22-12-2012, 06:01 PM
SECURE NEIGHBOR DISCOVERY IN MOBILE AD HOC NETWORKS
Abstract—
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. In this paper we present Mobile Secure Neighbor Discovery (MSND), which offers a measure of protection against wormholes by allowing participating mobile nodes to securely determine if they are neighbors. To the best of our knowledge, this work is the first to secure neighbor discovery in mobile adhoc networks. MSND leverages concepts of graph rigidity for wormhole detection. We prove security properties of our protocol, and demonstrate its effectiveness through extensive simulations and a real system evaluation employing Epic motes and iRobot robots.
EXISTING SYSTEM:
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications.
Initial neighbor discovery is usually performed when the sensor has no clue about the structure of its immediate surroundings.
Disadvantages:
1. In networks with continuously heavy traffic.
2. Long-term process.
3. Greater expense of energy than required in our scheme.
PROPOSED SYSTEM:
Every neighbor discovery protocol is composed of a series of packet transmissions. In a weak protocol, these attacks can be launched to relay neighbor discovery packets to other areas of the network, in order to convince distant nodes to believe that they are true neighbors.
A secure neighbor discovery protocol must reject any claiming neighbor farther than this distance. The most challenging threat in designing externally resistant neighbor discovery protocols is the wormhole (or relaying) attack and the easiest way to block this attack is estimating the distance between the nodes.
Advantages:
1. Detect their immediate neighbors.
2. Message does not collide with another.
3. Every node discovers its hidden neighbors independently.
4. A protocol (MSND) for detecting the presence of wormholes when mobile nodes participate.
MODEL DESCRIPTION
1. CLIENT – SERVER:
Client – Server computing is distributed access. Server accepts requests for data from client and returns the result to the client. By separating data from the computation processing, the compute server’s processing capabilities can be optimized. Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system.
2. WORMHOLE DETECTION
Neighbor-discovery-related attacks in adhoc and sensor networks. Wormhole attack is a well-known representative of this family. In the wormhole (tunneling) attack, two (or more) adversarial nodes try to transfer information through a dedicated channel between themselves and then use it in another part of the network. This attack can be implemented both by internal and external adversarial nodes.
3. NEIGHBOR DISCOVERY MODEL:
Neighbor Discovery is studied for general ad-hoc wireless networks. A node decides randomly when to initiate the transmission of a HELLO message. If its message does not collide with another HELLO, the node is considered to be discovered. The goal is to determine the HELLO transmission frequency, and the duration of the neighbor discovery process. Neighbor discovery protocol is composed of a series of packet transmissions. In a weak protocol, these attacks can be launched to relay neighbor discovery packets to other areas of the network, in order to convince distant nodes to believe that they are true neighbors.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Color.
• Mouse : Logitech.
• Ram : 512 MB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows XP Professional.
• Coding Language : C#.NET