Total views : 385

Exploration of Security Threat Analysis in Wireless Mobile Adhoc Network

Affiliations

  • Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan University, Bhubaneswar - 751030, Odisha, India
  • Department of Computer Science and Engineering and IT, V. S. S. U. T, Burla - 768018, Odisha, India
  • Department of Computer Science and Engineering IGIT Sarang, Dhenkanal - 759146, Odisha, India

Abstract


Objective: Mobile Adhoc Networks (MANETs) due to its principle characteristics of network infrastructure, limited resources and transmission range are more vulnerable to multitude of attacks. The objective is to classify the attacks and its counter measures to detect and eliminate malicious nodes. Methods/Analysis: Each attack has been analyzed briefly based on its own characteristics and behavior. Also, the defeating methodologies against network attacks have been described and evaluated as a part of the measurements. We have also proposed an Algorithm to study and analyze networks on affected conditions. We presented analytics and classification of the attacks on the different layers of the network. Findings: On attacked situation in network there will be no data available as the characteristics of the network are unknown. We need to simulate such types of conditions in the network. The performance of the network gets degraded at the time of attack. It was observed that the impact of attack depends on the proximity of the attacker to the source node, it is severe when close and least when far from the source. Each malicious node uses network feature (Distributed Network, Non-centralized, Hop-by-Hop communications, Open network boundary or Wireless media) to break the security. The goal is to violate security service (Availability, Data Confidentiality and Integrity). In our algorithm, we showcased the normalization of the data set such that we get the maximum and minimum values for the classification of the network. The primary groups of data types for classification are: Delay, bandwidth utilization, and drop rate and packet type). There are some secondary classification like conjunction, status of process, running services and utilization of processor. The condition of system was presented as a vector by storing the normalized values in an array. We arrived at simulating a network in attacked situations. Applications/Improvements: The work can be extended to find ways to calculate the threshold effectively. Group attacks can be studied and derive the relationship between the average detection delay and the mobility of the nodes.

Keywords

Attack, Affected Condition, Detect and Eliminate Malicious Nodes, MANET, Security Parameter, Threat.

Full Text:

 |  (PDF views: 250)

References


  • Sahoo AJ, Akhtar MAK. Possibility and necessity measures to enhance reliability and cooperation in MANETS. Indian Journal of Science and Technology. 2014 Jan; 7(3). DOI: 10.17485/ijst/2014/v7i3/47650.
  • Murthy CSR, Manoj BS. Ad hoc wireless networks: Architectures and protocols. New Jersey, USA: Prentice Hall PTR; 2004.
  • Nichols RK, Lekkas PC. Wireless security models, threats, and solutions. USA: McGraw–Hill; 2002.
  • Amudhavel J, Brindha V. A survey on intrusion detection system: State of the art review. Indian Journal of Science and Technology. 2016 Mar; 9(11). DOI: 10.17485/ijst/2016/v9i11/89264.
  • Stamouli L, Argyroudis PG, Tewari H. Real-time intrusion detection for ad hoc networks. 6th International Symposium on World of Mobile and Multimedia Networks; 2003. p. 374–80.
  • Thangaraj SJJ, Rengarajan A. Unreliable node detection by elliptical curve diffe-hellman algorithm in MANET. Indian Journal of Science and Technology. 2016 May; 9(19). DOI: 10.17485/ijst/2016/v9i19/86081.
  • Hu Y-C, Perrig A, Johnson DB. Ariadne: A secure on demand routing protocol for ad hoc networks. In 8th ACM International Conference on Mobile Computing and Networking (Mobicom’ 2002); 2002.
  • Stajano F, Anderson R. The resurrecting duckling: Security issues for ad-hoc wireless networks. 7th International Workshop Proceedings, Security Protocols; 1999. p. 1–11.
  • Hubaux J-P, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks. Proc of the 2nd ACM International Symposium on Mobile Ad hoc Networking and Computing; 2001. p. 146–55.
  • Kong J, Hong X, Gerla M. A new set of passive routing attacks in mobile ad hoc networks. IEEE MILCOM Military Communications Conference, MILCOM’03; 2003. p. 796–801.
  • Yau P-W, Mitchell CJ. Security vulnerabilities in ad hoc networks. In Proc of the 7th Int Symp on Communications Theory and Applications; 2003. p. 99–104.
  • Buchegger S, Tissieres C, Le Boudec J-Y. A test-bed for misbehaviour detection in mobile ad-hoc networks- How much can watchdogs really do? 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ’04); 2004. p. 102–11.
  • Stajano F, Anderson R. The resurrecting duckling: security issues for ad-hoc wireless networks. In Proc of International Workshop on Security Protocols, Springer; 1999.
  • Yi P, Dai Z, Zhang S, Zhong Y. A new routing attack in mobile ad hoc networks. Int Journal of Information Technology. 11(2):83–94.
  • Ning P, Sun K. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Proc of the IEEE Workshop on Information Assurance; 2003. p. 60–7.
  • Wu B, Chen J, Wu J, Cardei M. A survey on attacks and countermeasures in mobile ad hoc networks. Wireless/Mobile Network Security; USA: Springer. 2006. p. 103–35.
  • Hu Y-C, Perrig A, Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. Proc of the ACM Workshop on Wireless Security; 2003. p. 30–40.
  • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks. 2003; 293–15.
  • Gavini S. Detecting packet-dropping faults in mobile ad-hoc networks. USA: Washington State University; 2004.
  • Perkins C, Belding-Royer E, Das S. RFC 3561: Ad hoc On-Demand Distance Vector (AODV) routing. Network Working Group; 2003. p. 1–37.
  • Zhang Y, Lee W. Intrusion detection techniques for mobile wireless networks. Wireless Networks. 2003; 9(5):545–56.
  • Hamieh A, Ben-Othman J. Detection of jamming attacks in wireless ad hoc networks using error distribution. International Conference on Communications, ICC '09; Dresden. 2009. p. 1–6.
  • Ben-Othman J, Hamieh A. Defending method against jamming attack in wireless ad hoc networks. 34th Conference on Local Computer Networks; Zurich. 2009. p. 758–62.
  • Shaw S, Orea K, Venkateswaran P, Nandi R. Simulation and performance analysis of OLSR under identity spoofing attack for mobile ad-hoc networks. Computer Networks and Information Technologies Communications in Computer and Information Science. Berlin Heidelberg: Springer-Verlag. 2011; 142:308–10.
  • Mishra A, Jaiswal R, Sharma S. A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. 3rd International Conference on Advance Computing Conference (IACC); Ghaziabad. 2013. p. 499–504.
  • Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Network. 1999; 13(6):24–30.
  • Panaousis EA, Ramrekha TA, Politis C. Secure routing for supporting ad-hoc extreme emergency infrastructures. 2010 Future Network and Mobile Summit; Florence. 2010. p. 1–8.
  • Salmanian M, Li M. Enabling secure and reliable policy-based routing in MANETs. Military Communications Conference, MILCOM; Orlando, FL. 2012. p. 1–7.
  • Yu FR, Tang H, Bu S, Zheng D. Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking. 2013; 188.
  • Gujral R, Kapil A. Secure QoS enabled on-demand link-state multipath routing in MANETs. Information Processing and Management Communications in Computer and Information Science. 2010; 70:250–7.
  • El-Sayed A. Clustering based group key management for MANET. Advances in Security of Information and Communication. Networks Communications in Computer and Information Science, Berlin Heidelberg: Springer-Verlag. 2013; 381:11–26.
  • Zefreh MS, Fanian A, Sajadieh SM, Khadivi P, Berenjkoub M. A cluster-based key establishment protocol for wireless mobile ad hoc networks. Advances in Computer Science and Engineering, Berlin Heidelberg: Springer-Verlag; 2009; 6:585–92.

Refbacks

  • »
  • »
  • »
  • »
  • »
  • »
  • »


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.