EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Similar documents
BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

International Journal of Advance Engineering and Research Development

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Security of Mobile Ad Hoc and Wireless Sensor Networks

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

ABSTRACT I. INTRODUCTION

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Catching BlackHole Attacks in Wireless Sensor Networks

SECURITY PROTECTION ACROSS NETWORK BASED ATTACKS IN MESH NETWORKS

Wireless Sensor Networks: Security Issues, Challenges and Solutions

A Review on Black Hole Attack in MANET

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Detection of Wormhole Attacks in Wireless Sensor Networks

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Wireless Network Security Spring 2015

Introduction to VANET

Survey on Multicast Routing Protocols in MANETs

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Introduction and Statement of the Problem

Performance Analysis of Aodv Protocol under Black Hole Attack

Subject: Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Detecting and Tracking Intruders in Mesh based Networks

MANET : Services, Parameters, Applications, Attacks & Challenges

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon

To Detect and Isolate the Selective Packet Drop Attack in MANET

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Survey of Attacks in Mobile Ad Hoc Network

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

PERFORMANCE STUDY OF IMPROVED AODV AGIANST BLACK HOLE ATTACK IN WIRELESS ENVIRONMENT

MANET SECURITY BREACHES : THREAT TO A SECURE COMMUNICATION PLATFORM

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

A Technique for Improving Security in Mobile Ad-hoc Networks

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Sleep/Wake Aware Local Monitoring (SLAM)

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Security Improvement of Mobile Ad Hoc Networks using Clustering Approach

Packet Estimation with CBDS Approach to secure MANET

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Defending MANET against Blackhole Attackusing Modified AODV

International Journal of Advance Research in Computer Science and Management Studies

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Security Issues In Mobile Ad hoc Network Routing Protocols

routing protocols, also these don t consider the packet size and the antenna range of the nodes as a I. INTRODUCTION

Detection of Vampire Attack in Wireless Adhoc

A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks using AODV Protocol

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Cisco 5921 Embedded Services Router

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

CAODV Free Blackhole Attack in Ad Hoc Networks

II. ROUTING CATEGORIES

A Review Paper on Secure Routing Technique for MANETs

Int. J. Advanced Networking and Applications Volume: 04 Issue: 04 Pages: (2013) ISSN :

Wormhole Attack in Wireless Ad-Hoc Networks

International Journal of Advance Engineering and Research Development

UNIT 1 Questions & Solutions

Webpage: Volume 4, Issue VI, June 2016 ISSN

A Review on Security Issues, Challenges and their Solutions in MANETs

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Detection of Attacks on Application and Routing Layer in Tactical MANETs

Improving ZRP Protocol against Blackhole Attack

SRPS: Secure Routing Protocol for Static Sensor Networks

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2

Mobile Communications. Ad-hoc and Mesh Networks

Transcription:

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to each other for sharing the information only. The information flow from one to another node through link, channel or could be a path. The sharing of information from one user to another only when the network was authenticates. The information could not be share on unauthorized network. The authorized network is a network that connects two machines each other and also identifies to each other, then the three-way handshake connection built on both side and mutually exchanges the packet. This paper explaining the concept of Byzantine attack which was more powerful attack studied in the previous papers. This attack creates virtual connection on both side then after intercepts all the information from two node just say node u and node v. This paper explores the prevention technique by using Pre-shared key technique. The proposed pre-shared key technique implemented on the network simulator-2 software and evaluated the performance parameters viz. throughput, packet delivery ratio and end to end delay. Keywords:Throughput, malicious node, Delay, byzantine, mesh network, access point. I INTRODUCTION The Ad-Hoc network is a peer to peer network that connects number of wireless nodes that directly communicate with each other. The wireless Ad- Hoc network is infrastructure less network and used in civilian applications, home automation etc. The mesh topology used in this paper and focus is to deploying the Ad-Hoc network in such a way that forward and transfer the data from one node to another node. The wireless mesh based network creates an Ad-Hoc network and each random node transfer the data or payload to another in the same Ad-Hoc networks. The Ad-Hoc network also communicates [12] with the wired network as below in the figure 1. The node 0 establishes the wired connection between two nodes i.e. node 5 and node 6 where the rest of all nodes connected in a wireless manner. Here the node 0 communicates with IEEE 802.3 standard whereas the IEEE 802.11 makes wireless connection to all 6 nodes. The remainder of the paper is organized as follows: the next section provides the background of classification of attacks, the byzantine attack follows and had same signatures of wormhole attack and section research challenges explained the challenges faces to prevent this byzantine attack. Then the previous research efforts that contribute to our approach are reviewed and an described in section: Related work. ISSN: 2278 7798 All Rights Reserved 2014 IJSETR 3482

Wormhole attacks are difficult to detect since the maliciousnodes only eavesdrop and retransmit the beacons [2]. Theattacker creates a low-latency link (i.e. high-bandwidthtunnel) between two or more attackers in the network.attackers promote these tunnels as high-quality routes tothe base station[1]. The following attack classification [1] shown in the table 1.1. Table 1.1: Attack Classifications [1] Layers Attack Physical layer Link/MAC-layer Tampering, Eavesdropping, Jamming Collision, Exhaustion, Unfairness, IdentitySpoofing, Traffic manipulation Fig1: Wired- Wireless Network Scenario The section IV is explaining the working of proposed scenario and different result analyzes from the section V. The concluded work of this paper are mentioning on the end of section before references. A. Attack Classification The attack can be classified into two ways: Internal Attack and External Attack. The external attack carried out by the external node to the authenticated network and forwards false information to gain useful information. This attack generally wrap the own ip address to the authenticate node ip address and the internal nodes compromised with the nodes. The congestion related problems and unavailability of services rises in this type of attack [9]. The internal attack fully compromised with the internal node that communicates with neighboring nodes. The malicious node compromised with the internal nodes and gain information to every information flow in the network. This attack has more harmful than external attacks. The unavailability of service, connection termination, packet losses problems arises in this type of attack. This paper explored the byzantine attack, therefore we highlights some of internal attacks described below in this section: II. RESEARCH CHALLENGES Network/routing layer Transport layer Spoofing, False routing, Packet replaying,selective forwarding, Neglect and greed,homing, Misdirection Blackhole, Grayhole,Byzantine, Wormhole, Sinkhole De-synchronization/ Forwarding, ClockSkewing, Data aggregation, Distortion,Selective message, Flooding III. RELATED WORK Majid Meghdadiet.al. (2011), explained the wormhole attack generally used by the attackers. The attackers created two low latency points on the network and then add the sensor node, these nodes act as malicious nodes that access the information of the different nodes. A malicious sensor node that can communicate with all other sensor nodes within its range poses a thread to the functional efficiency of the data collected in the network called internal attack. The paper explained the sinkhole attack, this attack targets a specific source node, and it may affect the availability of the victim node. In a sinkhole attack, the intruder usually attracts the network traffic by advertising itself as having the shortest path to the base station. Packet-relay-based ISSN: 2278 7798 All Rights Reserved 2014 IJSETR 3483

wormhole attacks can be launched by one or more malicious nodes. A malicious node relays data packets of two distant sensor nodes to convince them that they are neighbors. Weichao Wang, Aidong Lu (2007), proposed an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple wormhole attackers. This paper explored the development of approaches that can detect attacks on wireless networks directly based on their impacts on the network topology. The proposed approach will use the measurement results to build the distance matrix among the wireless nodes and reconstruct the network topology using incremental Multidimensional scaling (MDS). A normalized wormhole indicator value will be calculated for every node to identify those suspicious areas under wormhole attack Ismail Hababeh et.al. (2010), described that Wormhole attack distorts the network topology and decrease the network systems performance. They worked on Ad Hoc network and described the risks of wormhole attacks. The wormhole attack could be divided into three categories, namely, hardware attacks, broken protocol wormhole attack and malicious protocol. In hardware based attacks, the attacker can use out-of-band channel, or use higher transmitting power to make a wormhole in network. In broken protocol based wormhole attacks, the malicious nodes don t follow the requirements of specific protocols during data transmission. In the malicious protocol attacks, the adversary may use its own protocol to change the data packets during transmitting. The most typical wormhole attack of this type is encapsulation where a nasty node is located somewhere in the network and heard a routing request. Generally, normal wormhole attack, the adversary attempts to convince other network nodes that there exists a path between two locations, but in fact there is no path between the nodes. key (certificate-based) approaches use private keys to authenticate each station s identity. This paper suggested that Public-key-based approaches are extremely flexible and use certificates to verify station identities. IV. PROPOSED SCENARIO The proposed scenario is depicted in Fig. 2. The source node transmitsbroadcast UDP traffic. This ensures that its packets aretransmitted back-to-back and that the source node does not waitfor any ACK messages. The used routing mechanism is a byzantine node that transmitsthe messages on the local active nodes as assumed in the practical layout. We have measured a maximum link bandwidth of about 1 MB/s. This bandwidthcan be achieved in both directions of a link almost independently of the data transfer inthe other direction. Unauthorize Authorized Fig2. Proposed Scenario V. RESULT DISCUSSION Steve Glass et.al. (2008), WMN is distinct from manets in that it uses multiple radios and relies on a high-speed back-haul network. A secure MAC layer is responsible for ensuring that a mesh network carries traffic only for authorized stations, thus preventing attacks by unauthorized ones. Two keys used to prevent the attacks like Preshared key (PSK) and Public key (certificate-based). Pre-shared key (PSK) approaches use passphrases or other key material provided to each station in advance. Public I. Delay: Rises of delay de-accelerates the performances of the networks. In the Byzantine attack the delay depends on the packet delivery ratio if the delivery ratio is slow that means delay absolutely increases that why the performance of the network degrades, because more number of packets falls on the network. In the figure 4, the byzantine attack discovered by the proposed scenario by electing leader node and shared the key among ISSN: 2278 7798 All Rights Reserved 2014 IJSETR 3484

communicating nodes. The delay decreases that mean the packet delivery ratio increases and more the number of packet transfers from any destination and that acknowledge the same source node. II. Throughput: The Throughput calculates the total number of packets sent to the source machine and receives by the destination machine. When byzantine occur then it degrades the overall performance of the network because more the number of packets dropped by the malicious node whereas the proposed work prevented the byzantine attack resultant achievable throughput are high then byzantine attack. Fig3: Delay of Byzantine Attack Fig5: Throughput of Byzantine Attack Fig4: Proposed Delay Fig6: Proposed Throughput ISSN: 2278 7798 All Rights Reserved 2014 IJSETR 3485

VI. CONCLUSION We have analyzed from this paper that byzantine attack breaches the security and access useful information from the wireless networks. The wireless network was any Ad-hoc network that attach to wireless nodes and handset. The IEEE 802.11 MAC based standard imported on the scenario, we add malicious node on the authenticate network that access the information. When the malicious node access the information via virtual connection then it forms Byzantine Attack. This paper presents the prevention method that implemented on the scenario and remove wireless vulnerabilities, security threats in the mesh based topology. The Pre-shared key technique was applying on the nodes that avoid such type of these vulnerabilities. We analyzed that when this technique by applying on the scenario, therefore it improves the throughput and minimizes the delay of the wireless mesh networks. [9] Umesh Kumar Singh, ShivlalMewada, Lokeshladdhani, Kamal Bunkar, "An Overview and Study of Security Issues &Challenges in Mobile Adhoc Networks (MANET)", IJCSIS, 2011,pp.106-111. [10] www.opnet.com [11] Parminder Singh, Comparative study between Unicast and Multicast Routing Protocols in Different Data Rates Using VANET., In: International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014,pp. 278 284. REFERENCES [1] Majid Meghdadi, SuatOzdemir,InanGuler,"A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks", IETE technical review, 2011, pp.89-102. [2] Weichao Wang, Aidong Lu, "Interactive wormhole detection and evaluation",information Visualization,2007,pp.3-17. [3]IsmailHababeh,IssaKhalil,AbdallahKhreishah,Sam irbataineh, "Performance Evaluation of Wormhole Security Approaches For Ad-Hoc Networks", Journal of Computer Science,2013,pp.1626-1637. [4]Ping Yi, Yue Wu, Futai Zou, Ning Liu, "A Survey on Security in Wireless Mesh Networks",IETETechnicalReview,2010,pp.6-14. [5]Om Shree, Francis J. Ogwu, "A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks", SciRes. 2013,pp.76-83. [6]SteveGlass,MariusPortmann,VallipuramMuthukku marasamy,"securing Wireless Mesh Networks",IEEE,2008,pp.30-36. [7] www.ns2.org [8]Noureddinekettaf,hafidabouaissa,pascallorenz,"An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks, Telecommunsyst, 2008,pp.29-36. ISSN: 2278 7798 All Rights Reserved 2014 IJSETR 3486