym frequently create routing anxious. Therefore these pseudonym changes commonly should be suitably determined. B. The ALERT Routing Algorithm ALERT provides random and dynamic routing path, which has number of dynamically selected intermediate nodes. Below figure shows the network partition into zones using alert routing algorithm. FINALLY MORE ENERGY EFFICIENCY ROUTE R2 Fig 1.Routing among zones in ALERT C. Location of Destination Zone RANDOMLY GENERATED R1 FINAL ROUTE To avoid disclosure of destination we are using destination zone position. The destination zone position IJIRT 102132 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 1443

is made from the bottom right and upper left coordinates of the zone. To calculate zone position we have, H = log2 (ρ.g/k) Where as H=Total number of partition in order to produce ZD G=size of entire network area ρ=node density Using H and G the position (0, 0) & (Xg, Yg) of entire network area and position of destination node, the source can calculate the zone position of ZD. the information of the communicating nodes and they can detect the routing path. To prevent this, ALERT proposes a strategy called counter intersection attack. In this attack the destination is broadcasted into K-anonymity. This broadcasting is done in two steps. In first step packet is broadcasted into K-anonymity but it will not reach the destination node. In second step random forwarders will receive the packet and forwards to the destination node at this point attacker get confused and he will not know which the destination node is. C. Resilience to Timing Attacks D. Packet Format Some information is needed, for the successful routing between source and destination, which is embeds in the data by source and each packet forwarder node. For ALERT following packet format is used. Fig.4 ALERT Packet Format RREQ/RREP/NAK- used to acknowledge the failure of packet. Ps- Pseudonym of a source. Pd pseudonym of a destination. Lzs & Lzd are the location of Hth partitioned source zone and destination zone. h- Number of divisions. H Maximum number of division allowed. IV- ANONYMITY PROTECTION AND STRATEGIES AGAINST ATTACKS A. Anonymity Protection The main objective of ALERT is to provide unique name to the nodes, location ambiguity for source, destination and route. For this ALERT dynamically divides the network into zones and selects random forwarders to transfer packet from source to destination. With this the attacker will not detect the packet. Unknown path between the source and destination node ensures that neighbor nodes on the path do not know where the end points. It provides the ambiguity protection to the source and destination. ALERT has notify and go mechanism. B. Strategy to oppose Intersection Attacks In intersection attack the attacker can collect In timing attacks, during packet departure and appearance times, an attacker can find the data transmitted between source and destination, with this it will identify position of S and D. For example, two nodes X and Y communicate with each other at an interval of 5 seconds. When, the attacker finds that X and Y are sending and receiving the packet at fixed time of six second. Then, the attacker would estimate that X and Y are communicating with each other. Avoiding the exposure of interaction between communication nodes is a way to oppose timing attacks. In ALERT, the notify and go method and the broadcasting in ZD both put the interaction between S-D into two sets of nodes to confuse attackers. Likewise, the routing path between a given S-D pair and the communication delay change constantly, which once more keeps an attacker from finding the S and D. V. ADVANTAGES ALERT provides identity, location ambiguity of source and destination and route ambiguity. Rather than depending on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing of one message copy to provide anonymity protection. ALERT can also keep away from timing attacks because of its nonfixed routing paths for a source destination pair. We conducted inclusive experiments to calculate ALERT s performance in comparison with other unknown protocols VI. SIMULATION RESULT The total numbers of sensor nodes are 100 deployed in 1000x1000 areas with static source and sink chosen. Initial simulation run is made to send the hello packets, and two random paths are selected between source and destination according to randomly selected relay nodes. Remaining energy calculation is made for two selected to select which one is more energy efficient. The final route will be more protected and also energy resourceful. IJIRT 102132 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 1444

The Performance evaluation is made through the xgraph for Packet delivery ratio Energy Control overhead packets Throughput Fig7.Performance of Control overhead Packets Fig5. Performance of Packet Delivery ratio Fig8.Performance of Throughput VII. CONCLUSION AND FUTURE WORK Fig6.Performance of Energy Existing anonymous routing protocols depend on either hop-by-hop encryption or redundant traffic and generate high cost. Also, some routing protocols are not able to provide complete route anonymity protection for source and destination. ALERT is prominent by its low down cost and ambiguity security for sources, destinations, and routes. It uses active hierarchical zone divisions and random relay node selections to make it difficult for an intruder to detect the two endpoints and nodes en route. A data in ALERT includes the source and destination zones rather than their positions to provide ambiguity protection to the source and the destination. ALERT further makes the strong ambiguity protection of source and destination by hiding the data initiator/receiver among a number of data initiators/ receivers. It has the notify and go mechanism for source ambiguity, and uses narrow broadcasting for destination ambiguity. In addition, ALERT has an capable solution to oppose intersection attacks and fight against timing attacks. Experimental outcome shows that IJIRT 102132 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 1445

ALERT can provide high ambiguity protection at a low cost when compared to other ambiguity algorithms. It can also accomplish similar routing competence to the base-line GPSR algorithm. Like other ambiguity routing algorithms, ALERT is not totally bulletproof to all attacks. Future work exists in reinforcing ALERT in an effort to prevent stronger, active attackers and representing complete theoretical and simulation results. ACKNOWLEDGEMENT This research was supported in part by my project guide Miss. Prathima S. D. Assistant Professor, Branch of Electronics and Communication Engineering for her exemplary guidance and precious suggestions, which helped me in effectively increasing the part. REFERENCES [1] K.E. Defrawy and G. Tsudik, ALARM: Anonymous Location- Aided Routing in doubtful MANETs, Proc. IEEE Int l Conf. Network Protocols (ICNP), 2007. [2] X. Wu, AO2P: Ad Hoc On-Demand Position- Based Private Routing Protocol, IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005. [3] Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, An unknown On-Demand Position- Based Routing in Mobile Ad Hoc Networks, Proc. Int l Symp. Applications on Internet (SAINT), 2006. [4] A. Pfitzmann, M. Hansen, T. Dresden, and U.Kiel, Ambiguity, Unlink capacity, Unobservability, Pseudonymity, and Identity Managementa Consolidated Proposal for vocabulary, Version 0.31, technical description, 2005. [5] T. Camp, J. Boleng, and V. Davies, A Survey of Mobility Models for Ad Hoc Network investigate, Wireless Communications and Mobile Computing, vol. 2, pp. 483-502, 2002. [6] Z. Zhi and Y.K. Choong, Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy, Proc. Third Int l Workshop Mobile scattered Computing (ICDCSW), 2005. [7] Y.-C. Hu, A. Perrig, and D.B. Johnson, Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks, Wireless Networks, vol. 11, pp. 21-38, 2005. [8] I Aad, C. Castelluccia, and J. Hubaux, Packet Coding for Strong ambiguity in Ad Hoc Networks, Proc. Securecomm and Workshops, 2006. [9] X. Hong, M. Gerla, G. Pei, and C.C. Chiang, A Group Mobility Model for Ad Hoc Wireless Networks, Proc. Second ACM Int l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999. [10] The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns, 2012. IJIRT 102132 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 1446