Keywords
|
Certificate Revocation, IP, Mobile Ad Hoc Networks (MANETS), Network Security, RSS, Threshold, and Sybil Attack |
INTRODUCTION
|
A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. The MANET topology is dynamic in nature due to the constant movement of nodes to communicate each other to share resources, so in a MANET each node not only works as a host but can also act as a router. While receiving data, nodes also need cooperation with each other to forward the data packets, thereby forming a wireless local area network. These great features also come with serious drawbacks from a security point of view. Security [6] is one of the essential requirements for mobile ad hoc network services to save resources and freeing the network from attackers. Characteristics of MANETs such as Distributed nature, Availability, Authentication, Confidentiality, Access control, and Integrity are the challenging one’s to safeguard the MANETs. Implementing security methods in such networks is therefore of most important to secure network from attackers. |
Due to infrastructure less feature of MANETs, every nodes in the network themselves participate in implementing the every aspect related to network functionalities where nodes acts as both users and routers, which transfers packets to other nodes and another feature of MANETs is the open network environment where nodes can join and leave the network freely which is provides a flower path for attackers to participate in network to cause disruption in resource sharing, therefore dynamic natures of MANETs is more vulnerable to various types of attacks than the wired networks. |
In this paper, we show that the mobility of nodes in a mobile ad hoc network can be used to detect and identify nodes that are part of a Sybil attack and process of certification revocation by neighboring nodes [5]. |
In the first method called Detection, our designed approach utilizes the RSS [3] [4] and IP or MAC which differentiates the legitimate node and Sybil nodes while every node entering into the radio range of the neighboring [5] nodes. Usually in MANETs nodes enters into the network and exits after the task based on this we define a threshold which differentiates legitimate node and Sybil node, in this we compare RSS of the entered node with the default threshold. Second through IP or MAC Comparison, a single node can detect Sybil attacks by recording the identities, namely the MAC or IP addresses of other nodes it hears transmitting. Over time, the node builds a profile of which nodes are heard together, which helps reveal Sybil attackers? |
In the second method so called Revocation process, among all security based issues in mobile ad hoc networks, the most widely used mechanism is so called certificate management which helps in invalidation of Sybil identities can be done to secure network. Certificate management to invalidate certificate encompasses two components which are detection and revocation. Certification Invalidation is a necessary to secure network communications. It is designed in such a way that communications between nodes in the network and Certification authority, who actually responsible for sharing and storing valid certificates. Certificate Revocation is the task of removing the certificates of nodes that have been detected as attackers by the neighborhood nodes. We can say in other way as, if a parent Sybil node creates multiple identities to compromise the MANET, those nodes should be cut off from the network so that they can be stopped from further participating in the network. In our proposed approach, we focus on the both detection and removing of Sybil nodes from the network to secure the MANETs from several threats. |
The remaining of the paper is organized as follows. Section 2 highlights the problem statement. In Section 3, we surveyed some papers on MANETs and put in related work. In Section 4, we described our proposed approach. This paper is concluded in Section 5. |
PROBLEM STATEMENT
|
Sybil attack has caused too much threaten to Mobile ad hoc network in routing, voting system, fair resource allocation, data aggregation and misbehavior detection. To mitigate these issues several research works have been taken out from many researchers. |
RELATED WORK
|
Many research works have investigated the problem of malicious node detection in MANETs. Most of these solutions deal with the detection of a single malicious node or require enormous resource in terms of time and cost for detecting cooperative Sybil attacks. |
Demirbas and Song proposed Received Signal Strength Indicator (RSSI) based solution to detect the Sybil attack in the wireless sensor networks. It is based on the fact that a malicious node with a number of fake IDs will have the same signal strength. They showed that even though RSSI is time varying and unreliable in general and radio transmission is nonisotropic; using the ratio of RSSIs from multiple receivers it is feasible to overcome these problems. The malicious node can vary its transmission power for its Sybil node leading to different received signal strength and hence inaccurate detection of Sybil identities. This approach is not suitable for the MANETs, if the nodes move with non-uniform speeds |
Piro et al. used the mobility of nodes as a feature to detect the Sybil attack in MANETs. This mechanism is based on the fact that all the Sybil nodes of a malicious node will always move together. If a set of nodes are seen together for a long period of time by an observer node, then they are suspected to be the identities of Sybil attacker. The accuracy of the detection mechanism can be further improved by using multiple trusted observer nodes. However, this scheme fails if the malicious node continuously changes the identities of its Sybil nodes. |
D. Monica, J. Leitao, L. Rodrigues, and C. Ribeiro proposed Resource testing scheme in this approach, various tasks are distributed to all identities of the network in order to test the resources of each node and to determine whether each independent node has sufficient resources to accomplish these tasks. These tests are carried out to check the computational ability, storage ability and network bandwidth of a node. A Sybil attack will not possess a sufficient amount of resources to perform the additional tests imposed on each Sybil identity. The drawback of this approach is that an attacker can get enough hardware resources, such as storage, memory, and network cards to accomplish these tasks. |
H. Liming, L. Xiehua, Y. Shutang, and L. Songnian proposed security scheme called “Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing,” This is a one-to-one mapping of a hardware device and a network entity. In other words, one hardware device, such as network card is bound to a single network entity. However, there is no way of preventing an entity from obtaining multiple hardware devices, for example in a scenario in which an attacker installs two network cards. Capkun in “Mobility helps peer-to-peer security” exploited mobility to enhance security in MANETs. A MANETs which is self organized, where there is no central authority, nodes establish security associations purely by mutual agreement. Users can activate a point-to point secure side channel (SSC) using infrared or wired media between their personal devices to authenticate each other and set up shared keys when they are in close proximity to each other. The author attempts to solve the problem of impersonation and Sybil attacks by binding a user’s face and identity using these SSCs. However, SSCs are based on the assumption that nodes are connected through wired or infrared connections. |
C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc networks, “proposed to detect Sybil identities by observing node dynamics. Nodes are keeping track of identities which are often seen together (Sybil identities) as opposed to the honest distinct nodes that move freely in different directions. However, the scheme will produce high false positives where node density is high, such as a conference hall or nodes moves in a same direction, such as a group of soldier moving toward a target. |
PROPOSED APPROACH
|
In this paper we proposed a smart duo approach where detection and removal of malicious nodes can be easily carried in the appropriate way. Prior to detection scheme we are going to construct a clump [10] so that communication among each node will continuous by sending HELLO packet each other. |
In the next process we carry the IP Assignment scheme which can be viewed as handshaking protocol because both the agents i.e. Server node and Client node confirms each other by broadcasting ACK messages, Client node requests IP address as it enters into the network and Server nodes delivers and assigns the IP address. |
Step 1. The client node periodically broadcasts messages to server nodes in the network using its hardware address (MAC). |
Step 2. When a server node receives this broadcast message, it responds by sending a reply message using its IP address and the client's hardware address. It is possible that two or more servers reply to the same broadcast message. |
Step 3. The client node sends an acknowledgment message back to the server node. If the client node has received more than one reply messages from different servers, it sends the acknowledgment message only to the 1st server and ignores the rest. |
Step 4. When the server node receives this message, it realizes that it is ready to assign a new IP address to the requesting client node. If the server has multiple blocks of IP addresses, it assigns one of these blocks to the client node. Otherwise, it divides its set of available IP addresses into two disjoint subsets. It then sends one subset to the client node and keeps the other subset with itself. The server also sends its latest version of IP address table to the client. |
Step 5. When the client receives this set of available IP addresses, it assigns itself the 1st IP address from this set and keeps the rest as its available set of IP addresses. It then sends a confirm message to the server indicating a successful configuration. |
Step 6. When the server receives this confirm message, it terminates the IP assignment process. |
Next in the detection scheme we are not using any other hardware like Antenna, GPS, etc. that’s why we called it as smart duo approach. We first collect data like Received Signal Strength, which is compared with the default threshold value, as we know natural entry of the nodes in the neighbor nodes RSS will be too low, but attacker nodes RSS value will be high, by this data we will plot graph RSS vs. Time, the we lookout for the IP or MAC address of each node entering into the radio range, why we are choosing IP or MAC details because an attacker may spoof IP address, to meet 100% accuracy in detection we collect both RSS and IP. |
In the second scheme we present the process of Removing of Sybil nodes by invalidating their certificates to protect network being attack. To Remove a Sybil attacker’s certificate, we are to considering three stages: first is accusation, where neighboring legitimate node checks any malicious nodes, if found it casts a accusation message to Certification authority, In the verifying stage CA verifies the certificate of the accuser node, if its valid certificate then CA casts a message to all nodes in the network which says Invalidate the Certificate of Sybil nodes this is notifying stage. |
SIMULATION AND RESULT
|
In order to implement and to check the effectiveness our scheme, we are using the necessary parameters listed in the below table 1. We considered the MANET environment within the 1000*1000m terrain area and the nodes in networks are deployed in the random uniform distribution with node speed limiting between 2 to 16m/s so that lower speeds improve detection accuracy. The UB−THRESHOLD is the averaged RSS value (in Watts) of several scenarios when a transmitter is moving with 10 m/s speed; The TIME−THRESHOLD is the average (maximum) time in which a node should listen from another node, otherwise that identity will be considered as out of range or previous identity of a whitewasher. Shorter time intervals will increase identity revalidations in the network; whereas lengthy intervals will increase table sizes in network nodes; The LIST−SIZE is the maximum RSS records retained for an identity or address. We used 10 as an arbitrary number of records per identity; however, it can be increased depending upon the memory capacity of nodes. |
In Fig 3 it reveals that as the node density in network increases it affects in the detection accuracy to conquer this issue we carried out two processes i.e. RSS comparison and IP spoof checking in detection scheme to meet up to 100% accuracy. In this fig when detection is true positive i.e. in the total no of Sybil identities how many malicious nodes correctly detected. In Fig 4 it shows the result when detection is false positive. |
In Fig 5 it shows that how revocation is almost successful as though attacker nodes are more in the network. In the last fig it reveals the time taken in revocation process, as the no of attacker nodes are more there is slight increase in the time. |
CONCLUSION
|
The Secure communications within MANETs remain a key issue because of due to high mobility nodes in MANETs. In this paper, to secure the mobile ad hoc networks, we proposed a smart approach RSS and IP based Sybil attack detection method which can produces close to 100% accuracy in identifying Sybil nodes and Certificate invalidation method to overcome Sybil attacker to further participation in the network. The proposed scheme can remove an attacker node by a single node which is nearer to Certification authority and reduces time in notifying as well as in certificate. |
ACKNOWLEDGEMENT
|
I would like to extend my deepest thanks to my guide Mrs. Madhuri T, Assistant Professor, ISE, TOCE, Bangalore who guided me well to put my ideas in this paper. |
|
Tables at a glance
|
|
Table 1 |
|
|
Figures at a glance
|
|
|
|
Figure 1 |
Figure 2 |
Figure 3 |
|
|
|
|
|
Figure 4 |
Figure 5 |
Figure 6 |
|
|
References
|
- J. Douceur, “The Sybil attack," First International Workshop on Peer-to-Peer Systems, pp. 251-260, Mar. 2002.
- C. Piro, C. Shields, B. N. Levine, (2006), “Detecting the Sybil Attack in Mobile Ad-hoc Networks”, Securecomm and Workshops, pp 1-11.
- Gilles Guette Sybil Nodes Detection Based on Received Signal Strength Variations within VANET International Journal of Network Security, Vol.9, No.1, PP.22 {33, July 2009
- M. Demirbas and Y. W. Song, (2006), “An RSSI-Based Scheme for Sybil Attack Detection in Wireless Sensor Networks”, International Workshop on Wireless Mobile Multimedia (WOWMOM’06), New York, USA. pp. 564–570.
- K. -F. Ssu, W-T. Wang and W-C. Chang, (2009), “Detecting Sybil attacks in Wireless Sensor Networks using Neighboring Information”, Computer Networks, vol. 53, (18), pp.3042-3056.
- T. Suen, and A. Yasinsac, “Ad hoc network security: Peer identication and authentication using signal properties," Systems, Man and Cybernetics (SMC) Information Assurance Workshop, pp. 432-433, June 2005.
- A. Tangpong, G. Kesidis, H. Hung-Yuan, and A. Hurson, “Robust Sybil detection for MANETs,” in Proc. 18th ICCCN 2009, pp. 1–6.
- K. Park, H. Nishiyama, N. Ansari, and N. Kato, “Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks,” Proc. IEEE 71st Vehicular Technology Conf. (VTC ’10), May 16-19, 2010.
- W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A Study on Certificate Revocation in Mobile Ad Hoc Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June 2011.
- J. Lian, K. Naik, and G.B. Agnew, “A Framework for Evaluating the Performance of Cluster Algorithms for Hierarchical Networks,” IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1478-1489, Dec. 2007.
- J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla, “A Secure Ad-Hoc Routing Approach Using Localized Self-Healing Communities,” Proc. Sixth ACM Int’l Symp. Mobile Ad hoc Networking and Computing, pp. 254-265. 2005.
|