(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization
1. Avoiding Packet Dropping
Misbehavior in VANET Using Trust
Based Ant Colony Optimization
Prepared By:
Kishan N. Patel
CSE and IT Department
SVMIT, Bharuch
2. OUTLINES
Introduction of VANET
Security in VANET
Security
Trust
Metaheuristic Approach
Why Metaheuristic ?
Ant Colony Optimization
Literature Survey
Problems
Trust Based ACO
Conclusion and Future work
References
Kishan Patel M.E (I.T) En no - 130450723011 2
3. INTRODUCTION OF VANET
Vehicular ad hoc network (VANET) [1] uses cars as mobile nodes in a MANET to create a
mobile network.
Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).
Fig 1. Vehicular Ad hoc network [1]
Cars fall out of the signal range and drop out of the network, other cars can join, by connecting
vehicles to one another form a wireless network called “Vehicular Ad Hoc Network”.
Kishan Patel M.E (I.T) En no - 130450723011 3
4. SECURITY IN VANET
The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
Adversaries could break the system.
o Data sinkholes (black hole).
o Gray hole
Security measures must be taken to avoid malicious attacks on the system
Kishan Patel M.E (I.T) En no - 130450723011 4
5. ADVANTAGES AND DISADVANTAGES
Advantages
Public Safety
Traveller Information Support
Air pollution emission measurement and reduction.
Disadvantages
Wasted band width
Increasing network congestion
Kishan Patel M.E (I.T) En no - 130450723011 5
6. SECURITY
The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources (includes hardware, software,
firmware, information/data, and telecommunications).”
6
7. CONFIDENTIALITY, INTEGRITY, AND
AVAILABILITY
Confidentiality
Preserving the confidentiality of information means preventing unauthorized parties from
accessing the information or perhaps even being aware of the existence of the information.
I.e., secrecy.
Integrity
Maintaining the integrity of information means that only authorized parties can manipulate
the information and do so only in authorized ways.
Availability
Resources are available if they are accessible by authorized parties on all appropriate
occasions.
7
8. PACKET DROPPING ATTACK
Packet dropping attacks are widespread DoS attacks on Ad hoc networks.
Fig 3. Packet dropper behavior [3]
Packet dropper AODV or Packet dropping attack is the AODV under malicious attack.
As shown in Figure 4 behavior of the attacker M that drops the packets sent by source A towards
destination C.
Kishan Patel M.E (I.T) En no - 130450723011 8
9. WHAT IS TRUST?
Trust is a particular level of the subjective prob. with which an agent will perform a
particular action, before [we] can monitor such action and in a context in which it
affects [our] own action.
Trust is context-dependent, dynamic & non-monotonic.
Types of Trust
Interpersonal (agent & context specific)
Structural (system within which trust exists)
Dispositional (independent of agent & context)
9
10. 10
TWO TYPES OF MODELS
Trust Management models
◦ Certificate-based
◦ Reputation-based (behavior observed directly or indirectly)
◦ Recommendations: trust information shared among peers
11. TRUST MANAGEMENT APPROACHES
Individual Initiative
Each agent is responsible for his own fate.
Global Trust
Each peer in the system has a unique global trust value that other peers can access.
Federated Trust
Management of trust-related activities across multiple and heterogeneous security domains
and autonomous systems.
Deals with strategies for managing inter-domain behaviors
11
12. METAHEURISTIC APPROACH
Heuristic [2] means to find or to discover by trial and error. And meta means higher level
and metaheuristics generally perform better than simple heuristics.
There are two techniques:
1. Online metaheuristic approach
2.Offline metaheuristic approach.
The main difference between them is the moment when they are applied for solving
problem.
Metaheuristic Algorithms
1) Ant colony optimization (ACO)
2) Tabu search (TS)
3) Variable neighborhood search (VNS).
Kishan Patel M.E (I.T) En no - 130450723011 12
13. WHY METAHEURISTIC REQUIRED ?
Metaheuristics [2] are used for solving the security and routing problems in ad hoc
networks.
Security problem in the network may be due to selfish and malicious node.
Metaheuristic approach can be used for overcoming the problem.
For route optimization e.g selecting the shortest and quality route from source to
destination.
Kishan Patel M.E (I.T) En no - 130450723011 13
14. ANT COLONY OPTIMIZATION
The inspiring source of ACO [3] is the foraging behavior of real ants.
This behavior enables ants to find shortest paths between food sources and their nest.
While walking from food sources to the nest and vice versa, ants deposit a substance
called pheromone on the ground.
Fig 2. Ant Mechanism [3]
Once an ant has built a solution, it can retrace the same path backward and update the
pheromone trails of the used component .
Kishan Patel M.E (I.T) En no - 130450723011 14
16. Title Mechanism / Algorithm Purpose Methodology
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
for Mobile Ad-Hoc Networks.[4]
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
To avoid trust value propagation.
To minimize the number of
messages been exchanged. To find
the best route for delivery.
Trust value of each node is
directly aped to the route and no
need to propagate the trust values
like other trusted protocols.
Trust Based QOS Protocol(TBQP)
using Metaheuristic Genetic
Algorithm for Optimizing and
Securing MANET. [5]
Trust Based QOS Protocol
(TBQP) Using Meta-heuristic
Genetic Algorithm.
To provide QOS by selecting the
fittest shortest route among the
number of routes to provide
optimization. Acquaintance
And Authentication of packets for
routing in network.
Intriguing a trust based packet
delivering scheme for detecting
and isolating the malignant nodes
using the routing layer
information. A trust weigh is
maintained and a node is
remunerated by decreasing or
increasing the trust weigh value. If
the trust weigh falls below a trust
threshold, node is marked as
malicious node.
Performance analysis of optimized
Trust AODV using ant
Algorithms. [6]
Ant colony optimization To sustain security against the dos
attacks.
At agents can move freely to find
destination it will update positive
pheromone to the routing table.
The pheromone is deposited if
node is trusted.
Kishan Patel M.E (I.T) En no - 130450723011 16
Table 1. Survey of various Metaheuristics
17. Title Mechanism / Algorithm Purpose Methodology
Ant Colony and Load Balancing
Optimizations for AODV Routing
Protocol. [7]
Multi-Route AODV Ant routing
(MRAA)
Load balancing( LBMRAA)
To reduce
the routing overhead, buffer
overflow, end-to-end delay and
increase the performance
Data packets are balanced
over discovered paths and energy
consumption is distributed across
many nodes through network.
Secure Ant-Based Routing
Protocol for Wireless Sensor
Network. [8]
Secure Ant-Based Routing
Protocol(SARP)
To provide Route security in
network.
It uses two paths for data
forwarding to overcome the
problem of node failure and to
increase the efficiency of overall
network.
MANET link Performance using
Ant Colony Optimization and
Particle Swarm Optimization
Algorithms. [9]
Ant colony optimization and
Particle swarm optimization.
Finds the best solution over the
particle’s position and velocity
with the cost and minimum. End-
to-end delay.
Ant Colony Optimization
(ACO) algorithm uses mobile
agents as ants to discover feasible
and best path in a network and
PSO finds the best solution over
the particle’s position and velocity
with the objective of cost and
minimum End-to-end delay.
AntTrust: A Novel Ant Routing
Protocol forWireless Ad-hoc
Network Based on Trust Between
Nodes. [10]
Ant Trust Routing Protocol To increase the security of route.
And malicious manipulations
of data packets.
AntTrust is located precisely in the
context of the security of routing.
It also facilitates malicious
manipulations of data packets.
Kishan Patel M.E (I.T) En no - 130450723011 17
[11] [12] [13] [14] ….
18. PROBLEMS IN NETWORK
Due to the openness in network topology and absence of a centralized administration in
management, they are vulnerable to various attacks from malicious nodes.
The networks work well only if the nodes are trusty and behave cooperatively.
Some other problem are:
1) Difficult to evaluate trustworthiness of nodes
2) Security of data transmission
3) Fails to remove malicious nodes during route discovery process and therefore doesn´t succeed
to transfer all data packets.
Main Objective of Proposed System :
1) To enhance the security
2) To address the packet dropping misbehavior
3) Distinguish malicious nodes
Kishan Patel M.E (I.T) En no - 130450723011 18
20. ATTACKER MODEL
Kishan Patel M.E (I.T) En no - 130450723011 20
FD
CB
H
K
A
Source
node
Destination
Node
Malicious
node
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RRE
P
RREP
RRE
P
RREQ
RREQ
RREP
RREP
C Malicious node
A Source node
K Destination node
Packet Dropping attack model
RRE
P
RRE
P
21. TACO-TRUST BASED ANT COLONY OPTIMIZATION
Kishan Patel M.E (I.T) En no - 130450723011 21
T.V= Trust value
P.V= Pheromone Value
N.T= Neighbor Table
22. [1] Wang, Yu, and Fan Li. "Vehicular ad hoc networks." Guide to wireless ad hoc networks. Springer
London, 2009. 503-525.
[2] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic
Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication
and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.
[3] Kishan Patel, Rutvij Jhaveri, “Isolating Packet Dropping Misbehavior in VANET using Ant Colony
Optimization”, International Journal of Computer Applications (IJCA-2015), June 20 2015.
[4] Bahaa-Eldin, Ayman M. "TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for
Mobile Ad-Hoc Networks." In Bio-inspiring Cyber Security and Cloud Services: Trends and
Innovations, pp. 151-184. Springer Berlin Heidelberg, 2014.
[5] Zafar, Sherin, and M. K. Soni. "Trust based QOS protocol (TBQP) using meta-heuristic genetic
algorithm for optimizing and securing MANET." InOptimization, Reliabilty, and Information
Technology (ICROIT), 2014 International Conference on, pp. 173-177. IEEE, 2014.
REFERENCES
Kishan Patel M.E (I.T) En no - 130450723011 22
23. [6] Simaremare, Harris, Abdelhafid Abouaissa, Riri Fitri Sari, and Pascal Lorenz. "Performance analysis
of optimized trust AODV using ant algorithm." InCommunications (ICC), 2014 IEEE International
Conference on, pp. 1843-1848. IEEE, 2014.
[7] Ahmed M. Abd Elmoniem, et al. "Ant Colony and Load Balancing Optimizations for AODV Routing
Protocol.
[8] Alrajeh, Nabil Ali, Mohamad Souheil Alabed, and Mohamed Shaaban Elwahiby. "Secure ant-based
routing protocol for wireless sensor network." International Journal of Distributed Sensor
Networks 2013 (2013).
[9] Nancharaiah, B., and B. Chandra Mohan. "MANET link performance using ant colony optimization
and particle swarm optimization algorithms." InCommunications and Signal Processing (ICCSP),
2013 International Conference on, pp. 767-770. IEEE, 2013.
[10] Melchor, Carlos Aguilar, Boussad Ait Salem, Philippe Gaborit, and Karim Tamine. "AntTrust: A
novel ant routing protocol for wireless ad-hoc network based on trust between nodes." In Availability,
Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1052-1059. IEEE,
2008.
Kishan Patel M.E (I.T) En no - 130450723011 23
24. [11] Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly
detection in network intrusion detection system using particle swarm optimization based machine
learning techniques." InProceedings of the International Conference on Frontiers of Intelligent
Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.
[12] Sreelaja, N. K., and G. A. Vijayalakshmi Pai. "Swarm intelligence based approach for sinkhole attack
detection in wireless sensor networks." Applied Soft Computing 19 (2014): 68-79.
[13] Sahoo, Rashmi Ranjan, Rameswar Panda, Dhiren Kumar Behera, and Mrinal Kanti Naskar. "A trust
based clustering with Ant Colony Routing in VANET." InComputing Communication & Networking
Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-8. IEEE, 2012.
[14] Kaur, Harmandeep, and Ramanjit Singh. "A NOVELAPPROACH TO PREVENT BLACK HOLE
ATTACK IN WIRELESS SENSOR NETWORK."
[15] Zhou, Mingxing, and Jing Liu. "A memetic algorithm for enhancing the robustness of scale-free
networks against malicious attacks." Physical A: Statistical Mechanics and its Applications 410 (2014):
131-143.
[16] Lo, Chi-Chun, Chun-Chieh Huang, and Wen-Tian Liang. "Mitigating Routing Misbehavior Using Ant-
Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks." IJCSNS 10, no. 5 (2010): 46.
Kishan Patel M.E (I.T) En no - 130450723011 24