Top Banner
DOI: 10.23883/IJRTER.2017.3182.NEASU 530 COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING COLLABORATIVE ATTACKS IN MANETS Ms. Meghana M 1 , Mrs. Shraddha C 2 1 M.Tech, Department of Computer Science and Engineering, VidyaVardhaka College Of Engineering, Mysuru, India 2 Assistant Professor,Department of Computer Science and Engineering, VidyaVardhaka College Of Engineering, Mysuru, India Abstract -The most required technology which is still an interesting topic for researchers are the Mobile Adhoc Networks. It provides various flexible characteristics which are useful at many situations but launch few threats related to security. These threats are the collaborative attacks such as black hole and gray hole attacks. These severe attacks which are responsible for dropping the packets during transmission can be overcome in this paper using a secure mechanism called the Combined bait discovery method(CBDM).This method includes dynamic route discovery scheme and selective repeat protocol for defending the attacks. Node ranking algorithm is used to identify the true malignant nodes and by adopting this algorithm the resource consumption can be reduced. Keywords: Combined Bait Discovery Method (CBDM), Gray hole attack, Black hole attack, Node ranking algorithm. I. INTRODUCTION A MANET is a network which configures itself and nodes are connected wireless. Node in the network or device can often move freely in any direction. There is no proper structure for adhoc systems. Routes are discovered by broadcasting the request to all the nodes and receiving respective acknowledgements in the system. If the nodes are beyond the transmission range, multi-hop is adopted. There is no central administration in the network. Fig.1. Mobile Adhoc Network Due to the flexibility of the nodes in the network, there can exist many security threats. It can be gray hole attacks, Black hole attacks, Jelly fish attacks, etc. In this paper, the gray hole and black hole attacks can be overcome by a method called Combined Bait Discovery Method (CBDM).The black hole attacks are always caused at the same instance of time, when each time a route is generated.
5

COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

Feb 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

DOI: 10.23883/IJRTER.2017.3182.NEASU 530

COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING

COLLABORATIVE ATTACKS IN MANETS

Ms. Meghana M1, Mrs. Shraddha C

2

1M.Tech, Department of Computer Science and Engineering, VidyaVardhaka College Of Engineering,

Mysuru, India 2Assistant Professor,Department of Computer Science and Engineering, VidyaVardhaka College Of

Engineering, Mysuru, India

Abstract -The most required technology which is still an interesting topic for researchers are the

Mobile Adhoc Networks. It provides various flexible characteristics which are useful at many

situations but launch few threats related to security. These threats are the collaborative attacks such

as black hole and gray hole attacks. These severe attacks which are responsible for dropping the

packets during transmission can be overcome in this paper using a secure mechanism called the

Combined bait discovery method(CBDM).This method includes dynamic route discovery scheme

and selective repeat protocol for defending the attacks. Node ranking algorithm is used to identify the

true malignant nodes and by adopting this algorithm the resource consumption can be reduced.

Keywords: Combined Bait Discovery Method (CBDM), Gray hole attack, Black hole attack, Node

ranking algorithm.

I. INTRODUCTION

A MANET is a network which configures itself and nodes are connected wireless. Node in the

network or device can often move freely in any direction. There is no proper structure for adhoc

systems. Routes are discovered by broadcasting the request to all the nodes and receiving respective

acknowledgements in the system. If the nodes are beyond the transmission range, multi-hop is

adopted. There is no central administration in the network.

Fig.1. Mobile Adhoc Network

Due to the flexibility of the nodes in the network, there can exist many security threats. It can be gray

hole attacks, Black hole attacks, Jelly fish attacks, etc. In this paper, the gray hole and black hole

attacks can be overcome by a method called Combined Bait Discovery Method (CBDM).The black

hole attacks are always caused at the same instance of time, when each time a route is generated.

Page 2: COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 03, Issue 04; April - 2017 [ISSN: 2455-1457]

@IJRTER-2017, All Rights Reserved 531

Fig.2. Black hole attack

While the gray hole attacks are caused at selective time i.e... Packets can be dropped at any time

during the data transmission.

Fig.3. Gray hole attack

II. RELATED WORK The security issues of MANET still exist. MANET is used to find just single malicious node in the

network. Few changes are required in the existing system being used [1] [7].The problem of

augmentation in the route overhead exists in the receptive steering convention [12].In 2ACK scheme,

the affirming packet must also be sent with the information.

Therefore, this creates overhead [10].

“Defending against collaborative packet drop attacks on MANETs” [13], has provided a hashing

function in the system. The delivery ratio starts the detection of black hole.

The paper “Prevention of cooperative black hole attack in MANETs” [3], give the approach in which

the cooperative black hole attack is found which recognizes the malicious node. AODV MANET

routing protocol provides a method which depends on intruders from local nodes instead of source

node [11].

III. PROPOSED APPROACH The Combined Bait Discovery Method (CBDM) provides a unique approach to prevent the

malicious nodes from causing the severe attacks like black hole and gray hole attacks. It uses the

DSR and Selective repeat protocol.

The CBDM operates in four steps:-

A. Early/Intense defense mechanism

-Initial Trap step

-Reverse tracking step

B. Route discovery

C. Data transmission

D. Perceptive defense mechanism

Page 3: COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

International Journal of Recent Trends in Engineering & Rese

A.Early/Intense Defense mechanism The one hop neighbors are identified and the initial trap step is initiated where malicious node also

enters into the path. For fake RREP, Reverse tracking step is initiated, where the sour

‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by

verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.

The following figure shows how to trace or id

In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,

node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance

that m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1

of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation

between the address that records the

W and U is,

m2 and m1 would perform the same operation which is subsequent to accepting the RREP.

B. Route discovery Using the Dynamic Source Routing (DSR), the optimal route or path between any source and

destination is found by avoiding malicious IPs.

C. Data Transmission The selective repeat protocol uses end to end acknowledgement scheme in transmission of data

between nodes. For packet retransmission, it uses time out timers.

D. Perceptive defense mechanism The delivery ratio for the currently used optimal

certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It

initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the

malicious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,

International Journal of Recent Trends in Engineering & ReseVolume 03, Issue 04; April - 2017

A.Early/Intense Defense mechanism The one hop neighbors are identified and the initial trap step is initiated where malicious node also

enters into the path. For fake RREP, Reverse tracking step is initiated, where the sour

‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by

verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.

The following figure shows how to trace or identify the malicious node-

Fig.4. Reverse Tracking

In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,

node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance

m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1

of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation

between the address that records the

T=W-U= {m4, m5, m6}

m2 and m1 would perform the same operation which is subsequent to accepting the RREP.

Using the Dynamic Source Routing (DSR), the optimal route or path between any source and

destination is found by avoiding malicious IPs.

The selective repeat protocol uses end to end acknowledgement scheme in transmission of data

between nodes. For packet retransmission, it uses time out timers.

Perceptive defense mechanism The delivery ratio for the currently used optimal route during data transmission is calculated. It uses

certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It

initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the

ious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,

International Journal of Recent Trends in Engineering & Research (IJRTER) 2017 [ISSN: 2455-1457]

The one hop neighbors are identified and the initial trap step is initiated where malicious node also

enters into the path. For fake RREP, Reverse tracking step is initiated, where the source node sends a

‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by

verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.

In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,

node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance

m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1

of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation

m2 and m1 would perform the same operation which is subsequent to accepting the RREP.

Using the Dynamic Source Routing (DSR), the optimal route or path between any source and

The selective repeat protocol uses end to end acknowledgement scheme in transmission of data

route during data transmission is calculated. It uses

certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It

initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the

ious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,

Page 4: COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

International Journal of Recent Trends in Engineering & Rese

which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is

adopted.

During each optimal route chosen, a delivery ra

the delivery ratio, the source node categorizes the nodes based upon the node categorization

algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for

sure. Once the malicious node or path is identified, then the nodes are ranked again along the

immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is

transmitted safely. This algorithm in turn reduces the resource con

The following figure (Fig.5) shows the procedure of CBDM method.

Fig.5. Procedure of CBDM scheme

International Journal of Recent Trends in Engineering & ReseVolume 03, Issue 04; April - 2017

which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is

During each optimal route chosen, a delivery ratio is calculated for each node in the route. Based on

the delivery ratio, the source node categorizes the nodes based upon the node categorization

algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for

nce the malicious node or path is identified, then the nodes are ranked again along the

immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is

transmitted safely. This algorithm in turn reduces the resource consumption.

The following figure (Fig.5) shows the procedure of CBDM method.

Fig.5. Procedure of CBDM scheme

International Journal of Recent Trends in Engineering & Research (IJRTER) 2017 [ISSN: 2455-1457]

which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is

tio is calculated for each node in the route. Based on

the delivery ratio, the source node categorizes the nodes based upon the node categorization

algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for

nce the malicious node or path is identified, then the nodes are ranked again along the

immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is

Page 5: COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING ... · [2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection approach”, Jianming

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 03, Issue 04; April - 2017 [ISSN: 2455-1457]

@IJRTER-2017, All Rights Reserved 534

IV. CONCLUSION

Majority of the researchers have discovered various ways to deal with malicious node. The

enhancement of this approach is to prevent the black hole and gray hole attacks. It prevents the loss

of packets during the data transmission .The proposed scheme has been implemented practically or

in real time instead of using simulator to find results. This scheme increases the versatility to detect

and prevent two types of attacks i.e... Black hole and gray hole attacks. The intense and perceptive

defense mechanisms increase the efficiency of the detection and the resource consumption is avoided

by the use of node ranking/categorization algorithm.

V. FUTURE WORK

The future work in the scheme is expected to differentiate the achievability of modifying the CBDM

scheme to deal with the identity and change the assaults on MANETs.

REFERENCES [1] “Modified Cooperative bait detection approach for defending Collaborative attacks in MANETs”,

Emimajuliet.P, Thirilogasundari.V, International Conference On Information Communication And Embedded

System(ICICES 2016).

[2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection

approach”, Jianming chang, PO- chun Tsou, Isac Wangang, Hancheihchao, Chin-fenglai, Member IEEE, 2015.

[3] “Detecting and preventing black hole attacks in MANETs using CBDS (Cooperative Bait Detection Scheme)” ,

A.Agalya,C. Nandini, S. Sridevi, International Journal of Modern Trends in Engineering and Research (IJMTER),

Volume 02, Issue 04, 2015.

[4] “Towards Security against Malicious Node Attack in Mobile Ad Hoc Network”, Ramandeep Kaur , Jaswinder

Singh, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7,

July 2013.

[5] “Combating Resource Consumption and Byzantine Attacks in MANET through Enhanced CBDS Technique”,

Muskan Sharma, Chander Prabha ,” American International Journal of Research in Science, Technology, Engineering &

Mathematics AIJRSTEM 14-543,2014.

[6] “Detection and Recovery of Packet Drop under Network Layer Attack in MANET”, C. Deepika Shiny , I.

Muthumani, International Conference on Electrical, Information and Communication Technology, 28 February 2015.

[7] “CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense

architecture,” in Proc. 2nd Intl. Conf. Wireless Commun.,VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5. P.-C.

Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen.

[8] “TBONE: A mobile-backbone protocol for adhoc wireless networks”, I. Rubin, A. Behzad, R. Zhang, H. Luo,

and E.Caballero, in Proc. IEEE Aerosp. Conf., 2002,vol. 6, pp.

2727–2740.

[9] “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and

evaluation”, H. Weerasinghe and H. Fu, in Proc. IEEE ICC, 2007, pp. 362– 367.

[10] “Cooperative Bait Detection Scheme (CBDS) To Avoid the Collaborative Attacks of Nodes in MANET”,

AkinlemimOlushola O., K. Suresh Babu , Volume 3 Issue 4, April 2014.

[11] “Security Routing Mechanism for Black Hole Attack over AODV MANET Routing Protocol”, Maha Abdelhaq,

Sami Serhan, Raed Alsaqour and Anton Satria Australian Journal of Basic and Applied Sciences, 5(10): 1137-1145.

[12] “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks”, K. Vishnu and A. J

Paul, Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.

[13] “Defending against Collaborative Packet Drop Attacks on MANETs”, W.Wang, B.Bhargava, and M.

Linderman, 28th International Symposium on Reliable Distributed Systems September 2009.