Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Similar documents
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

A Light Weight Payment Report Scheme for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS

IN multihop wireless networks (MWNs), the traffic originated

Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

Trust Centric Stable Routing For Wireless Mesh Networks

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

2015, IJARCSSE All Rights Reserved Page 133

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Packet Estimation with CBDS Approach to secure MANET

Cooperation and Accounting Strategy for Multi-hop Cellular Networks

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Malicious Node Detection in MANET

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

An Efficient and Secured way of Routing in Hybrid WSN

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network

SMTCI: Secure Multi-Trial Trust Evaluation and Cost- Effective Incentive Mechanism for Multi-Hop Cellular Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

AN AD HOC NETWORK is a group of nodes without requiring

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

The Novel HWN on MANET Cellular networks using QoS & QOD

Implementation: Detection of Blackhole Mechanism on MANET

Prevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Mitigating Malicious Activities by Providing New Acknowledgment Approach

An Algorithm for Dynamic SDN Controller in Data Centre Networks

Defending MANET against Blackhole Attackusing Modified AODV

High Throughput in MANET Using relay algorithm and rebroadcast probability

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

Enhancing Security in MANET Using CCRVC Scheme

LIP: A Light-weighted Session-based Incentive Protocol for Multi-hop Cellular Networks

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

Comparison of Incentive-based Cooperation Strategies for Hybrid Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Performance Improvement of Wireless Network Using Modern Simulation Tools

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

A Secure Routing Protocol for Wireless Adhoc Network Creation

SELFISH ATTACKS DETECTION IN COGITIVE RADIO NETWORKS USING CRV TECHNIQUE

A Robust Trust Aware Secure Intrusion Detection for MANETs

Figure 1. Clustering in MANET.

Integration of Co Operation Incentives in Mobile Ad Hoc Network

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

Cluster based certificate revocation For mobile ad hoc networks

Cooperation in Mobile Ad Hoc Networks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Implementation of Enhanced Certificate Revocation of Malicious Nodes in Mobile Adhoc Network

Hybrid Cryptography Technique For Mobile Ad-hoc Network

Efficient Certificate Revocation with Vindication Capability for Mobile Ad-Hoc Networks

Enhancing Security in MANET using Integral Component Cluster-Based Certificate Revocation with Vindication Capability

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Catching BlackHole Attacks in Wireless Sensor Networks

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Routing Protocols in MANET: Comparative Study

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

ENHANCING SECURITY IN MOBILE AD HOC NETWORKS USING CLUSTER BASED CERTIFICATE REVOCATION

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

A Comparison of Routing Protocols for MANET using NS-2 Simulator

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Chapter 7 CONCLUSION

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Efficient Message Caching Scheme for MANET

Improving the Efficiency of MANET by Reducing Routing overhead using a NCPR protocol

An incentive based approach to detect selfish nodes in Mobile P2P network

Detection of Vampire Attack in Wireless Adhoc

A Survey on Finding Selfish Nodes in Mobile Ad Hoc Networks

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Transcription:

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college, Tirunelveli, TamilNadu, India. Abstract - Ensuring trustworthiness and security in multi hop wireless networks is to improve throughput, efficiency, and packet delivery ratio and it also reduce delay in a secure manner. In this scheme, all the mobile nodes share the master key value with their neighbors and submit trust value information to the accounting center which is based on their energy level, battery power, and how efficiently they relay other node s packet and these values are used to select the path from source to destination. The communication between source and destination is initialized using route-request and route-reply packets through trust based routing protocol. The data packets are sent through only highly trusted nodes. The authentication process is handled by accounting center. The destination prepares symmetric key from its master key and compares it with the symmetric key that was composed from source s master key for authentication purpose. The trusted values will be updated frequently and sent to accounting center through base station for further processing. Index terms - accounting center, payment reports, trust based routing protocol, trust values. I. INTRODUCTION A multihop wireless network is a communication network in which communication takes place through multiple routes from source to destination and also it takes multiple hops for the data to travel from end to end. Multihop wireless network is used in secure transmission because it can be deployed at low cost and it can be extended to a large extent. Multihop Wireless network is considered as hopeful network as it supports applications such as data sharing, multimedia transmission, and transaction purposes. In this type of network, some nodes are independent and self-interested called as egotistic nodes which do not relay other s packet because in order to save their own resources. Instead they make use of other altruistic nodes to relay their own packets. Altruistic nodes are those which spend its own resources to relay other s packets. Resources can be bandwidth, energy level, battery power, etc. Egoistic nodes are of two types, one is rational node in which they are brought under the control of malicious node and motivated to misbehave. Second is irrational node in which they misbehave intentionally. This action totally degrades the performance, packet delivery ratio and increases delay in data transmission of multihop wireless networks. In [1] the reports are sent to the trusted party and evidences are stored in order to resolve the disputes. The classifier in the trusted party classifies them into fair and cheating reports. And evict the cheating nodes by verifying the inconsistencies of the report submission. Hence we develop a scheme to make these selfish nodes to cooperate and information is sent only through highly protected nodes and data is transmitted using trust based routing protocol. The source sends its data packet to its neighbor only when it finds that node to be trusted. The trusted values can be investigated at the accounting center as they are stored in accounting center and communication between accounting center and nodes are done by using base station. II. RELATED WORKS The existing payment schemes are tamper-proofdevice based and Receipt-based schemes. In tamper-proof device based scheme, tamper proof device is installed in each node to store and manage its credit account. The Selfgenerated packets forwarded by a node are passed to the TPD to decrease and increase the node s credit account. For receiptbased payment schemes, an offline central unit called ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 1186

accounting center stores and manages node s credit account. Here, proofs of relaying packets are called as receipts which are submitted to the accounting center. The receipts which are submitted to AC are large in size because they carry security proofs to secure the payment which significantly consumes the node s resources and available bandwidth in submitting them. The existing credit card payment schemes are infeasible for MWNs and it involves complexity in communication and processing overhead. In tamper-proof device based scheme, tamper proof cannot be guaranteed because the nodes are autonomous and the nodes cannot communicate if they do not have sufficient credits during communication system. The Receipt-based scheme imposes more overhead because the receipt size is large and large cryptographic operations are applied on receipts to verify them. It suffers from false accusation and missed detection. It is more vulnerable to collusion attacks. It takes long time to identify the cheaters. In [1] RACE: In report based payment scheme, the mobile nodes submit light weight payment reports to the accounting center. The accounting center identifies the cheating reports by the inconsistent submission of cheating nodes and requests evidence only when the accounting center needs. By processing the evidences, the accounting center smartly evicts the cheating node from the path and secure data transmission is carried on. processing the payment receipts overhearing technique. III.SYSTEM MODEL instead of using the medium This scheme has four phases, the initialization phase in where the mobile nodes are created which are suitable for data transmission, and able to move anywhere in the networking environment. They exchange topology discovery packets and master key value with their neighbours and submit trust values to the accounting centre through base station. In route establishment phase, the sender sends the route request to all its neighbours. The route reply packet is sent from receiver to sender through the same path. In [2] Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System, Cheating detection system (CDS) to secure the payment and can identify the cheating nodes effectively under different cheating strategies.it uses statistical methods to identify the cheating nodes that submit incorrect reports. In [3] FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks, node cooperation is encouraged to promote fairness. The mechanism applies a fair charging policy by charging the source and destination nodes when both of them benefit from the communication. Large number of public-key- cryptography operations are used. In [4] ESIP, Secure Incentive Protocolol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks, a secure cooperation incentive protocol is that which uses the public-key operations only for the first packet in a series and it uses the lightweight hashing operations in the next packets. It has large receipt size. In [5] An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks, a novel monitoring technique to measure the nodes frequency of dropping packets based on Fig.1. SYSTEM ARCHITECTURE In data transmission phase, the node transmits data to its neighbour i.e. the node in the established path only when the trust value is high. Otherwisee the trust values are reported to base station as low. Then the data transmission is done through the secure trusted path. In updation of trust values phase, the trust values of the node participated in the data transmission are submitted to the accounting centre because their values will be increased or decreased due to their participation in data transmission. ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 1187

A. Initialization phase: IV. PROPOSED SCHEME In initialization phase is where the mobile nodes are created which are suitable for data transmission, and able to move anywhere in the networking environment. The base station and accounting centre are assigned. The communication between the mobile nodes and accounting centre is done by using base station. The mobile nodes exchange topology discovery packets in order to discover the topology and master key value with their neighbours for the purpose of authentication. And submit trust values to the accounting centre through base station. B. Route Establishment phase. Fig 2. Reduction in Average delay The average delay time of proposed scheme has been reduced when compared to existing scheme. In route establishment phase, the sender sends the route request packet to all its neighbours. The packets are then forwarded to their own neighbours and finally to destination. Then the destination replies with the route reply packet through the same shortest path. The route between source to destination is thus established. C. Data transmission phase. In this phase, the sender checks the trust values of its neighbour in the established path. The trust value can be known by contacting accounting centre. When checking the trust value, if it founds to be high, then the sender sends the data to its neighbour. Otherwise, data will be failed to send and trust values will be updated to the accounting centre. Likewise, the neighbour checks the trust value for its neighbour i.e. is the next node in the established path and it forwards the data to it. Then finally the data reaches the destination. Fig 3. Performance measure. The performance of the proposed scheme has been highly increased when compared to the existing scheme. D. Trust Value updation phase. In updation of trust values phase, the trust values of the node participated in the data transmission are submitted to the accounting centre because their values will be increased or decreased due to their participation in data transmission. V. RESULTS The system performance by using this scheme is calculated. The parameters are throughput, delay, and packet delivery ratio. The measure clearly describes that the performance shows better results than the other schemes. Fig 4. Increase in packet delivery ratio ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 1188

The packet delivery ratio of the proposed scheme has been highly improved when compared to the existing system. VI.CONCLUSION Thus, the scheme is used in multihop wireless networks to improve throughput, efficiency, packet delivery ratio and reduce delay in a secure manner. All the mobile nodes share the master key value with their neighbors and submit trust value information to the accounting center which is based on their energy level, battery power, and how efficiently they relay other node s packet and these values are used to select the path from source to destination. Thus, high level of security and trustworthiness is ensured because the nodes transmit data only when the neighbor node founds to be trusted. ACKNOWLEDGMENT First of all we thank the almighty for giving us the knowledge and courage to complete the research work successfully. We express our gratitude to all our well wisher who really motivates us in publishing this paper. [10] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, Node Cooperation in Hybrid Ad Hoc Networks, IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006. AUTHOR(S) PROFILE Ms. S. Nandhini is presently studying M.E. Second year Network Engineering in Francis Xavier Engineering College, Tirunelveli. She has completed her B.Tech Information technology from J.J College of Engineering and Technology, Trichy. She is an member of Computer Society of India. Her field of Interests are Networking, Mobile computing. Mr. S. Franson Varun Richo is presently working as an Assistant Professor, Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli. He completed his B.E. Computer science and engineeringg from Karunya University, Coimbatore and his M.E Computer science and engineeringg from satyabama university, Chennai. His area of interests are Networking and Mobile computing. REFERENCES [1] A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Mohamed M.E.A. Mahmoud and Xuemin (Sherman) Shen, Fellow, IEEE, vol. 24 No. 2, February 2013. [2] M. Mahmoud and X. Shen, Stimulating Cooperation in Multihop Wireless Networks Using Cheating Detection System, Proc. IEEE INFOCOM 10, Mar. 2010. [3] M. Mahmoud and X. Shen FESCIM: Fair, Efficient, and Secure [4] M. Mahmoud and X. Shen, ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks, IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011. [5] M. Mahmoud and X. Shen FESCIM: Fair, Efficient, and Secure [6] S.Zhong, J. Chen, and R. Yang, Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks, Proc. IEEEE INFOCOM 03, vol. 3, pp. 1987-1997, Mar./Apr. 2003. [7] M. Mahmoud and X. Shen, PIS: A Practical Incentive System for Multi-Hop Wireless Networks, IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010 [8] M. Mahmoud and X. Shen FESCIM: Fair, Efficient, and Secure [9] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, SMART: A Secure Multilayer Credit Based Incentive Scheme for Delay-Tolerant Networks, IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp.. 4628-4639, Oct. 2009. ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 1189

ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 1190