IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Efficient Mobile agent based scheme for Out-of-band Wormhole attack detection Juhi Biswas1, Ajay Gupta2, Daya Shankar2 1

2

Mtech student, Computer Science and Engineering Dept., Madan Mohan Malviya University of Technology Gorakhpur, Uttar Pradesh, India [email protected]

Mtech student, Computer Science and Engineering Dept., Madan Mohan Malviya University of Technology Gorakhpur, Uttar Pradesh, India [email protected] 2

Assistant Professor, Computer Science and Engineering Dept. , Madan Mohan Malviya University of Technology Gorakhpur, Uttar Pradesh, India [email protected]

Abstract Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics like dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. A node in MANET acts not only as end terminal but both as a router and client. In this way, multi-hop communication occurs in MANETs and thus it becomes more difficult task to establish a secure path between source and destination. The objective of this work is overcome a special attack called wormhole attack launched by at least two colluding nodes within a network. In this paper we enhance AODV to detect and remove wormhole attack in real-world MANET. Also we are using mobile agents to detect malicious nodes when they impersonate as authentic nodes. In an out-of-band wormhole attack the communication between two malicious nodes is hidden from the rest of the nodes. This property is exploited for the detection of wormhole attack.

Keywords: MANETs , AODV ,Wormhole Attack, Secure Routing ,Mobile agents

1. Introduction A mobile ad-hoc network is a self-configuring infrastructure less network of mobile devices such as mobile phones, laptops etc., connected by wireless network. MANET is an autonomous system of mobile routers and associated hosts. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently that is they have a dynamic configuration. Nodes participate in routing by forwarding packets to next node till the packet reaches its destination. Openness of wireless communication channel, lack of infrastructure and hostile environment where they can be easily deployed makes them vulnerable to various security attacks. There have been many researches on enhancing the security of mobile ad hoc networks. Especially, secure routing protocols have been developed in recent years. However these researches only focus on the attacks by single attacker. They have not considered the case of collusion attacks, in which multiple attackers cooperate with each other in order to compromise any target node or intercept useful information Wormhole attack is one of the most severe threats to ad hoc networks. A pair of attackers form a tunnel (wormhole) to exploit received packets at the other area of the network. One attacker replays the packets Juhi Biswas

,IJRIT

414

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

that are forwarded from another attacker. Thus attackers can do harm to both the sender and the receiver by dropping packets or illegally accessing the packets. This attack is particularly challenging to detect as it can be mounted without compromising any nodes. On the other hand, using a cryptographic technique cannot prevent wormhole attack. Furthermore, the attackers can mount the attack without revealing their identities.The remaining parts of this paper are arranged as follows. Section II explains various Wormhole attack modes. Section III consists of reviewing on several wormhole detection methods. Section IV depicts a summary of wormhole detection methods that are discussed in the previous section finally, a conclusion is presented in Section V

2. Wormhole attack modes In this section we explain the various wormhole attacks modes

Figure 1. An example of wormhole attack Figure 1 shows an example of typical wormhole attack in an ad hoc network. An attacker m1 colludes with another attacker m2 in order to deceive destination of a packet about the route and by including both m1 and m2 as the most efficient path. Since most routing protocols for ad hoc network select cost effective path, the path between m1 and m2 may be chosen as the communication route from source to destination. Efficiency is measured in terms of the smallest hop count for some routing protocols, while it means the smallest propagation time for other ones. Thus m1 and m2 can disguise the route including them as the shortest path by using following methods. 1) Wormhole using encapsulation: Node encapsulates the route request and sends it to colluding node which decapsulates it and forwards the RREQ. Due to this, the routes between the source and the destination go through the two colluding nodes that will be said to have formed a wormhole between them. This prevents nodes from discovering legitimate paths that are more than two hops away. This mode of the wormhole attack is easy to launch since the two ends of the wormhole do not need to have any cryptographic information, nor do they need any special capabilities, like a high speed wire link or a high power source. 2) Wormhole Out-of-Band Channel: The second mode for this attack is the use of an out of band channel. This channel can be achieved, either by using a long range directional wireless link or a direct wired link. This mode of attack is more difficult to launch than the previous one since it needs specialized hardware capability. 3) Wormhole with High Power Transmission : Another Method is the use of high power transmission. Here in this mode, when a single malicious node gets a RREQ, it broadcasts the request at a high power level, other nodes of the network are not capable of doing this. When any node that hears the high-power broadcast, rebroadcasts it towards the destination. By this method, the malicious node increases its chance to be in the routes established between the source and the destination even without the participation of a colluding node. 4) Wormhole using Packet Relay: Wormhole using Packet Relay is another mode of the wormhole attack in which a malicious node relays packets between two distant nodes to convince them that they are

Juhi Biswas

,IJRIT

415

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

neighbors. It can be launched by even one malicious node. Cooperation by a greater number of malicious nodes serves to expand the neighbor list of a victim node to several hops. 5) Wormhole using Protocol Deviations: A wormhole attack can also be done through protocol deviations. During the RREQ forwarding, the nodes typically back off for a random amount of time before forwarding reduce MAC layer collisions. A malicious node can create a wormhole by simply not complying with the protocol and broadcasting without backing off. The purpose is to let the request packet it forwards arrive first at the destination. The source finds the route through malicious node as a fast way to transfer the packet when other nodes refuse to forward for avoiding MAC layer collision.

3. Literature Review A number of cryptographic, statistical, time and location based schemes have been proposed in existing literature (Azer, El-Kassas & El-Soudani, 2009). This paper is an effort to develop a light weight solution that detects as well as removes wormhole attack in MANETs. Although, a lot of research work has been done in to overcome this attack with routing protocols in MANETs that performs simulation, however, less research in this context so far has been done to overcome this devastating attack using practical implementation. In (Roy, Chaki & Chaki, 2009), the authors have proposed a cluster based scheme in order to avoid wormhole attack in MANETs that uses AODV as a routing protocol. The network is divided into number of different clusters. Each cluster has cluster head which is selected dynamically in the inner layer and keeps routing information of all member nodes in the network. There is also a cluster head in the outer layer which is responsible to pass on information to all member nodes in each cluster. A guard node located on the junction of clusters is responsible to monitor the malicious activity of member nodes. In the case when a guard node detects any malicious activity of node, it reports it to the cluster head in the cluster, which in response pass on the information to the cluster head in the outer layer which in turn informs to all other nodes in the network about the malicious activity of the node. In (Shang-Ming Jen, Chi-Sung Laih and Weh-Chung Kuo, 2009), a hop count based scheme is used to prevent wormhole attack. A route with a hop-count value, that is significantly less than others, is most likely a wormhole. In (Panaousis, Nazaryan & Politis, 2009) a mechanism called AODV-Wormhole Attack Detection Reaction (AODV-WADR) uses a combination of cryptography and timing. Any node that wants to establish a route discovery starts a timer to calculate ATT (Actual Traversal Time). It suspects routes as of wormhole links when hop-count =3 and Actual Traversal Time > 6× (Node Traversal Time). The detection of wormhole attack up to 3-hops is justified due to pattern of nodes, communication under the topology of AODV protocol. The suspicion is based on the fact that an attacker can use powerful signal to transmit the packet to distance greater than one hop but time it calculates during this transmission can not be smaller than the time of IEEE 802.11b transmission in single hop. To confirm existence of wormhole attack, AODVWADR uses Diffie-Hellman (DH) algorithm using AES cryptographic standards. As It has the capability to handle open wormhole however when case is of hidden wormhole AODV-WADR will not be efficient. In (Win & Gye, 2008) ,the authors have analyzed wormhole attack in ad hoc and sensor networks. Also an algorithm called DaW is presented which is based on establishing trust vector through neighbor monitoring together with link frequency analysis. In (Tun & Maw, 2008) Zaw Tun et al has proposed a methology to detect wormhole attack using Round Trip Time (RTT) and neighbor numbers both. To detect wormhole attack each node first detects neighbor number (nn) in the network and then the source node observes RTT between any two neighboring nodes on its path towards destination. The source node then decides whether there exists a wormhole on the basis of any RTT values between any successive nodes. If the RRT value for any two successive nodes is found to be more than the normal, then it needs to check the value of nn. Now if nn value is also greater than average number of neighbors then it is certain that wormhole link is present.

Juhi Biswas

,IJRIT

416

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

In the recent paper of (Ming-Yang Su & Kun-Lin Chiang, 2010), the authors have proposed a solution to detect and discard malicious nodes of the wormhole attack based on the deployment of Intrusion Detection System (IDS) in MANETs using on demand routing protocol i.e. AODV. This scheme uses packet loss as a metric to eliminate wormhole attack. The IDS nodes perform a mechanism called Anti-Wormhole Mechanism (AWM) that sniffs routing packets of the regular nodes that are in their transmission range. It is responsibility of the IDS nodes to determine any misbehavior of nodes in its vicinity. If any such thing happens it informs to all other nodes in the network to isolate malicious nodes. In (Sana ul Haq, Faisal B. Hussain, 2011), authors have proposed solution i.e. AODV-DRW that detects and removes the wormhole attack without the use of any special hardware. The solution handles wormhole attack launched by two colluding node using out-of-band channel. Colluding nodes have the capability to communicate with all other nodes. All nodes are considered in reception mode and are bidirectional. The colluding nodes use wireless capability of larger range than the other normal nodes in the network. Normally in AODV all intermediate nodes that have no route to destination rebroadcast RREQ forwarded by the originator of the RREQ. The source node or intermediate node keeps record of all the next neighbors from which it listen RREQ during rebroadcast. Each node maintains information like source ID, sequence number, RREQ ID, Neighbor ID, timer etc while broadcasting RREQ from source node to destination node. Maintaining this information at all nodes insure detection of any node conducting wormhole attack. As the colluding node uses an out-of-band channel, it’s rebroadcast of RREQ is not listened by the neighboring nodes , instead it forwards the RREQ to its colluding partner, and the forwarding neighbors of malicious node therefore do not listen to rebroadcast from the malicious node that is near the source. As the wormhole attackers establish a shortcut path between source node and destination node having least number of hops, therefore the path having wormhole link will be selected , as RREQ packet reached to destination node in short period of time as compared to RREQs reached by other normal paths. Replying RREP packet on reverse route from destination node will follow the path having wormhole link. A node which receives RREP from a node that has no ID of that node is then considered as suspicious and is blacklisted. The working of AODV -DRW scheme is summarized as: I. RREQ is created by the source node and broadcast it to all neighboring nodes which are in its communication range. II. RREQ is rebroadcasted by all receiving nodes of RREQ until received by the destination III. The sending nodes of RREQ listens to rebroadcast from all its neighbors, before discarding such RREQs they keep record of their IDs as the next neighbor nodes. All normal nodes in MANETs get list of information as mentioned in the network. IV. If receiving node of RREQ is malicious, its rebroadcast is not listened by normal neighboring nodes, because it unicasts RREQ to its colluding partner using an out-of-band channel, thus all its neighbors will not hear from it and they will be unable to record their ID. V. RREQ is reached to destination through route having colluding nodes due to less number of hops and low latency as compared to other normal available normal routes. VI. The RREP packet is created by destination node and is unicasted through the reverse route. VII. The receiving node of RREP on reverse route will check if there exists an ID of the sending node of RREP in its maintaining information, if yes it will forward the RREP to next hop on reverse route towards the source node, else, the receiving node regards that node as malicious and is blacklisted and future communication through that node is blocked. VIII. Another alternative route having no malicious node is then selected for further data communication.

4. Problem Statement In (Sana ul Haq, Faisal B. Hussain, 2011) authors have proposed a practical solution called AODV- DRW, that use uses neighbor ID for detection and removal of wormhole attack with accuracy. The solution proposed is practical in the sense that it does not require any additional hardware. The memory and computational cost is reasonable enough to be supported by nodes in MANETs. Although this schemes detect and handle open wormhole attack successfully, but, in case of impersonation attack when a malicious node hides its identity with some normal node, this scheme fails, for which strong authentication Juhi Biswas

,IJRIT

417

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

scheme is required. Thus in proposed method with the use of mobile agents we are able to detect the malicious nodes that are impersonating themselves in AODV-DRW.

5. Proposed Solution Mobile agents have the ability to move throughout the large network, each mobile agent is assigned to perform only one specific task, and then one or more mobile agents are distributed into each node in the network. This allows the distribution of the malicious node detection tasks. Some of the major advantages for using mobile agents are that it helps to reduce the power consumption, which is scarce in MANET. It also provides fault tolerance such that even if the network is partitioned or some agents are destroyed, they are still able to work. Mobile agents must be able to protect themselves from the secure modules on remote hosts as well. Moreover, they are scalable in large and varied system environments, as mobile agents tends to be independent of platform architectures. Detection of wormhole attack when wormhole nodes impersonate themselves We propose a combination of distributed as well as cooperative scheme in which the malicious node is detected with help of the mobile agents. • In this proposed scheme mobile agent assigns buffer level, TTL and key. • Source node transmits data to destination node via intermediate nodes. The mobile agent will keep monitoring the movement of intermediate nodes with the help of a routing table. • If any of the nodes not clear the buffer within a predefined time we can report that node as misbehavior node even though it has an ID and acting like a genuine node, mobile agent will identify the misbehavior node based on the key . • It intimates to the source node by sending negative acknowledgement, the path which source has chosen contains malicious nodes. Then the source will choose the alternate path and send the data through that path. • TTL message is generated by mobile agent to every node which shows active communication between every node. • Key is generated by using fast randomized algorithm if the source chooses the same path again to send the data means that the key will automatically changed. • Before sending data packets we are encrypting the packets using RSA (Public Key Encryption).One of the major advantages of RSA is more secure and convenient. • To send the data to the destination node, the Source node will choose the node information from the nodes list and upload the data from its directory and transmit the data via intermediate node. • The data is travelling across the network it is possible for any of the malicious nodes can drop the packets or not clear the buffer within predefined time mobile agent which is monitoring the nodes will intimate to source and it will select an another route to pass the packet to destination. • Time To Live (Ttl): Every node in MANET is continuously updates its location to mobile agent every node will send ttl message to mobile agent so that mobile agent will have accurate information regarding nodes location.

6. Conclusion and Future work In this paper , we have focused on wormhole attack that is created by using an out of band channel. In our proposed scheme with the help of mobile agents we are able to detect those malicious nodes also that are causing this wormhole attack and are impersonating themselves as genuine nodes of the network. This scheme does not requires any additional hardware. It provides strong authentication against impersonation by wormhole nodes which were missing in the previous detection techniques. It requires encryption using RSA which is very secure in itself. In future we plan to implement this proposed scheme by NS-2 simulation.

Juhi Biswas

,IJRIT

418

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 414-419

References [1] Corson, M.S, Maker, J.P. and Cernicione, J.H. (1999). Internet-based Mobile Ad Hoc Networking. IEEE Internet Computing, pp. 63–70. [2] Perkins,C.E.,Belding Royer, E.M. and Das, S.R. (2003) . Ad-hoc On-Demand Distance Vector (AODV) Routing. Mobile Ad-hoc Networking Group, Internet Draft, draft-ietf-mendatory-00.txt. [3] Jhonson, D.B. and Maltz, D.A. (1996). Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic publishers, pp. 153/181. [4] Perkins, C.E. and Bhagwat,P. (1994). Highly Dynamic Destination-Sequenced Distance–Vector Routing (DSDV) for Mobile Computers, Proceedings of the SIGCOMM 94 Conference on Communication Architecture, Protocols and Applications, pp.234-244. [5] Argyroudis, P.G. and O’Mahony,D. (2003). “Secure Routing for Mobile Ad Hoc Networks”, IEEE Communications Surveys, the Electronic Magazine of Original Peer-Reviewed Survey Articles , 7(3). [6] Jhaveri, R.H., Parmar, J.D., Patel, A.D., and Shah, B.I. (2010). MANET Routing Protocols and Wormhole Attack against AODV, International Journal of Computer Science and Network Security, 10(4). [7] Roy, D.B., Chaki, R & Chaki, N. (2009). A New Cluster-Based Wormhole Intrusion detection Algorithm for Mobile Ad Hoc Networks. International Journal of Network Security and its Applications (IJNSA),1,(1). [8] Shang-Ming Jen, Chi-Sung Laih and Weh-Chung Kuo. (2009) .“A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET”, Sensors, ISSN 1424-8220, 9, 5022-5039; doi:10.3390/s90605022, 2009. [9] Panaousis, E.A., Nazaryan, L. & Politis, C. (2009). ”Securing AODV Against Wormhole Attacks in Emergency Manets Multimedia Communications”, Mobimedia’09, 2009, London, UK. [10]Win, K.S. & Gye,P. (2008). Analysis of Detecting Wormhole attack in Wireless Networks. World Academy of Science, Engineering and Technology 48. [11] Tun, Z & Maw, A.H. (2008). Wormhole Attack Detection in Wireless Sensor Networks. World Academy of Science, Engineering and Technology 46. [12] Ming-Yang Su and Kun-Lin Chiang. (2010). Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes. Springer Berlin / Heidelberg, vol: 6221, pages: 253-260. [13]AODV-UU.(n.d.). http://core.it.uu.se/AdHoc/AodvUU Impl [14] Azer, M., El-Kassas, S. & El-Soudani, M. (2009). A Full Image of the Wormhole Attacks: Towards Introducing Comlex Wormhole Attacks in Wireless Ad hoc Networks. International Journal of Computer Science and Information Security (IJCSIS), 1(1). [15] Sana ul Haq, Faisal B. Hussain(2011), out-of-band wormhole detection in MANETs. Australian Information Security Management Conference

Juhi Biswas

,IJRIT

419

Efficient Mobile agent based scheme for Out-of-band Wormhole attack ...

417. In the recent paper of (Ming-Yang Su & Kun-Lin Chiang, 2010), the authors have proposed a solution to detect and discard malicious nodes of the wormhole attack based on the deployment of Intrusion Detection. System (IDS) in MANETs using on demand routing protocol i.e. AODV. This scheme uses packet loss as a.

65KB Sizes 0 Downloads 183 Views

Recommend Documents

Efficient Mobile agent based scheme for Out-of-band ...
phones, laptops etc., connected by wireless network. MANET is an ... Figure 1 shows an example of typical wormhole attack in an ad hoc network. An attacker ..... Encryption).One of the major advantages of RSA is more secure and convenient.

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc ... - IJRIT
3.8 Malicious Code Attacks: Malicious code, such as viruses, worms, spywares, and Trojan Horses, can attack both operating systems and user applications. These malicious programs usually spread themselves through the network and cause the computer sy

Poster: Detection of Wormhole Attack on Wireless Sensor ... - EWSN
Poster: Detection of Wormhole Attack on Wireless Sensor ... wireless sensor nodes are duty-cycling, i.e. they will period- .... Cambridge Unversity Press, 2009.

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
3.4 Interference and Jamming: Radio signals can be blocked or interfered with, which causes the message to be corrupted or lost. If the attacker has a powerful transmitter, a signal can be generated that will be strong enough to overwhelm the targete

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
Abstract: Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure- less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for diff

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
rity challenges [Chess, 1998]. Among these are ... Agent Places: an agent place is a server appli- cation where ..... Internet Computing, pages 40-48. [Yee and ...

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
autonomous agents to roam around virtual stores and find desired products ... (owner) wants to send an agent to a virtual store ..... S. M., and Buttyan, L. (2000).

Agent Based Grid Computing
modified cost effective framework of a Grid. Computing ... Grid Computing architecture focuses on platform ..... director.com/article.php?articleid=2865.

Agent Based Grid Computing
agents to move to a system that contains services with which they want to interact and then to take advantage of being in the same hosts or network.

Paper on Efficient Cluster Head Selection Scheme for ...
In recent years WSNs gained attention in monitoring applications due to their ability to ..... Kilaso, “A Wireless Sensor Network for Weather and Disaster Alarm.

Power Efficient Transmission Scheme with Adaptive Cyclic Prefix for ...
Mar 3, 2011 - In order to obtain the density function of the maximum de- lay spread τ, we assume .... with Monte-Carlo method (105 times for average) and the.

Efficient Visual Digital Signature Scheme for E- Governance ... - IJRIT
In this paper, we introduce a new digital signature scheme based on the concept ... A Visual Digital Signature scheme is a method to support visual verification of ...

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
a finished intelligent tool prototype for intrusion detection. Intrusion ..... They receive alerts from correlator agents, analyse ... Monitoring and Surveillance.

A Speculative Control Scheme for an Energy-Efficient Banked ... - Scale
energy, and delay numbers from detailed circuit layouts in. Section 3. We present ..... have explored alternative designs for implementing a large ..... Technology.

A Speculative Control Scheme for an Energy-Efficient ...
The trend toward simulta- ... approaches retain a centralized microarchitecture, but divide ..... remove the conflict by setting enable signals such that a local port ...

FuzzyMatte: A Computationally Efficient Scheme for ...
Yuanjie Zheng. 1. Chandra Kambhamettu. 1. Jingyi Yu. 1. Thomas Bauer. 2. Karl Steiner. 3. 1 .... for complex images. 2. Previous Work. Single Image vs. Multiple Images The problem of al- ..... age SSD errors proposed by [8]. Our evaluation ...

Efficient Visual Digital Signature Scheme for E- Governance ... - IJRIT
Email Id: [email protected] , [email protected] ... Therefore, the sender (signer) has to depend on a computer to digitally sign a document. Also, the ...

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
Therefore, JAVA language will be chosen for its .... the same time, a language and a knowledge base, also called .... php?action view=submenu&option=tree&id.

A local mobility agent selection algorithm for mobile ...
Email: {yxu, hlee, vriz}@i2r.a-star.edu.sg. Abstract— The Mobile IP ... dent service. No matter where a host resides physically, the network should be able to identify it correctly with transpar- ent support for communications above network layer.

Effective Attack Models for Shilling Item-Based ... - Semantic Scholar
when automated software agents can generate the needed profiles, we ..... Indeed, the attacker might have demographic and marketing data that sorts the users ...

Mobile Information Agent using
using the internet as the network infrastructure to make available heterogeneous museum information .... Finally, .net framework deals with standards efficiently.

Block Utilization-Aware Buffer Replacement Scheme for Mobile NAND ...
Sep 9, 2014 - SUMMARY. NAND flash storage devices, such as eMMCs and mi-. croSD cards, are now widely used in mobile devices. In this paper, we pro-.

Cloud Computing For Agent-Based Urban Transportation System - IJRIT
with the urban-traffic management system using intelligent traffic clouds. .... management systems is based on cloud computing which has two roles: service ...