A Critical Study on Wormhole Detection and Prevention In Manet

Enhancing Security in Mobile Ad hoc Networks Against Wormhole Attacks

by K. Jagadeeswara Sarma*, Dr. Jibitesh Mishra, Assist. By Dr. Rishi Pal Bangarh,

- Published in International Journal of Information Technology and Management, E-ISSN: 2249-4510

Volume 8, Issue No. 11, Feb 2015, Pages 0 - 0 (0)

Published by: Ignited Minds Journals


ABSTRACT

A Mobile Ad hoc Network (MANET) is acollection of self-configurable mobile node connected through wireless links.Absence of central controller it is difficult to determine the reliable &secure communication in Mobile Ad hoc network. Worm hole attack that are workas to established path in between sender and receiver but if the sender hasstart data transmission then in that case the worm hole attacker has create adirect link, referred to as a wormhole tunnel between them, it means more ofthe number of trusted nodes it means higher successful data communicationprocess rates may well expected. In this desertion we proposed detection aswell as prevention technique against wormhole attack, for detection we useprofile base detection technique and get attacker node information like nodenumber, number of attack packet, attack time etc. after that we preventwormhole attack using neighbor trust worthy base technique and secure themobile ad-hoc network communication, through our proposal we provide secure aswell as reliable communication and simulate through network simulator-2 andanalyze the network behavior in attack and prevention case.

KEYWORD

Wormhole detection, Wormhole prevention, MANET, Mobile Ad hoc Network, Wireless links, Central controller, Secure communication, Wormhole attack, Profile-based detection, Neighbor trust worthy base technique

INTRODUCTION

Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Two nodes out of direct communication range need intermediate nodes to forward their messages. Due to multi-hop routing and open working environment, MANETs are vulnerable to attacks by selfish or malicious nodes, such as packet dropping (black-hole) attacks and selective forwarding (gray-hole) attacks. The most target area of research in mobile ad hoc networks is to provide a trusted environment and secure communication. There are several applications of ad hoc network which need highly protected communication. Common applications of MANET are: military or police networks, business operations like oil drilling platforms or mining operations and emergency response operation such as after natural disaster like a flood, tornado, hurricane and earthquakes. In wormhole attack the attacker record the packets (bits) at one location and tunnel them in another location in same network or in different networks. The attacker can transfer each bit directly, without waiting the entire packet. It is very difficult to find out the location of wormhole attack without having packet relay information or without known infrastructure of routing protocols.

OVERVIEW OF ROUTING PROTOCOLS

There are basically three types of routing protocols: reactive routing protocol, proactive routing protocol and hybrid routing protocol. In proactive or table-driven routing protocols, each node continuously maintains up-to-date routes to every other node in the network. Routing information is periodically transmitted throughout the network in order to maintain routing table consistency. Thus, if a route has already existed before traffic arrives, transmission occurs without delay. Proactive protocols suffer the disadvantage of additional control traffic that is needed to continually update stale route entries. Since the network topology is dynamic, when a link goes down, all paths that use that link are broken and have to be repaired. If no application is using these paths, then the effort gone in to repair may be considered wasted. In contrast to proactive approach, in reactive or on demand protocols, a node initiates a route discovery throughout the network, only when it wants to send packets to its destination. For this purpose, a node initiates a route discovery process through the network. This process is completed once a route is determined or all possible permutations have been examined. Once a route has been established, it is

2

In reactive schemes, nodes maintain the routes to active destinations. A route search is needed for every unknown destination. Finally in hybrid protocols, each node maintains both the topology information within its zone and the information regarding neighboring zones that means proactive behavior within a zone and reactive behavior among zones.

RELATED WORK

Pallavi Sharma proposed an Approach to Defend against Wormhole Attack in Ad Hoc Network Using Digital Signature. They present a mechanism which is helpful in prevention of wormhole attack in ad hoc network is verification of digital signatures of sending nodes by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. A wormhole is one of prominent attack which is formed by two malicious nodes and a tunnel. In order to protect from wormhole attack we used the scheme called multi hop count analysis (MHA) with verification of legitimate nodes in network through its digital signature. Hussain in this paper proposed a Denial of Service Attack in AODV & Friend Features Extraction to Design Detection Engine for Intrusion Detection System in Mobile Ad hoc Network. In this work Denial of Service attack is applied in the network, evidences are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). True Positive generated by the detection engine is very high and False Positive is suppressed to negligible. True positive will be reported very fast in Lids & Friend list generated by Lids will be sent to the Gids module for further investigation. Global Detection Engine will generate the friend list according to trust level, higher the trust level of the node may be used for other different processes like routing, and deciding the cluster head for scalable ad-hoc networks. Feature extracted for Routing parameters and MANET Traffic generation parameters can be used for different routing protocols. Jing-Wei Huang proposed Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks. In this work uses a trust based multipath AOMDV routing combined with soft encryption, yielding our so-called T-AOMDV scheme. More precisely, this approach consists of three steps: (1) In Message encryption the source node, the message is segmented into three parts and these parts are encrypted using one another using some XOR operations, AOMDV protocol, and (3) In Message decryption the destination node decrypts the message parts to recover the original message. Shreenath proposed Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs. This work focus on improving the Secure Enhanced-On Demand Multicast Routing Protocol (EODMRP) to safeguard it against flooding and black hole attacks. The proposed mechanism is for flooding attack works even when the identity of the malicious nodes is unknown and does not use any additional network bandwidth. The performance of a small multicast group will degrade seriously under these types of attacks even the solution is available. Sujatha proposed Design of Genetic Algorithm based IDS for MANET. In this work a technique to analyze the exposure to attacks in AODV, specifically the most common network layer hazard, Black Hole attack and to develop a specification based Intrusion Detection System (IDS) using Genetic Algorithm approach. The proposed system is based on Genetic Algorithm, which analyzes the behaviors of every node and provides details about the attack. Genetic Algorithm Control (GAC) is a set of various rules based on the vital features of AODV such as Request Forwarding Rate, Reply Receive Rate and so on. Konate proposed an Attacks Analysis in mobile ad hoc networks: Modeling and Simulation. In this title we present work is dedicated to study attacks and countermeasures in MANET.They presented several alternatives of DOS attacks met in MANETs, their operating process thus the mechanisms used and the protocols which implement them to counter these attacks. Gandhewar proposed Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Ad-hoc Network. This work mainly focuses on sinkhole problem, its consequences & presents mechanism for detection & prevention of it on the context of AODV protocol. Sinkhole is one of severe kind of attack which attempts to attract most of network traffic towards it & degrade the performance of network. It also shows performance of AODV with no sinkhole attack, under attack & after applying our mechanism in the form of simulation result obtained for certain variation of nodes in network, by considering performance metrics as throughput, PDR, End to end delay & Packet loss. Sharma proposed An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET. In this work a solution to the black hole attack in one

K. Jagadeeswara Sarma1 Prof. Dr. Rishi Pal Bangarh2

risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. The proposed method uses promiscuous mode to detect malicious node (black hole). Jian-Ming Chang proposed CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture. They presented a mechanism to detect malicious nodes launching black/gray hole attacks and cooperative black hole attacks, known as Cooperative Bait Detection Scheme (CBDS). It integrates the proactive and reactive defense architectures, and randomly cooperates with a stochastic adjacent node. By using the address of the adjacent node as the bait destination address, it baits malicious nodes to reply RREP and detects the malicious nodes by the proposed reverse tracing program and consequently prevents their attacks.

SIMULATION RESULTS

Simulation results are evaluated on the basis of performance parameters like overhead, throughput etc. The simulation results are measured in case of normal AODV routing, in case of wormhole attack and after applying protection IPS scheme.

PACKET DELIVERY RATIO ANALYSIS IN

CASE OF NORMAL, WORMHOLE AND IPS

This graph represents the Packet Delivery Ratio (PDR) analysis in case of normal AODV routing, in case of wormhole attack and in case of Intrusion Prevention System (IPS) scheme. Here the case of normal routing is only considered to match the network performance after applying protection scheme. Here we clearly visualized the effect of wormhole attack in network by that only about 30% packet delivery is possible in network at initial stage of simulation and after that the network performance are nearly zero and after about 50 second no PDF value is measure in network. But in case of after applying protection scheme i.e. IPS, the performance of network almost equal to normal means about 94% PDR are improves after applying security scheme against attack.

ROUTING LOAD ANALYSIS

The routing load analysis is required to find the number of routing packets is delivering in network to established connection in between sender and receiver. In this graph the routing load or number of routing packets in case of IPS are high almost about 1300 routing packets are deliver in network then next in case of normal routing about 900 routing packets are deliver in network but at last the routing load in case of wormhole attack are minimum about only 500 packets are deliver in network. The important point of normal routing is the minimum value of routing packets are show the better performance in network and this performance is determine in case of attack and the important point is that in minimum routing packets the actual data packets are deliver in network are negligible as compare to normal and IPS routing. In case IPS the routing packets are more deliver because of identifying the secure path for communication.

UDP PACKET RECEIVE ANALYSIS IN CASE

OF NORMAL, WORMHOLE AND IPS

This graph represents the UDP Packet analysis in case of Normal, Wormhole attack and IPS scheme. Because of the connection less nature the UDP

4

received in case of attack and IPS i.e. about 2300 and 2200 but in case of wormhole attack only a single packet is received at about 60 seconds, it means negligible packets are received at destination end in presence of attack.

INFECTION FROM WORMHOLE

Infection percentage represents the infection percentage w.r.t time. Infection percentage in case of worm attack is continuously increases reach up to 49%. At time about after 4 sec. the infection are in maximum percentage value but at the time of IPS the infection percentage is zero and not a single packet is affected by wormhole attack. IPS will block the whole activity of wormhole attack and remove the infection from network.

Fig. Infection Percentage

TCP ANALYSIS OF AODV ROUTING

PROTOCOL

Transmission Control Protocol (TDP) are the connection oriented reliable protocol for communication in network in between sender and connection are high means about more than 70 packets are deliver in network, after that the congestion window of TCP 1 are size of about 20 and at last the size of TCP 3 connection congestion window are about 1 packet. Fig. TCP packet performance of AODV Routing Protocol

TCP PACKET ANALYSIS IN CASE OF

WORMHOLE ATTACK

In this graph the TCP 1, TCP 2 and TCP 3 connections packets are shown in this graph, only the 6 packets of TCP 3 connections at time about 2 seconds are deliver in network after that not a single packet are deliver in network. It means the wormhole attack completely fails the network performance of reliable protocol. Fig. TCP packets delivery of IPS Scheme

K. Jagadeeswara Sarma1 Prof. Dr. Rishi Pal Bangarh2

This graph represents the TCP packets analysis in case of applying prevention scheme against wormhole attack. Here we clearly notice the performance of all TCP connections. The size of congestion window is only varying but the packet delivery is almost same as normal routing i.e. shown in figure 5. The Protection IPS scheme is definitely improves the performance of network and blocks the misbehavior activity of wormhole attacker.

Fig. TCP packets delivery of IPS Scheme

CONCLUTION AND FUTURE WORK

Mobile Ad Hoc Networks have the ability to setup networks in a cruel environment where it may not possible to deploy a traditional network infrastructure. Whether ad hoc networks have vast potential, still there are many challenges left to overcome.. Security is such an important feature that it could determine the success and wide deployment of MANET. The wormhole attack is a type of attack that performs the malicious activity by creating own link and avoids actual link i.e. the actual path for data delivery. The overall idea of this algorithm is to detect malicious nodes launching attacks and misbehaving links to prevent them from communication network. This protection scheme provides the protection against wormhole attack and blocks the activities of attacker node. In case of attack almost the network performance is completely down but proposed IPS scheme improves performance nearly equal to normal routing. This work explores a vigorous and a very simple idea, which can be implemented and tested in future for more number of attacks, by increasing the number of nodes in the network. In future we also examine the behavior of other attacks like Gray hole attack and Black hole attack and try to make the protection schemes on it and also try to enhance the performance of routing protocol that has

REFERNCES

[1] Pallavi Sharma, Prof. Aditya Trivedi “An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature”, 3rd IEEE International Conference on Communication Software and Networks (ICCSN), pp. 307 – 311, 2011. [2] Husain. Shahnawaz, Gupta S.C., Chand Mukesh “Denial of Service Attack in AODV & Friend Features Extraction to Design Detection Engine for Intrusion Detection System in Mobile Ad-hoc Network”, International Conference on Computer & Communication Technology (ICCCT-2011), pp. 292- 297, 2011. [3] Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obaidat, Ting-Yun Chi, Sanjay K. Dhurandher “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks”, proceedings of IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1-5, 2011. [4] Dr. N. Sreenath, A. Amuthan, & P. Selvigirija “Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs”, International Conference on Computer Communication and Informatics (ICCCI -2012), pp. 1-7, 2012. [5] K. S. Sujatha, Vydeki Dharmar, R. S. Bhuvaneswaran “Design of Genetic Algorithm based IDS for MANET”, International Conference on Recent Trends in Information Technology (ICRTIT), pp. 28-33, 2012. [6] Dr. Karim KONATE, GAYE Abdourahime “Attacks Analysis in mobile ad hoc networks: Modeling and Simulation”, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, pp. 367 – 372, 2011. [7] Gandhewar, N., Patel, R. “Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network”, Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 714 – 718, 2012. [8] Singh, P.K. Sharma, G. “An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET”, IEEE 11th

6

2012.

[9] Jian-Ming Chang, Po-Chun Tsou ; Han-Chieh Chao ; Jiann-Liang Chen “CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture”, 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), pp. 1-5, 2011.