Wednesday, September 16, 2015

A New Security Mechanism for Mitigating Multiple Grayhole Attack In MANETS #IJSTE Journal#


Title: A New Security Mechanism for Mitigating Multiple Gray hole Attack In MANETS

Research Area: Computer Science Engineering.

Abstract: 

             Wireless Ad hoc networks are temporary networks because they are formed to fulfil a special purpose and cease to exist after fulfilling this purpose. Mobile devices might arbitrarily leave or join the network at any time, thus ad hoc networks have a dynamic infrastructure. The number of applications that involve wireless communications among mobile devices is rapidly growing. Many of these applications require the wireless network to be spontaneously formed by the participating mobile devices themselves. In wireless ad hoc networks, mobile nodes communicate with other nodes over wireless links, without the support of pre-existing infrastructures, which is an attractive form of peer communications for certain applications. Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. With the emergence of more heterogeneous devices and diverse networks, it is difficult, if not impossible, to use a one-size-fits-all encryption algorithm that always has the best performance in such a dynamic environment. Network security plays a crucial role in this MANET and the traditional way of protecting the networks through firewalls and encryption software is no longer effective and sufficient. In this paper, We have studied the effect of gray hole attack in the Ad hoc Networks and proposed solution that tries to eliminate the gray hole effect by monitoring scheme to isolate malicious node from the network over AODV routing protocol through simulatuion using ns2 simulator. 

Keywords: 
QoS, AODV, MANETs.

  •  Security Attacks: 
    • Security attacks can be classified in different ways. One way is to divide attacks into four categories according to where the attacker deploys the attack in the flow of information from a source to a destination. 1) Interruption: An asset of the network is destroyed or becomes unavailable or unusable. This is an attack on availability. Examples include silently discarding control or data packets. 2) Interception: An unauthorized node gains access to an asset of the network. This is an attack on confidentiality. Examples include eavesdropping control or data packets in the networks. 3) Modification: An unauthorized node not only gains access to but tampers with an asset. This is an attack on integrity. Examples include modifying control or data packets. 4) Fabrication: An unauthorized node inserts counterfeit objects into the system. This is an attack on authenticity. Examples include inserting false routing messages into the network or impersonating other node. A more useful categorization of these attacks is in terms of passive attacks and active attacks : 5) Passive attacks: A passive attack does not disrupt the operations of a routing protocol, but only attempts to discover valuable information by eavesdropping, or silently discard messages received. Three types of passive attacks are release of message contents, traffic analysis, and message dropping. 6) Active attacks: An active attack involves modification of the contents of messages or creation of false messages. It can be subdivided into four categories masquerade, replay, modification of messages, and denial of service.



CONCLUSION AND FUTURE WORK

In this paper, we simulated the gray hole attack in the Ad-hoc Networks and investigated its affects. Having simulated the grayhole attack, we saw that the performance of AODV is decreased in the ad-hoc network. Although many solutions have been proposed but still these solutions are not perfect in terms of effectiveness and efficiency. If any solution works well in the presence of single malicious node, it cannot be applicable in case of multiple malicious nodes. Our proposed solution tries to eliminate the gray hole effect by monitoring schemeto isolate malicious node from the network. The watchdog does this by listening to all nodes within transmission range promiscuously. If a watchdog detects that a packet is not forwarded within a certain period or is forwarded but altered by its neighbour it deems the neighbour as misbehaving and if any node only accept the node and does not forwarded, watchdog declare that node as a gray hole node and exclude that node from the path of the sending packets.

For More Information About this Article: 




No comments:

Post a Comment