PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Similar documents
BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

International Journal of Advance Research in Computer Science and Management Studies

Defending MANET against Blackhole Attackusing Modified AODV

A Survey on Path Weight Based routing Over Wireless Mesh Networks

Performance Analysis of Aodv Protocol under Black Hole Attack

Packet Estimation with CBDS Approach to secure MANET

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

A Survey - Energy Efficient Routing Protocols in MANET

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Trust Centric Stable Routing For Wireless Mesh Networks

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Subject: Adhoc Networks

A Review Paper on Secure Routing Technique for MANETs

Performance Evaluation of Various Routing Protocols in MANET

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Wireless Network Security Spring 2015

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Performance Analysis and Enhancement of Routing Protocol in Manet

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Wireless Network Security Spring 2016

Implementation: Detection of Blackhole Mechanism on MANET

Wireless Network Security Spring 2013

Routing Protocols in MANET: Comparative Study

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

Introduction to Mobile Ad hoc Networks (MANETs)

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

High-Throughput in Wireless Mesh Networks Using Different Routing Metrics

Preventing Wormholes in Multi-hop Wireless Mesh Networks

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

Figure 1: Ad-Hoc routing protocols.

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Webpage: Volume 4, Issue VI, June 2016 ISSN

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

Security Issues In Mobile Ad hoc Network Routing Protocols

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Chapter 7 CONCLUSION

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Reliable Metrics for Wireless Mesh Network

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

Comprehensive Study and Review Various Routing Protocols in MANET

Pseudonym Based Security Architecture for Wireless Mesh Network

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

International Journal of Advance Engineering and Research Development

Estimate the Routing Protocols for Internet of Things

A Technique for Improving Security in Mobile Ad-hoc Networks

The Novel HWN on MANET Cellular networks using QoS & QOD

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

Review of Prevention and Detection Methods of Black Hole Attack in AODV- based on Mobile Ad Hoc Network

IEEE s ESS Mesh Networking

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

3. Evaluation of Selected Tree and Mesh based Routing Protocols

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Wireless Network Security Spring 2016

CAODV Free Blackhole Attack in Ad Hoc Networks

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

A Reliable And Trusted Routing Scheme In Wireless Mesh Network

Efficient Shortest Path Routing (ESPR) Algorithm for Multicasting in Wireless Mesh Network

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Transcription:

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept. of CSE, GIT, Belgaum Email: prashanthjayakumar7@gmail.com 1, khanagoudar@yahoo.com 2, vinaykaveri24may@gmail.com 3 Abstract - Wireless Mesh Networks (WMNs) are one of the key technologies which will dominate wireless networking in the next decade. They will help to realize the long-lasting dream of network connectivity anywhere anytime with simplicity and low cost. Security, privacy and trust have been the primary concerns in pushing the success of WMNs. Also WMN are susceptible to various routing attacks. In this paper, we have provided a robust trust-aware frame work based on link quality and best path metrics to obtain optimized privacy-aware secure routing in WMNs. Keywords: Link Quality, Privacy Routing Protocol, Alternate path, Wireless Mesh Network. I. INTRODUCTION A WMN consists of a set of stationary wireless routers that form a multi-hop backbone, and a set of mobile clients that communicate via the wireless backbone. [1] Wireless mesh networks (WMNs) offers low-cost high-bandwidth community wireless services. The wireless mesh network topology developed at MIT for industrial control and sensing is a point-to-point-to-point, or peer-to-peer, system called an ad hoc multihop network [2]. A node can send and receive messages, and in a mesh network, a node also functions as a router and can relay messages for its neighbors. Through the relaying process, a packet of wireless data will find its way to its destination, passing through intermediate nodes with reliable communication links (see Figure 1). The architecture of WMNs can be classified into three types: Infrastructure/Backbone WMN In this architecture, mesh routers form an infrastructure for clients. The mesh routers form a mesh of self-configuring, self-healing links among themselves. Client WMN Client meshing provides peer-to-peer networks among client devices. In this type of architecture, client nodes constitute the actual network to perform routing. Hybrid WMN This architecture is the combination of infrastructure and client meshing. 1.1 Attacks in WMN DoS Attacks DoS(Denial of Service) attacks are commonplace in the wireless network. Guarding against DoS attacks is a critical component of any security system. In wireless mesh networks, DoS attacks are difficult to prevent and protect against. They can cause a severe degradation of network performance in terms of the achieved throughput and latency Routing Layer Attacks: These are the various DoS attacks seen in wireless networks while routing. 1) Blackhole Attack: In this attack, the malicious nodes broadcast itself as most optimal node for data forwarding. The malicious nodes then drop packets and hence deny the service. 2) Greyhole Attack: This attack is a small variation from the Blackhole attack. In opposition to the Blackhole attack, Greyhole routers (malicious nodes) do not drop all the packets jus drop selective packets. 3) Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the network, tunnels them to another point in the network in order to create a shortcut (or wormhole) in the network through use of a single long-range directional wireless link or through a direct wired link to a colluding attacker, and then replays them into the network from that point. The malicious node can use this position to maliciously drop packets in order to deny the services in the WMN. 4) Jellyfish attack: It is done by complying protocols for packet dropping in malicious way to deny the services II. RELATED WORK Figure 1: wireless Mesh Network Recently, different approaches have been suggested for designing privacy-protection routing protocols and establishing trust relationship in WMNs. Sen [4] presented an efficient and reliable routing protocol that also provides user anonymity in 12

WMNs. In the proposed routing protocol, the user privacy is protected by using a novel anonymized authentication protocol. However, it cannot defend against inside attacks, in which two malicious nodes advertise in such a way as if they have a very reliable link between them. Khan et al. proposed SRPM, an improvement of AODV for an infrastructure based WMNs. In SRPM, to ensure security, it keeps the information of two-hop neighbors unlike to AODV, which keeps one-hop information in the routing table. To further increase the security level, it introduces a new routing metric, which is capable of searching the shortest secure path by computing unreliability value of the neighbors. Li proposed SAODV, a secure version of classic AODV for WMNs. SAODV uses hash chain to secure the hop count in the routing packets, while digital signature is used to secure the rest of the routing message. Although SAODV can secure the routing messages, it does not guarantee either authentication or integrity of the subsequent data packets after route has been established. Andreas Noack Horst Görtz Institute for IT, Security Establishing a trust relationship in wireless mesh networks (WMN) is an open question to date. In MANETs and cable bound meshed networks (like the Internet) there are a lot of proposals and solutions for trust establishment and for authentication. In this paper we propose a trust agreement scheme that is particularly adapted to WMN. III. PROPOSED SOLUTIONS A novel dynamic reputation mechanism Subject Logic and Uncertainty Based Dynamic Reputation Mechanism (SLUDR) is proposed to protect WMNs from internal attacks, preserve the privacy information, and promote a secure and reliable collaboration relationship among participants. The proposed mechanism incorporates uncertainty based on subjective logic in association with the reputation computing. In order to differentiate intentional packet drop from packet drop due to poor link quality, we integrate link quality into the proposed scheme based on subjective logic. The wireless links can have intermediate loss ratios due to their surroundings and inter-flow interference. Link quality is measured by probability of successfully transmitting a packet over a wireless link. A novel role and Privacy-Aware Based Multi-Level Security Mechanism (PRA-MLS) is proposed. The PRA-MLS combines the extended RBAC model with multi-level security Mechanism to provide support for privacy protection. As shown in Figure 2, the PRA-MLS is divided into two parts, users assign (UA) and permissions assign (PA). The UA is in charge of the assignment from users to roles by the calculation of the users static trust. The PA is in charge of the assignment from roles to permissions by the calculation of dynamic trust to determine whether the permission is assigned to the role finally. Moreover, the PRA-MLS introduces role hierarchies (RH) and permission hierarchies (PH) which can effectively reduce the total number of permission assignments, thus reducing the cost of permission administration. In PRA-MLS, with the complex structure of privacy permissions using RH and PH, a privacy aware permission explicitly states the intended purpose, along with the conditions under which the permission can be given, and the obligations that are to be finally performed if permission is granted. Figure 2: Architecture of PRA-MLS Role Based Privacy-Aware Secure Routing Protocol Rpasrp is proposed to improve the security and privacy performance. A. Route Discovery In RPASRP, the source node triggers the route discovery phase by constructing a route discovery message PREQ labeled with security level j which indicates the security requirements on the requested route and then broadcast it to its neighbors. B. Link Security Authentication With the PRA-MLS and the SLUDR, RPASRP is able to send packets with various sensitivities via paths that implement corresponding security guarantees [8]. However, in order to enforce the protocol working as designed and protect the network against certain vulnerabilities, the link security mechanism is also needed. IV. DESIGN AND METHODOLOGY 13

The above flowchart is used to find the best path to send the packets from source to destination, based on the parameters free buffers, SNR, distance and available nodes. V. IMPLEMENTATION Algorithm: Here we are selecting any multimedia file (.yuv) and we are sending a file of about 30 frames of size 144*176. which is 10MB. Step 1: Network Initialization (N * N). Step 2: Node Configuration consists of matrix (Free buffers, Energy Buffers, Available Nodes, SNR). Step 3: Link quality is calculated using formula LQ=sqrt(F 2 +E 2 +D 2 ) Where F-Free buffers E-Energy buffers D-Distance Step 4: Matrix can be reduced based on the transmission distance with threshold of 50m. Step 5: Neighboring nodes is selected based on forward neighboring nodes (N 2 * N) and all the surrounding nodes (N 2 * 8). Step 6: All paths will be available based on the calculation of link quality. Step 7: Based on link quality, available nodes and distance, find the valid path. Step 8: sort them in order and find the best path. Step 9: Select the best path and send the packet. VI. TEST RUNS Based on above explained algorithm we can expect some of the following results. Figure 5 By calculating the link quality, we will find the path available to send the packet, in above figure nodes (16,22,23,24,25) is best path to send the packet from source to sink(destination). Malicious Node Scenario Fig 6: Alternate path In some cases, attacks may occur while sending the packets this can be solved using forward neighbor nodes or all the surrounding nodes as explained in the above algorithm. In the above figure attack has been occurred at node 24, based on the algorithm we are selecting the surrounding available nodes, based on node parameters we are finding alternate path. VII. DISCUSSIONS: Figure 3 Above result is obtained by giving an input as N*N, where N-No of nodes, in above figure N=5 Network Parameters: Table I Figure 4 14

Node Configuration: Table II Packet Configuration: Table III Quality=231.279356 Link When an attack occurs within the established network, alternate path can be obtained in this manner. Following figure represents the valid paths and link quality to send packets from source to destination 15 Figure 7: Throughput of image

CONCLUSIONS Figure 8: Number of Packets Loss In this paper we have developed a simulation test bed in MATLAB to study the privacy and trust-aware framework to obtain optimized secure routing in wireless mesh networks. This approach which takes into account four impact factors: the link quality, the best path, the alternate path and neighborhood information to forward the packets in presence of security attacks. Simulation results show a decreased number of Packet Loss and End to End Delay with increase in network sizes. Also the Packet Delivery Ratio and Packet Arrival rate are almost consistent. FUTURE WORK The above experiment can be carried out for network topologies formed by random distribution of nodes and observe the Packet Loss, Throughput, End to End Delay, Packet Delivery Ratio etc. REFERENCES Figure 9: End to End Delay Fig 10: Packet Delivery Ratio Vs Packet Arrival Rate [1]Jing Dong, Reza Curtmola and Cristina Nita Rotaru, Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, 2008. [2]. Jing Dong, Kurt Ackermann and Cristina Nita-Rotaru Secure group communication in wireless mesh networks, Elsevier, AdHoc Networks, 2009. [3]. Ian F.Akyildiz and Xudong Wang, A Survey on Wireless Mesh Network, IEEE Radio Communication, 2005. [4]. Sen J. An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. International Journal Scalable Computing: Practice and Experience, 2011, 11(4): 345 358. [5]. Khan, S., Loo, K. K., Mast, N., Naeem, T.. SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management, 2010; 18(2): 190 209. [6]. C. Li, Z. Wang, C. Yang. Secure routing for wireless mesh networks. International Journal of Network Security, 2011, 12(3): 50 361. [7]. Hui Lin, Jia Hu, Atulya Nagar and Li Xu, Role Based Privacy-Aware Secure Routing in WMNs,IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012. [8]. Islam, M.S., Yoon, Y.J., Hamid, M.A., Hong, C.S.. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. ICCSA 2008; 5072, pp. 972 985. 16