Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Similar documents
Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

Securing Data Packets from Vampire Attacks in Wireless Ad-hoc Sensor Network.

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Technology, Andheri (w), Mumbai, India. 2 Assistant Professor, Department of Electronic & Telecommunication, Rajiv Gandhi Institute of

Defending against Energy Draining attack in Wireless Ad-Hoc Sensor Networks

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Mitigation of Vampire Attack in Wireless Ad-hoc Sensor Network

Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Vampire Attacks: Detection And Prevention

Synchronization and Time Slot-Based Method for Vampire Attacks Detection in Wireless Sensor Networks

Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks

VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKS

Energy Efficient Paradigm for Multiple Localized Routing In Wireless Ad Hoc Sensor Networks

Detection of Vampire Attack in Wireless Adhoc

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS: EVALUATION AND PROTECTION

Overcoming Vampire attacks and fault node recovery in Wireless Ad-hoc Sensor Networks

Detection and Removal of Vampire Attack in Wireless Sensor Network

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

On Demand secure routing protocol resilient to Byzantine failures

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks using AODV Protocol

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

Subject: Adhoc Networks

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

Part I. Wireless Communication

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

Time Synchronization in Wireless Sensor Networks: CCTS

Performance Evaluation of Various Routing Protocols in MANET

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Catching BlackHole Attacks in Wireless Sensor Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Packet Estimation with CBDS Approach to secure MANET

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

UNIT 1 Questions & Solutions

MANET ROUTING ATTACKS

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Defending MANET against Blackhole Attackusing Modified AODV

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

Security Issues In Mobile Ad hoc Network Routing Protocols

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CAODV Free Blackhole Attack in Ad Hoc Networks

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Fig. 2: Architecture of sensor node

Routing protocols in WSN

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

Selective Forwarding Attacks Detection in WSNs

Figure 1. Clustering in MANET.

Sleep Scheduling Technique for Geographic Routing in MANET

Key establishment in sensor networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Wormhole Attack in Wireless Ad-Hoc Networks

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Mobile Data Gathering With Load Balanced Clustering and Dual Data Uploading In Wireless Sensor Networks

Performance Analysis of MANET Routing Protocols OLSR and AODV

Event Driven Routing Protocols For Wireless Sensor Networks

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Transcription:

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks Vidya.M Department of Computer Science and Engineering, Atria Institute of Technology, Bangalore, India Vidya.M1389@gmail.com Reshmi.S Department of Computer Science and Engineering, Atria Institute of Technology, Bangalore, India Reshmi101@yahoo.com Abstract Ad hoc low-power wireless networks are an astonishing research direction in suspecting and ubiquitous computing. Preceding security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This project explores resource exhausting attacks at the routing protocol layer, which disable networks permanently by quickly draining node s battery power. These attacks are not protocol specific, but rather rely on the class properties of routing protocols. Here we find that all examined protocols are vulnerable to Vampire attacks are easy to carry out using as few as one malicious node inside sending only protocol-compliant messages. So they are difficult to detect. Here we discuss methods to alleviate these types of attacks, including a new concept protocol assured with proofs that provably bounds the damage caused by vampire attacks on nodes during packet forwarding phase. Keywords Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks. I. INTRODUCTION AD hoc wireless sensor networks (WSNs) promise exciting new applications in the near future, such as continuous connectivity, ubiquitous on-demand computing power and deployable communication required instantly for first responders and military purposes. These networks already monitor factory performance, environmental conditions to name a few applications [1]. Due to their organization, these networks are particularly vulnerable to denial of service (DoS) attacks research work has been done to enhance survivability. Here, we consider how routing protocols though designed to be secure, lack protection from these vampire attacks which deplete life from these networks. Fig. 1 Wireless Sensor Networks (WSNs). There are three primary contributions in the paper. First, we evaluate the vulnerabilities of existing protocols thoroughly to routing layer battery depletion attacks. Second we observe that security measures to prevent these depletion attacks are orthogonal to those which are used to protect existing secure routing protocols, and its infrastructure [1].These wireless sensor networks (fig.1) offer certain enhancements and capabilities to assist in the national effort to increase alertness to potential terrorist threats as well as operational efficiency in civilian applications. Wireless ad hoc sensor networks are classifies mainly two types whether the data in the network is aggregated and whether or not the nodes are individually addressable. A. Attacks Focused Here we mainly focus on these attacks which are two types that are used for Denial of Service Communication. B Carousel Attack In this carousel attack (fig.2), a malicious node sends a packet with a composed route which as a series of loops, so that the same node would appear in the route for many times [1]. Fig. 2 shows the carousel attack same node appears in the route many times. 2014, IJIRAE All Rights Reserved Page - 1

In this carousel attack (Fig.2), a malicious node sends a packet with a composed route which as a series of loops, so that the same node would appear in the route for many times [1]. This strategy is mainly used to increase the length of the route which is beyond the total number of nodes in the existing network, only limited by the number of entries which is allowed in the source route [5]. Example for this type of route is given in Fig.2 the thin shows the malicious path and thick path shows the honest path. C. Stretch Attack Another such attack in the same way is the stretch attack, where a malicious node in network constructs artificially long routes from source, which cause packets to traverse larger than optimal number of nodes [5]. In the example given below (Fig.3) honest path is shown with thick lines and adversary or malicious path with thin lines. Thus malicious path take a long distant then the honest path by making more consumption of energy. Fig. 3 shows stretch attack where malicious path takes the longest route. In contrast to other attacks this attack shows more uniform energy consumption for all the nodes in the existing network, as it increase the length of the route, by causing more number of nodes to process the packet in the network. While vampire attacks make network-wide energy usage significantly as individual nodes are also affected noticeably till destination. Thus long routes will lose almost 10 percent of their total energy reserve per message. II. RELATED WORK Existing research work on secure routing protocols attempts to ensure that malicious nodes cannot cause path discovery to return an invalid network path as these nodes do not alter discovered paths but, by using existing valid paths in the network and protocol compliant messages. These adversaries mainly have limited power to affect forwarding of packets in network, making these protocols resistant to these vampire attacks. By the use of directional antenna they can consume more energy by restarting packet in various parts of the network. Other such attack is spurious route discovery where each node will forward route discovery packets which means by sending a message it is possible to cause flood attack in network. A. Drawbacks of the existing system 1) Adversaries have limited power. 2) Security level is low. 3) Lost productivity. 4) Various DOS attacks. 5) Spurious route discovery. III. PROPOSED SYSTEM Nodes mainly identify by their neighbours by considering the most significant bit and they construct a tree by considering all relationships among neighbours and finally it forms a group which will be used for routing and addressing. It mainly uses No-backtracking property which it is satisfied by a given packet if and only if it makes progress towards destination in the existing network space. A. Advantages of the proposed system 1) Highly secured authentication. 2) High efficiency. 3) No flooding. 4) Timely delivery of packets. IV. RESULT ANALYSIS The relationship between different components of system is shown by architecture diagram (Fig.4). This diagram gives entire analysis on concept of the system. Here each node independent of taking decisions and they identify neighbour node in the existing network. When a local broadcast message is received by the node it identifies the nearest node and forwards it to the nearest neighbour node. 2014, IJIRAE All Rights Reserved Page - 2

Here a tree is formed by identifying the nearest neighbour nodes in the existing network.once tree is formed the packet is forwarded by identifying shortest path among the tree which is formed by using no-backtracking property. A. Finding Neighbours Fig. 4 Architecture Diagram. Fig. 5 Group Identification. This module (Fig.5) is mainly used to identify the nearest neighbour node within the network. When a local broadcast message is transmitted it forwards a message to its neighbour node in the network. The neighbour node on receiving this broadcast message sends an acknowledgement to the sender node and from this acknowledgement message the sender node identifies the neighbour node. Only the neighbour nodes are involved in transmitting the message. Discovery of nodes begins with a time-limited period during which every node must announce its presence by broadcasting a certificate of identity, including its public key, signed by a trusted offline authority. Each node starts as its own group of size one, with a virtual address 0. B. Transmission History This module maintains a record of previous packet transmission done by each node in the network. This record mainly consists of the hop count of previous route and it keeps on updating this history through which attack immunity of our system can be improved. C. Packet Forwarding This module is used to transmit packet to nodes using the above formed tree structure (Fig.6). Here each node has independent route constructed from the tree structure and it also checks for the condition to match No Backtracking property or else it leads to an attack (Fig.7) (Fig.8). During the forwarding phase, all decisions are made independently by each node. When receiving a packet, a node determines the next hop by finding the most significant bit of its address that differs from the message originator s address. Thus every forwarding event shortens the logical distance to the destination, since node addresses should be strictly closer to the destination. 2014, IJIRAE All Rights Reserved Page - 3

Fig. 6 Message Traversal in normal direction. Fig. 7 Vampire Attack will lead to message drop. Fig. 8 After N trials node N3 sends data to cluster head (Chosen based on highest coverage range) which sends data to sink. D. PLGP satisfies No-Backtracking The PLGP protocol is modified as clean state secure routing protocol such that they can resist vampire attacks during the forwarding. PLGP was vulnerable to vampire attacks even though they were said to be secured [5]. When the route discovery begins each node has a limited view about the network. As already said nodes discover the other nodes in a group by broadcasting a certificate id, signed by the public key of the online authority, thus forming a single group and a tree structure that will be used for addressing and routing [8]. PLGP protocol used for validation of packets in tree is as follows: No-Backtracking Property 1. Function secure _ forward _address(p); 2. S extract _ source _address(p); 3. A extract_ attestation(p); 4. if(not verify _source _sign(p)) or 5. (empty(a) and not is _neighbor(s)) or 6. (not saowf _verify(a)) then 7. return ; /*drop(p)*/ 8. For each node in a do 9. Prevnode node; 10. if(not are _ neighbors (node,prevnode )) or 11. (not making _progress(prevnode,node)) then 12. return ; /*drop(p)*/ 13. c closest _ next _node(s); 14. p saowf _append(p); 15. if is _neighbor(c) then forward(p,c); 16. else forward(p,next _hop _ to _ non _neighbor(c)); 2014, IJIRAE All Rights Reserved Page - 4

V. CONCLUSION I have dedicated large part of my phases to explain Vampire Attacks, a new class of resource consumption attacks that use routing protocols to permanently disable ad-hoc wireless sensor networks by depleting node s battery power. These vampire attacks are not protocol specific but rather expose their vulnerabilities to classes of protocols. Here I have explained about PLGP protocol which is mainly based on No-Backtracking property for depletion of vampire attacks. REFERENCES [1] Eugene.Y.Vasserman, Nicholas Hopper, Vampire Attacks Draining Life from Ad hoc wireless sensor networks, IEEE volume 2 (2014). [2] Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004. [3] The network simulator ns-2. http://www.isi.edu/nsnam/ns/. [4] John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003. [5] Daniel Bernstein and Peter Schwabe, New AES software speed records, INDOCRYPT, 2008. [6] Daniel J.Bernstein,Synookies,1996.http://cr.yp.to/syncookies.html. [7] I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic curves in cryptography, Vol. 265, Cambridge University Press, 1999. [8] J.W.Bos, Dag Arne Osvik, and Deian Stefan, Fast implementations of AES on various platforms, 2009. [9] Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003), no. 10. 2014, IJIRAE All Rights Reserved Page - 5