27-08-2014, 02:11 PM
ADOPTING HYBRID CRYPTOGRAPHIC TECHNIQUES FOR REDUCING NETWORK OVERHEAD IN MANET
ADOPTING HYBRID.docx (Size: 25.04 KB / Downloads: 18)
Abstract:
MANET is a collection of mobile nodes and it is an infrastructure less wireless mobile network. They have a highly dynamic topology with nodes having a transceiver to send and receiver data. It is an self-configuring network of mobile routers connected by wireless links. Network is an autonomous transistory association of mobile nodes within each other sends range can communicate directly and are responsible for dynamically discovering each other. Some of the issues in MANET are Routing, Security and Reliability, Quality of Service, Power Consumption, Packet Transmission, Bandwidth, Data Caching, Replication, Lack of centralized Management and Resource Availability. Security is a paramount concern in MANET because of its intrinsic vulnerabilities. By the survey made in different paper the improvements of technology and cut in hardware costs a current trend of expanding MANETs into industrial application. And are witnessed that to adjust such a trend should strongly believe that it is vital to address its security issues. Packet dropping attack is always being a major thread to the security in MANET. So a novel IDS named EAACK protocol is designed, but the result demonstrated that protocol perform poorly such as receiver collision, limited transmission power, and false misbehavior report. Whereas optimal results are obtained by DSA and RSA algorithms. With the help of Advanced Encryption Standard and Secure Hash Function there is a possibility of reducing the network overhead can be done using adopting hybrid cryptographic techniques.
INTRODUCTION
Mobile Ad Hoc Network (MANET) is a self-creating, self-organizing and self-administering wireless network. MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links.The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. It is a self-configuring network of mobile nodes connected by wire-less links the union of which forms an arbitrary topology. The nodes are free to move randomly and organize them-selves arbitrarily thus, the network’s wireless topology may change rapidly and unpredictably.
Each node in a MANET acts as a router, and communicates with each other. A large variety of MANET applications have been developed. For example, a MANET can be used in special situations, where installing infrastructure may be difficult, or even infeasible, such as a battlefield or a disaster area.Such networks are aimed to provide communication capabilities to areas where limited or no communication infrastructures exist.Due to nodal mobility, the network topology may change rapidly and unpredictably over time. The network is decentralized, where network organization and message delivery must be executed by the nodes themselves. Message routing is a problem in a decentralize environment where the topology fluctuates.That is here nodes within each other’s radio range communicate directly via wireless links while those are far apart uses other nodes as relays. This kind of network is well suited for the mission critical applications such as emergency relief, military operations where no pre-deployed infrastructure exists for communication.Due to the lack of authorization facilities, volatile network topology it is hard to detect malicious nodes, MANETs are highly vulnerable to attacks. Finally, in MANET nodes might be battery-powered and might have very limited resources, which may make the use of heavy-weight security solutions undesirable. Many different types of attacks have been identified.In such a network, each node not only plays the role of an end system, but also acts as a router that forwards packets to desired destination nodes. These nodes are capable of both single and multi-hop communication.Mobility and the absence of any fixed infrastructure make MANETs very attractive for military and rescue operations, sensor networks and time-critical applications. It deals with the Denial of service attack (DoS) by a selfish node; this is the most common form of attack which decreases the network performance.The nodes in a MANET in order to keep up the fairness of distribution in the network ‘channel’ are expected to wait for a pre specified period of time between successive transmissions.As one might expect the MANET is a self made network without any arbitrator to chastise nodes which fails to follow the protocols. A node might choose nonrandom and t back off value in order to transmit more frequently. This will on one hand enable that node to more effectively, utilize the channel and improve its throughput.
III. METHODOLOGY
The EAACK scheme was extended with the introduction of digital signature to prevent the attacker from forging acknowledgement packets. EAACK is consisted of three major parts, namely: Acknowledge (ACK), Secure-Acknowledge (S-ACK) and Misbehavior Report Authentication (MRA). In order to distinguish different packet types in different schemes, they included a two-bit packet header in EAACK. According to the Internet draft of DSR , there are six bits reserved in DSR header. In EAACK, two of the six bits were used to flag different type of packets. In the proposed scheme it was assumed that the link between each node in the network is bi-directional. Furthermore, for each communication process, both the source node and the destination node are not malicious. Unless specified, all acknowledgement packets described in this research are required to be digitally signed by its sender and verified by its receiver.EACCK mechanism depends only on ACK and chances to make false acknowledgement.DSR based on source routing mechanism,if any link failure occurs in the network ,DSR send a unicast packet to the source giving the information about the broken link but source may change dynamically. DSR has more routing overhead, less frequent route discovery and E2E delay
CONCLUSION
The analysis designed an attack detection system called the EACK IDS, featuring active response capabilities. Through the incorporation of principles pertaining to attack Encryption algorithm, the AES. This system described a secure based EACK intrusion detection approach in MANET. This approach is simple but it requires monitoring many features. We apply AES in our feature selection and found that the algorithm is accurate by verifying. The proposed EACK with AES outperforms then all other schemes and capable of detecting false misbehavior nodes and produce the report. Experimental studies have shown that algorithm can decrease the number attacks and features dramatically with very similar detection rate