SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
Security Issues in the Ad-Hoc Network
Environment
1
Chinmaya Kumar Nayak, 2
Manoranjan Pradhan
1
Assistant Professor, Department of Computer Science & Engineering, Gandhi Institute for Technological Advancement (GITA),
Bhubaneswar, Odisha, India
2Ph. D, Professor and Head of the Department, Department of Computer Science & Engineering,
Gandhi Institute for Technological Advancement (GITA), Bhubaneswar, Odisha, India
Abstract: Ad-hoc networks are an emerging area of mobile computing. There are various challenges that are faced in the Ad-hoc envi-
ronment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for tempo-
rary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements
and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc
operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper
we attempt to analyze the demands of Ad-hoc environment. We focus on Ad-hoc routing. The key issues concerning these areas have
been addressed here. We have tried to compile solutions to these problems that have been active areas of research.
Keywords: Security problem, SAR, Message Authentication Code, Adhoc network.
1. Introduction
The contemporary rout ing p rotocols for A dhoc networks
cope we ll w ith dyn amically changing topology but are not
designed to accommodate defense against malicious attack-
ers. No single st andard protocol. Capture common security
threats a nd pr ovide guidelines to sec ure r outing protocol.
Routers exchange ne twork t opology inf ormally i n order to
establish routes between nodes - a nother potential target for
malicious attackers who intend to bring down the network.
External attackers - injects erroneous routing info, replaying
old routing info or distorting routing info in order to partition
a network or overloading a network with retransmissions and
inefficient routing. Internal compromised no des - mo re s e-
vere de tection an d c orrection m ore d ifficult Routing info
signed by each node won't work since compromised nodes
can generate valid signatures using their private keys [2][3].
Detection of c ompromised n odes through rou ting inf orma-
tion is also difficult due to dynamic topology of Adhoc net-
works. Some properties of a dhoc ne tworks to fa cilitate se -
cure routing can be used. Routing protocols for Adhoc net-
works must handle outdated routing information to accom-
modate dynamic changing topology. False routing informa-
tion generated by compromised nodes can also be regarded
as outdated routing information. As l ong as there are suffi-
cient no. of valid nodes, the routing protocol should be able
to b ypass the com promised no des, thi s however needs t he
existence of multiple, possibly disjoint routes between nodes.
Routing protocol should be able to make use of an alternate
route if the existing one appears to have faulted [4] [5].
2. Secure Routing In Ad-Hoc Networks
2.1 Problems associated with Ad-hoc routing
2.1.1 Infrastructure
An Ad-hoc network is an infrastructure less network. Unlike
traditional networks t here is no pre-deployed infrastructure
such as cen trally a dministered rou ters or strict p olicy for
supporting en d-to-end ro uting. The n odes themselves are
responsible for routing packets [6].
Figure 1: Routing in Ad-hoc networks and Routing in tradi-
tional networks using router
Each n ode re lies o n t he o ther nodes to r oute pac kets for
them. Mobile nodes in direct radio range of one another can
communicate directly, but no des t hat are t oo f ar apart to
communicate directly must depend on the intermediate nodes
to route messages for them.
2.1.2 Frequent changes in network topology
Ad-hoc networks contain nodes that may frequently change
their locations. Hence the topology in these networks is high-
ly dynamic. This results in frequently changing neighbors on
whom a n ode re lies for ro uting. A s a resu lt tr aditional
routing protocols can no longer be used in such an environ-
ment. This mandates new routing protocols that can handle
Paper ID: 05130918 68 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
the dynamic topology by facilitating fresh route discoveries.
2.1.3 Problems associated with wirelesscommunication
As the com munication is through w ireless me dium, it is
possible for any intruder t o tap the c ommunication easily.
Wireless channels offer poor protection and routing related
control messages can be tampered. The wireless medium is
susceptible to sig nal interference, ja mming, eavesdropping
and distortion [6]. An intruder can easily eavesdrop to know
sensitive rou ting information or jam the s ignals to prevent
propagation of routing information or worse interrupt mes-
sages and distort them to m anipulate routes. Routing proto-
cols should be well adopted to handle such problems.
2.1.4 Problems with existing Ad-hoc routing protocols
2.1.4.1 Implicit trust relationship between neighbors
Current Ad-hoc routing protocols inherently trust all partici-
pants. Most Ad-hoc r outing protocols ar e co operative b y
nature and de pend o n ne ighboring n odes t o r oute pac kets.
This naive trust model allows malicious nodes to paralyze an
Ad-hoc network by inserting erroneous routing updates, rep-
laying old messages, changing routing updates or advertising
incorrect routing information. While these attacks are possi-
ble in fixed network as well, the Ad-hoc environment magni-
fies this makes detection difficult [7].
2.1.4.2 Throughput
Ad-hoc ne tworks m aximize t otal network t hroughput b y
using all available nodes for routing and forwarding. How-
ever a node may misbehave by agreeing to forward packets
and then failing to do so, because it is ove rloaded, selfish,
malicious or broken.
Figure 2: Forwarding packet by a malicious node
Misbehaving nodes can be a significant problem [8] [9]. Al-
though th e average lo ss in th roughput due to misb ehaving
nodes is not too high, in the worst case it is very high.
2.1.4.3 Attacks Using Modification of Protocol Fields of
Messages
Current routing protocols assume that nodes do not alter the
protocol fields of m essages passed among no des. R outing
protocol p ackets c arry i mportant control information that
governs the b ehavior of da ta t ransmission i n Ad-hoc n et-
works. Since the level of trust in a traditional Ad-hoc net-
work cannot be measured or enforced, enemy nodes or com-
promised nodes may participate directly in the route discov-
ery and may intercept and filter routing protocol packets to
disrupt c ommunication. M alicious nod es ca n ea sily ca use
redirection o f network traffic an d DOS at tacks by simply
altering these fields. For example, in the network illustrated
in Figu re 2, a mal icious node M c ould keep t raffic f rom
reaching X by consistently advertising to B a shorter route to
X than the route to X, which C is advertising.
3. Solutions to problems in Ad-hoc-routing
3.1 Concealing Network topology or structure
3.1.1 Using independent Security Agents (SA)
This method is called the Non-disclosure method (NDM). In
NDM a number of independent security agents (SA) are dis-
tributed over the network. Each of these agents SAi owns a
pair of as ymmetric cr yptographic ke ys K SAi a nd K SAi-.
Sender s wishes to transmit a message M to receiver R with-
out disclosing his location. S s ends the message using a
number of S As: SA1  SA2   SAN  R. The mes-
sage is e ncapsulated N t imes us ing the pu blic keys
KSA1
KSAn as follows.
M’ = KSA1 (SA2, (KSA2 (SA3 (
 (KSAN(R, M))
))))
To deliver the packet, S sen ds it to the first security agent
SA1 w hich decrypts t he o uter m ost encapsulation a nd for-
wards the packet to the next agent. Each SA knows only the
address of the previous and the next hop. The last agent fi-
nally decrypts the message and forwards it to R. It introduces
a large amount of ove rhead and hence is no t preferred for
routing.
3.1.2 Zone Routing Protocol (ZRP)
It is a h ierarchical protocol where the network is divided in
to zones. The zones operate independently from each other.
ZRP involves two separate routing protocols. Such a hierar-
chical routing structure is fa vorable with respect to sec urity
since a well designed a lgorithm sh ould be a ble t o c ontain
certain pr oblems t o sma ll portion of t he hier archy leav ing
other portions unaffected.
ZRP has some features that appear to make it somewhat less
susceptible to routing at tacks. Its hi erarchical orga nization
hides some of the routing information within the zones. ZRP
provides som e form of security aga inst disclosing netw ork
topology by dividing routing into zones, which conceal the
internal organization.
3.2 Installing extra facilities in the network to mitigate
routing misbehavior
Misbehaving nodes can reduce network throughput and re-
sult in poor robustness. Sergio Marti Et al propose a tech-
nique to i dentify a nd is olate such n odes by i nstalling a
watchdog and a pathrater in t he A d-hoc network on ea ch
node.
3.2.1 Assumptions
It is as sumed that the wireless links are bi-directional. Most
MAC layer protocols require this. It also assumes support for
promiscuous mode of operation for the nodes. This helps the
nodes supervise each other operation. The t hird assumption
is that the underlying Ad-hoc routing protocol is DSR. It is
Paper ID: 05130918 69 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
possible to extend the mechanism to o ther routing protocols
as well.
3.2.2 Mechanism
The watchdog identifies misbehaving nodes, while the path-
rater avoids routing pa ckets throu gh these node s. When a
node forwards a packet, the node’s watchdog verifies that the
next node in the path also forwards the packet. The watchdog
does this b y listening pr omiscuously t o t he ne xt node’s
transmissions. If t he next node does not forward the packet,
then it is misbehaving. The pathrater uses this knowledge of
misbehaving nodes to choose the network path that is most
likely to deliver packets.
3.2.3 Watchdog
The w atchdog method de tects m isbehaving nodes. F igure3
illustrates how the watchdog works. Node A cannot transmit
all the way to node C, but it can listen in on node B’s traffic.
Thus, when A transmits a packet for B to forward to C, A
can often tell if B transmits the packet. If encryption is n ot
performed separately for each link, which can be expensive,
then A can also tell if B has tampered with the payload or the
header.
Figure 3: Operation of the watchdog.
We implement the watchdog by maintaining a bu ffer of re-
cently se nt packets a nd c omparing ea ch overheard packet
with the packet in the buffer to see if there is a match. If so,
the pa cket i n the buffer is removed a nd forg otten by th e
watchdog, since it has been forwarded on. If the packet has
remained in the buffer for longer than a certain timeout, the
watchdog increments a failure tally for the node responsible
for forwarding on the packet. If t he tally exceeds a certain
threshold bandwidth, it de termines tha t th e node is misbe-
having and sends a message to the source notifying it of the
misbehaving node.
Advantages: The watchdog mechanism can detect misbehav-
ing nodes at forwarding level and not just the link level.
Weakness: It migh t not dete ct mis behaving no des in pres-
ence of 1) ambi guous c ollusions 2) re ceiver collusions 3)
limited transmission power 4) false misbehavior 5) collision
6) partial dropping.
3.2.4 Analysis of Watchdog's weaknesses
Figure 4: Ambiguous Collision
3.2.4.1 Ambiguous collision
The ambiguous collision problem prevents A from overhear-
ing transm issions fr om B. As fi gure3.5 il lustrates, a packet
collision occur at A while it is listening for B to forward on a
packet. A does not know if the collision was caused by for-
warding on a p acket as it should or if B never forwarded the
packet and t he collision w as caused by o ther nod es in A’s
neighborhood. Bec ause of t his un certainty, A sh ould i nstead
continue to watch B over a period of time.
Figure 5: Receiver Collision.
3.2.4.2 Receiver collision
In the re ceiver collision pr oblem, no de A can o nly t ell
whether B sends the packet to C, but it cannot tell if C rece-
ives it. If a coll ision occurs at C when B first forwards the
packet, A onl y see s B f orwarding the packet a nd a ssumes
that C successfully receives it. Thus, B could skip retransmit-
ting the packet and evade detection [9][10].
3.2.4.3 False misbehavior
False misbehavior can occur when nodes falsely report other
nodes as m isbehaving. A malic ious node could a ttempt t o
partition the network by claiming that some nodes following
it in the pat h are misbehaving. For instance, node A could
report that node B i s not forwarding packets when in fact it
is. This will cause S to mark B as misbehaving when A is the
culprit. This behavior, however, will be detected. Since A is
passing mes sages onto B (as verified by S), t hen any ac-
knowledgements from D to S will go through A to S, and S
will wonder why it receives replies from D when supposedly
B dropped packets in the forward direction. In addition, if A
drops acknowledgements to hide them from S, the no de B
will detect this misbehavior and will report it to D.
3.2.4.4 Limited transmission power
Another problem is that a misbehaving node that can control
its transmission power can circumvent the watchdog. A node
could l imit its t ransmission pow er suc h that the s ignal i s
strong enough to be overheard by the previous node but too
weak to be received by the true recipient.
3.2.4.5 Multiple colluding nodes
Multiple nodes in collusion can mount a mo re sophisticated
attack. For example, B and C from figure3.4 could collude to
cause mi schief. In t his ca se, B fo rwards a packet to C but
does not report to A when C drops the packet. Because of its
limitation, it may be necessary to disallow two consecutive
untrusted nodes in a routing path.
3.2.4.6 Partial dropping
A node can circumvent the watchdog by dropping packets at
a lower rate than the watchdog’s configured minimum mis-
behavior t hreshold. Al though t he watchdog will no t d etect
this node as misbehaving, this node is forced to forward at
the threshold bandwidth. In this way the watchdog serves to
enforce this minimum bandwidth. For the watchdog to work
properly it must know where a packet should be in two hops.
3.3 Pathrater
Just like the watchdog, the pathrater is ru n by eac h node. It
Paper ID: 05130918 70 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
combines the knowledge o f misbeha ving nodes w ith li nk
reliability data t o pick. Ea ch node m aintains a rat ing for
every other node it knows about in the network. It calculates
a path metric by averaging the node ratings in the path. We
choose this metric because it gives a comparison of the over-
all reliability of different paths and allows pathrater to emu-
late t he sh ortest length pa th alg orithm w hen no rel iability
information ahs b een collected, as ex plained below. If there
are multiple p aths to the sa me desti nation, w e choose the
path with the highest metric. Since the pathrater depends on
knowing the e xact p ath a packet has trave rsed, i t must be
implemented on top of a source routing protocol.
The pathrater assigns ratings to nodes according to the fol-
lowing algorithm. When anode in the network becom es
known to the pathrater (through route discovery), the pathra-
ter assigns it a “neutral” rating of 0.5. A node a lways rates
itself w ith a 1. 0. Th is e nsures that w hen ca lculating p ath
rates, i f a ll o ther n odes a re ne utral nodes (rather tha n s us-
pected misbehaving nodes); the pathrater picks the shortest
length path. The pathrater increments the ratings of nodes on
all actively used paths by 0.01 at periodic intervals of 2 00
ms. An actively used path is one on which the node has sent
a p acket within the p revious ra te increment int erval. Th e
maximum value a neu tral node can attain is 0.8. We decre-
ment a n ode’s ra ting by 0.0 5 w hen w e detect a link break
during p acket f orwarding and t he node b ecomes unreacha-
ble. The low er bound rating of a “neutral” node is 0.0. Th e
pathrater does not modify the ratings of nodes that are not
currently in active use.
We assign special highly negative value, -100 in the simula-
tions, to nodes su spected of mi sbehaving by the wat chdog
mechanism. When the pa thrater c alculates t he pa th m etric,
negative pa th values indicate t he existence of o ne or mo re
suspected misbehaving nodes in the path. If a node is marked
as misbehaving due to a temporary malfunction or incorrect
accusation it would be preferable if it were not permanently
excluded from routing. Therefore n odes that have negative
ratings should have their ratings slowly increased or set back
to a non-negative value after a long timeout.
3.3.1 Performance Throughput and Overhead
The watchdog and pathrater mechanism with DSR algorithm
improves throughput by 27% while increasing the overhead
from 12% to 24%. But this overhead is due to the way DSR
operates to maintain ro utes. The watchdog itself a dds very
little o verhead. Although t he ove rhead is s ignificant, t hese
extensions still i mprove net thr oughput. In ne tworks w ith
moderate mobility throughput improves by 17% while over-
head transmission increases from 9% to 17%.
3.4 Security-Aware Ad-hoc Routing (SAR)
It makes use of trus t le vels (security attributes a ssigned to
nodes) t o m ake in formed, se cure rou ting d ecision. C urrent
routing pr otocols d iscover t he sh ortest pa th between t wo
nodes. B ut S AR c an d iscover a pa th w ith de sired sec urity
attributes (E.g. a path through nodes with a particular shared
key) [12]. A node initiating route discovery sets the sought
security le vel for t he ro ute i.e. the requ ired minimal tr ust
level for n odes part icipating in the q uery/ repl y pro paga-
tion[13],[14]. Nodes at each trust level share symmetric en-
cryption keys. Intermediate nodes of different levels cannot
decrypt in-transit routing packets or de termine whether the
required security attributes can be sa tisfied and dro p them.
Only the nodes with the correct key can read the header and
forward the packet. So if a packet has reached the destina-
tion, it must have been propagated by nodes at the same lev-
el, since only they can decrypt the packet, see its header and
forward it.
Figure 6: Forwarding packet by secure route
3.5 Implementation
SAR can extend any routing protocol. Here we see how to
extend AODV and call it SAODV. Most of AODV’s original
behavior suc h as on- demand d iscovery u sing flooding, re -
verse pa th maintenance an d forward path se tup v ia Ro ute
Request and Reply (RREP) messages is retained.
The RREQ (Route REQuest) and the RREP (Route REPly)
packets f ormats are modifie d to carry addi tional secur ity
information. The RREQ packet has an additional field called
RQ_SEC_REQIREMENT that indicates the required securi-
ty level for the r oute t he sender w ishes to discover. Th is
could be a bit vector.. An intermediate node at the required
trust le vel, u pdates th e R REQ pac ket by updating a nother
new f ield, RQ_SEC_GUARANTEE f ield. The
RQ_SEC_GUARANTEE field contains the minimum securi-
ty offered in the route. This can be achieved if each interme-
diate node at the required trust level performs an ‘AND’ op-
eration with RQ_SEC_GUARAN TEE field it r eceives and
puts the updated value ba ck in to the
RQ_SEC_GUARANTEE field before forwarding the packet.
Finally the packet reaches the destination if a route exists. In
the RREP packet one additional field is also added. When an
RREQ successfully traverses the network to the sender, the
RQ_SEC_GUARANTEE represent s the minim um secur ity
level i n t he e ntire pa th from source to d estination. S o the
destination copies this from the RREQ to the RREP, into a
new field called RP_SEC_GUARANTEE field. The sender
can use this value to determine t he sec urity le vel on t he
whole pa th, s ince the se nder can fi nd ro utes w hich offer
Paper ID: 05130918 71 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
more secur ity than a sked for , w ith which he ca n ma ke in-
formed decisions.
Drawbacks: A lot of encryption overhead, since each inter-
mediate node has to performs it.
3.6 Secure Routing Protocol
A Security Association (SA) exists between the source node
(S) and destination node (T).One way of establishing this SA
is negotiating a shared secret key by the knowledge of the
public key of the other end. The existence of the SA is justi-
fied, because the end hosts choose a secure communication
scheme and consequently should be able to authenticate each
other. The S A w ould b e established b y any of gr oup key
exchange schemes [9] [11]. However the exists of SAs with
any of t he intermediate nodes is unnecessary. It is required
that the e nd nodes be able to use n on-volatile m emory to
maintain state information regarding relayed queries, so that
previously seen route requests are discarded. It is also e x-
pected that a one to one mapping exists between MAC and
IP addresses exists. Finally the broadcast nature of the radio
channels requires that each tr ansmission i s rec eived b y all
neighbors, which are ass umed t o o perate in promisc uous
mode (i.e. able to o verhear all transm issions from nodes
within the range of their transceiver).
3.6.1 Working
Figure 7: Secure Routing Network
The s ource node ( S) initiates the r oute discovery b y con-
structing a rout e request packet. The route request packet is
identified by a random query identifier (rnd#) and a sequence
number (sq #). We a ssumed th at a security ass ociation (a
shared key KST) is established between source (S) and des-
tination (T).
S constructs a Message Authentication Code (MAC) which
is a hash of source, destination, random query identifier, se-
quence n umber and K ST i .e. MAC = h(S, T, r nd#, s q#,
KST). In add ition the ide ntifier (IP addr esses) o f the tra -
versed intermediate nodes are accumulated in the route re-
quest packet. I ntermediate n odes re lay route req uests. The
intermediate nodes also maintain a limited amount of state
information regarding relayed queries (by storing their ran-
dom sequ ence nu mber), so t hat p reviously se en ro ute re-
quests are discarded.
More than one ro ute request packet reaches the destination
through different routes. The destination T calculates a MAC
covering the route reply contents and then returns the packet
to S ov er th e re verse ro ute a ccumulated in th e resp ective
request packet. The destination resp onds to one or mor e
route request packets to provide the source with an as diverse
topology picture as possible.
4. Advantages
Computing the MAC is not computationally expensive. Mes-
sage i ntegrity is preserved. If c onfidentiality of data is re -
quired w e c ould encrypt the pa y load w ith the share d k ey
KST. Di fferent a ttacks on rou ting an d how t hey are co un-
tered
Let M1, M2 be two malicious intermediate nodes.
We denote the query request as a list {QST; n1, n2
 nk}.
QST denotes the SRP header for a query searching for T and
initiated by S.
ni, i n ot = {1 ,k} are the IP addresses of the intermediate
nodes and n1= S, nk= T.
Similarly, a route reply is denoted as {RST; n1, n2, 
. nk}
Case 1:
When M receives {QST; S} it tries to mislead S by generat-
ing { RST; S , M1, T} i.e. it fa kes that destination T is its
neighbor. This is possible in a regula r routing protocol, but
not here, since only T can generate the MAC which is veri-
fied by S.
Case 2:
If M1 discards request packets that it receives, it narrows the
topology view of S. But at the same time it practically re-
moves itself from S ’s view . Th us it ca nnot i nflict harm t o
data flows originating from S, and route chosen by S would
not include M1.
Case 3:
When M1 receives {RST; S, 1, M1, S, 4, T} it tampers with
its contents and relays {RST; S, 1, M, Y, T}. Y being any
sequence of n odes, S readily disc ards the reply due to th e
integrity protection provided by MAC.
Case 4:
When M2 receives {QST; S, 2, 3} i t corrupts the accumu-
lated route and relays
{QST; S, X, 3, M2} to its neighbors, where X is a false IP
address. This request arrives at T, which constructs the reply
and routes it over {T, M2, 3, X, S} towards S. but when node
3 receives the reply it cannot forward it any further since X
is not its neighbor and the reply is dropped.
Case 5:
If M1 replays route requests to consume network resources,
they w ill be discarded by i ntermediate n odes, sinc e th ey
maintain a list of query identifiers seen in the past. The query
identifier is a random number, so that it is not guessable by
the malicious node.
Paper ID: 05130918 72 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
Case 6:
If M1 attempts to forward {QST; S, M*} i.e. it spoofs its IP
address. Consequently S would accept {RST; S, M*, 1, 4, T}
as a ro ute. Bu t the c onnectivity in formation co nveyed by
such a reply is correct. However, in practice, neighbor dis-
covery that maintain information on the binding of the MAC
and IP address can strengthen the protocol. Packets would be
discarded when relayed by same data link interface i.e. same
MAC address with more than one different IP address.
3.7 Attacks on SRP Protocol
Tunneling
If 2 nodes collude during the 2 phases (request and reply) of a
single rout e disc overy, then the protocol c ould be attacked.
e.g.: if M1 received a route request, it can tunnel it to M2 i.e.
discover a route to M2 and send the request encapsulated in a
data packet. Then M2 broadcasts a request with the route seg-
ment between M1 and M2 falsified { QST; S, M1, Z, M2}. T
receives the request and constructs a reply which is routed one
{T, M2, Z, M1, S}. M2 receives the reply and tunnels it back
to M1, which then returns it to S. As a result the connectivity
information is only partially correct.
5. Replay
If M1 rew rites the RND# with some other random number,
its neighbors think that it is a genuine packet and keep for-
warding i t, t hus w asting t heir reso urces. O nly when the
packet re aches the d estination can t his misuse be d etected
using the MAC.
6. Conclusion
We have presented an overview of the existing security sce-
nario i n t he Ad-Hoc netw ork e nvironment. Key m anage-
ment, Ad-hoc routing aspects of wireless Ad-hoc networks
was discussed. Ad-hoc networking is s till a raw area of re-
search as can be seen with the problems that exist in these
networks and the emerging solutions. The key management
protocols are still very expensive and not fail safe. Several
protocols for routing i n Ad-hoc networks have been pro-
posed. There is a need to make them more secure and robust
to adapt to the demanding requirements of these networks.
Intrusion detection is a critical security area. But it is a diffi-
cult goal to achieve in the resource deficient Ad-hoc envi-
ronment [1]. But the flexibility, ease and speed with which
these ne tworks c an be set u p i mplies t hey w ill gain w ider
application [14] [15] . Th is leaves A d-hoc networks w ide
open for research to meet these demanding application.
References
[1] Yongguang Zhang, Wenke Lee , Yi-An H uang“Intrusion
Detection in Wireless Ad-hoc Net works”, Wireless Net -
works 9 (5), 545-556,2003
[2] N.Asokan, Philip Ginzboorg, ”Key Agreement in Adhoc
Networks, Preprint submitted to Elsevier preprint,3 Freb-
uary 2003
[3] L. Zhou, Z.J. Haas, Cornell Univ., “Securing ad hoc net-
works,” IEEE Network, Volume: 13 , Page(s): 24-30,
ISSN: 0890-8044. Nov/Dec 1999
[4] B D ahill, BN Le vine, E Ro yer, C Shields “A Secure
Routing Protocol for Ad Hoc Networks” Network Proto-
cols, 2002. Proceedings. 10th IEEE International Confe-
rence on 12-15 Nov. 2002
[5] Janne L undberg, H elsinki U niversity o f Technolo-
gy,Routing S ecurity in Ad Hoc N etworks, Tik-110.501
Seminar on Network Security, HUT TML 2000
[6] Seung Yi, Prasad Nal durg, Robin Kravets, Security-
Aware Ad-Hoc Routing for Wireless Networks, Proceed-
ing MobiHoc '01 Proceedings of the 2nd ACM interna-
tional symposium on Mob ile ad hoc networking & com-
puting, Pages 299-302, ACM New York, NY, USA ©2001
[7] S Marti, TJ Giuli, K Lai, M Baker, “Mitigating Routing
Misbehaviour in Ad Hoc Networks”,International Confe-
rence on Mobile Computi ng a nd Networking: Proceed-
ings,2000
[8] Maarit Hietalahti,Key Establ ishment in Ad H oc Net-
works, Electronic Notes in Theoretical Computer Science,
Elsevier,2008
[9] M Steiner, G Tsudik, MWaidner Key Agreement in Dy-
namic P eer Groups” Pa rallel and D istributed S ystems,
IEEE Transactions on 11 (8), 769-780, 2000.
[10] S. Corson, J. M acker,”Mobile Ad Hoc Networking (MA-
NET): Routing Protocol Performance Issues and Evalua-
tion Consideration”, MANET Performance Issues January
1999
[11] RJ Anderson, MG K uhn “I nformation hiding-a sur-
vey”,FAP Petit colas, Proceed ings of the IEEE 87 (7),
1062-1078,1999
[12] E. M. Royer and C.K. Toh.” Review of Current Routing
Protocols for Ad H oc Mo bile Wireless Net-
works”,Personal Co mmunications, IEEE 6 (2), 46 -55A,
1999
[13] DB Johnson, DA Maltz,” The Dynamic Source Routing
Protocol for Mobi le Ad H oc N et-
works”,KluwerInternational Series in Eng ineering and
Computer Science, 153-179,1996
[14] Perkins, Charl es E., a nd Eli zabeth Royer. "Ad-Hoc On-
Demand Distance Vector Routing." WMCSA'99. Second
IEEE Workshop on, 1999
[15] ZJ Haas, MR Pearlman,” The performance of query con-
trol schemes for the zone routing protocol”, IEEE/ACM
Transactions on Networking (TON) 9 (4), 427-438,2001
Author Profile
Chinmaya Kumar Nayak is an Assistant Profes-
sor in the Department of Computer Science & En-
gineering, Gandhi Instit ute for Technological Ad-
vancement (GITA), Bh ubaneswar, Odisha, India.
He is an author of the book “Data Structure Using
C”. He published many papers in national seminars and inter-
national journals. His research area includes image processing,
adhoc networks etc.
Paper ID: 05130918 73 of 74
International Journal of Scientific Engineering and Research (IJSER)
www.ijser.in
ISSN (Online): 2347-3878
Volume 1 Issue 1, September 2013
Manoranjan Pradhan hol ds a Ph. D D egree in
Computer Science. He is p resently w orking as a
professor and Head of the Department of Comput-
er S cience & Engineering, G andhi Insti tute for
Technological Advancement (G ITA), Bhubaneswar, O disha,
India. He has 14 years of t eaching experience. He h as p ub-
lished many papers in national and international journals. His
research interests include Computer Security, Intrusion Detec-
tion and Soft Computing.
Paper ID: 05130918 74 of 74

More Related Content

What's hot

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc NetworksMuhammad Yousuf Khan
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 

What's hot (17)

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 

Viewers also liked

Final evaluation
Final evaluationFinal evaluation
Final evaluationLivmarr
 
Sj iwmt mzoa==
Sj iwmt mzoa==Sj iwmt mzoa==
Sj iwmt mzoa==editorijserin
 
A2 evaluation
A2 evaluationA2 evaluation
A2 evaluationLivmarr
 
Evaluation
EvaluationEvaluation
EvaluationLivmarr
 
Acids, bases and salts
Acids, bases and saltsAcids, bases and salts
Acids, bases and saltsRAVNEET NAGI
 
Quick Notes on Human motor control
Quick Notes on Human motor controlQuick Notes on Human motor control
Quick Notes on Human motor controlRoberto Meattini
 
Web Services Security
Web Services SecurityWeb Services Security
Web Services Securitynevzasroma
 
Appliedliveranatomy 091219152729-phpapp01
Appliedliveranatomy 091219152729-phpapp01Appliedliveranatomy 091219152729-phpapp01
Appliedliveranatomy 091219152729-phpapp01hussienaa
 
Characteristics of Intelligent Behavior
Characteristics of Intelligent Behavior Characteristics of Intelligent Behavior
Characteristics of Intelligent Behavior pstukes99
 
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™Yuta Nagamiya
 
Is matter around us pure- Chapter 2 class10 NCERT
Is matter around us pure- Chapter 2 class10 NCERTIs matter around us pure- Chapter 2 class10 NCERT
Is matter around us pure- Chapter 2 class10 NCERTRAVNEET NAGI
 
Common ocular emergencies
Common ocular emergenciesCommon ocular emergencies
Common ocular emergenciesMahmoud Tawfik
 

Viewers also liked (14)

Final evaluation
Final evaluationFinal evaluation
Final evaluation
 
Sj iwmt mzoa==
Sj iwmt mzoa==Sj iwmt mzoa==
Sj iwmt mzoa==
 
A2 evaluation
A2 evaluationA2 evaluation
A2 evaluation
 
Evaluation
EvaluationEvaluation
Evaluation
 
Acids, bases and salts
Acids, bases and saltsAcids, bases and salts
Acids, bases and salts
 
Competentemente tolerante
Competentemente toleranteCompetentemente tolerante
Competentemente tolerante
 
Quick Notes on Human motor control
Quick Notes on Human motor controlQuick Notes on Human motor control
Quick Notes on Human motor control
 
Web Services Security
Web Services SecurityWeb Services Security
Web Services Security
 
Appliedliveranatomy 091219152729-phpapp01
Appliedliveranatomy 091219152729-phpapp01Appliedliveranatomy 091219152729-phpapp01
Appliedliveranatomy 091219152729-phpapp01
 
Characteristics of Intelligent Behavior
Characteristics of Intelligent Behavior Characteristics of Intelligent Behavior
Characteristics of Intelligent Behavior
 
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™
Laravelăźăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™ăźăƒ†ă‚čăƒˆă«äŸżćˆ©ăȘăƒă‚šăƒƒă‚±ăƒŒă‚·ă‚™
 
EXECUTION MADE EASY
EXECUTION MADE EASYEXECUTION MADE EASY
EXECUTION MADE EASY
 
Is matter around us pure- Chapter 2 class10 NCERT
Is matter around us pure- Chapter 2 class10 NCERTIs matter around us pure- Chapter 2 class10 NCERT
Is matter around us pure- Chapter 2 class10 NCERT
 
Common ocular emergencies
Common ocular emergenciesCommon ocular emergencies
Common ocular emergencies
 

Similar to Md ux mza5mtg=14

IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
N0363079085
N0363079085N0363079085
N0363079085ijceronline
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 

Similar to Md ux mza5mtg=14 (20)

IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Aodv
AodvAodv
Aodv
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
N0363079085
N0363079085N0363079085
N0363079085
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Md ux mza5mtg=14

  • 1. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 Security Issues in the Ad-Hoc Network Environment 1 Chinmaya Kumar Nayak, 2 Manoranjan Pradhan 1 Assistant Professor, Department of Computer Science & Engineering, Gandhi Institute for Technological Advancement (GITA), Bhubaneswar, Odisha, India 2Ph. D, Professor and Head of the Department, Department of Computer Science & Engineering, Gandhi Institute for Technological Advancement (GITA), Bhubaneswar, Odisha, India Abstract: Ad-hoc networks are an emerging area of mobile computing. There are various challenges that are faced in the Ad-hoc envi- ronment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for tempo- rary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we attempt to analyze the demands of Ad-hoc environment. We focus on Ad-hoc routing. The key issues concerning these areas have been addressed here. We have tried to compile solutions to these problems that have been active areas of research. Keywords: Security problem, SAR, Message Authentication Code, Adhoc network. 1. Introduction The contemporary rout ing p rotocols for A dhoc networks cope we ll w ith dyn amically changing topology but are not designed to accommodate defense against malicious attack- ers. No single st andard protocol. Capture common security threats a nd pr ovide guidelines to sec ure r outing protocol. Routers exchange ne twork t opology inf ormally i n order to establish routes between nodes - a nother potential target for malicious attackers who intend to bring down the network. External attackers - injects erroneous routing info, replaying old routing info or distorting routing info in order to partition a network or overloading a network with retransmissions and inefficient routing. Internal compromised no des - mo re s e- vere de tection an d c orrection m ore d ifficult Routing info signed by each node won't work since compromised nodes can generate valid signatures using their private keys [2][3]. Detection of c ompromised n odes through rou ting inf orma- tion is also difficult due to dynamic topology of Adhoc net- works. Some properties of a dhoc ne tworks to fa cilitate se - cure routing can be used. Routing protocols for Adhoc net- works must handle outdated routing information to accom- modate dynamic changing topology. False routing informa- tion generated by compromised nodes can also be regarded as outdated routing information. As l ong as there are suffi- cient no. of valid nodes, the routing protocol should be able to b ypass the com promised no des, thi s however needs t he existence of multiple, possibly disjoint routes between nodes. Routing protocol should be able to make use of an alternate route if the existing one appears to have faulted [4] [5]. 2. Secure Routing In Ad-Hoc Networks 2.1 Problems associated with Ad-hoc routing 2.1.1 Infrastructure An Ad-hoc network is an infrastructure less network. Unlike traditional networks t here is no pre-deployed infrastructure such as cen trally a dministered rou ters or strict p olicy for supporting en d-to-end ro uting. The n odes themselves are responsible for routing packets [6]. Figure 1: Routing in Ad-hoc networks and Routing in tradi- tional networks using router Each n ode re lies o n t he o ther nodes to r oute pac kets for them. Mobile nodes in direct radio range of one another can communicate directly, but no des t hat are t oo f ar apart to communicate directly must depend on the intermediate nodes to route messages for them. 2.1.2 Frequent changes in network topology Ad-hoc networks contain nodes that may frequently change their locations. Hence the topology in these networks is high- ly dynamic. This results in frequently changing neighbors on whom a n ode re lies for ro uting. A s a resu lt tr aditional routing protocols can no longer be used in such an environ- ment. This mandates new routing protocols that can handle Paper ID: 05130918 68 of 74
  • 2. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 the dynamic topology by facilitating fresh route discoveries. 2.1.3 Problems associated with wirelesscommunication As the com munication is through w ireless me dium, it is possible for any intruder t o tap the c ommunication easily. Wireless channels offer poor protection and routing related control messages can be tampered. The wireless medium is susceptible to sig nal interference, ja mming, eavesdropping and distortion [6]. An intruder can easily eavesdrop to know sensitive rou ting information or jam the s ignals to prevent propagation of routing information or worse interrupt mes- sages and distort them to m anipulate routes. Routing proto- cols should be well adopted to handle such problems. 2.1.4 Problems with existing Ad-hoc routing protocols 2.1.4.1 Implicit trust relationship between neighbors Current Ad-hoc routing protocols inherently trust all partici- pants. Most Ad-hoc r outing protocols ar e co operative b y nature and de pend o n ne ighboring n odes t o r oute pac kets. This naive trust model allows malicious nodes to paralyze an Ad-hoc network by inserting erroneous routing updates, rep- laying old messages, changing routing updates or advertising incorrect routing information. While these attacks are possi- ble in fixed network as well, the Ad-hoc environment magni- fies this makes detection difficult [7]. 2.1.4.2 Throughput Ad-hoc ne tworks m aximize t otal network t hroughput b y using all available nodes for routing and forwarding. How- ever a node may misbehave by agreeing to forward packets and then failing to do so, because it is ove rloaded, selfish, malicious or broken. Figure 2: Forwarding packet by a malicious node Misbehaving nodes can be a significant problem [8] [9]. Al- though th e average lo ss in th roughput due to misb ehaving nodes is not too high, in the worst case it is very high. 2.1.4.3 Attacks Using Modification of Protocol Fields of Messages Current routing protocols assume that nodes do not alter the protocol fields of m essages passed among no des. R outing protocol p ackets c arry i mportant control information that governs the b ehavior of da ta t ransmission i n Ad-hoc n et- works. Since the level of trust in a traditional Ad-hoc net- work cannot be measured or enforced, enemy nodes or com- promised nodes may participate directly in the route discov- ery and may intercept and filter routing protocol packets to disrupt c ommunication. M alicious nod es ca n ea sily ca use redirection o f network traffic an d DOS at tacks by simply altering these fields. For example, in the network illustrated in Figu re 2, a mal icious node M c ould keep t raffic f rom reaching X by consistently advertising to B a shorter route to X than the route to X, which C is advertising. 3. Solutions to problems in Ad-hoc-routing 3.1 Concealing Network topology or structure 3.1.1 Using independent Security Agents (SA) This method is called the Non-disclosure method (NDM). In NDM a number of independent security agents (SA) are dis- tributed over the network. Each of these agents SAi owns a pair of as ymmetric cr yptographic ke ys K SAi a nd K SAi-. Sender s wishes to transmit a message M to receiver R with- out disclosing his location. S s ends the message using a number of S As: SA1  SA2   SAN  R. The mes- sage is e ncapsulated N t imes us ing the pu blic keys KSA1
KSAn as follows. M’ = KSA1 (SA2, (KSA2 (SA3 (
 (KSAN(R, M))
)))) To deliver the packet, S sen ds it to the first security agent SA1 w hich decrypts t he o uter m ost encapsulation a nd for- wards the packet to the next agent. Each SA knows only the address of the previous and the next hop. The last agent fi- nally decrypts the message and forwards it to R. It introduces a large amount of ove rhead and hence is no t preferred for routing. 3.1.2 Zone Routing Protocol (ZRP) It is a h ierarchical protocol where the network is divided in to zones. The zones operate independently from each other. ZRP involves two separate routing protocols. Such a hierar- chical routing structure is fa vorable with respect to sec urity since a well designed a lgorithm sh ould be a ble t o c ontain certain pr oblems t o sma ll portion of t he hier archy leav ing other portions unaffected. ZRP has some features that appear to make it somewhat less susceptible to routing at tacks. Its hi erarchical orga nization hides some of the routing information within the zones. ZRP provides som e form of security aga inst disclosing netw ork topology by dividing routing into zones, which conceal the internal organization. 3.2 Installing extra facilities in the network to mitigate routing misbehavior Misbehaving nodes can reduce network throughput and re- sult in poor robustness. Sergio Marti Et al propose a tech- nique to i dentify a nd is olate such n odes by i nstalling a watchdog and a pathrater in t he A d-hoc network on ea ch node. 3.2.1 Assumptions It is as sumed that the wireless links are bi-directional. Most MAC layer protocols require this. It also assumes support for promiscuous mode of operation for the nodes. This helps the nodes supervise each other operation. The t hird assumption is that the underlying Ad-hoc routing protocol is DSR. It is Paper ID: 05130918 69 of 74
  • 3. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 possible to extend the mechanism to o ther routing protocols as well. 3.2.2 Mechanism The watchdog identifies misbehaving nodes, while the path- rater avoids routing pa ckets throu gh these node s. When a node forwards a packet, the node’s watchdog verifies that the next node in the path also forwards the packet. The watchdog does this b y listening pr omiscuously t o t he ne xt node’s transmissions. If t he next node does not forward the packet, then it is misbehaving. The pathrater uses this knowledge of misbehaving nodes to choose the network path that is most likely to deliver packets. 3.2.3 Watchdog The w atchdog method de tects m isbehaving nodes. F igure3 illustrates how the watchdog works. Node A cannot transmit all the way to node C, but it can listen in on node B’s traffic. Thus, when A transmits a packet for B to forward to C, A can often tell if B transmits the packet. If encryption is n ot performed separately for each link, which can be expensive, then A can also tell if B has tampered with the payload or the header. Figure 3: Operation of the watchdog. We implement the watchdog by maintaining a bu ffer of re- cently se nt packets a nd c omparing ea ch overheard packet with the packet in the buffer to see if there is a match. If so, the pa cket i n the buffer is removed a nd forg otten by th e watchdog, since it has been forwarded on. If the packet has remained in the buffer for longer than a certain timeout, the watchdog increments a failure tally for the node responsible for forwarding on the packet. If t he tally exceeds a certain threshold bandwidth, it de termines tha t th e node is misbe- having and sends a message to the source notifying it of the misbehaving node. Advantages: The watchdog mechanism can detect misbehav- ing nodes at forwarding level and not just the link level. Weakness: It migh t not dete ct mis behaving no des in pres- ence of 1) ambi guous c ollusions 2) re ceiver collusions 3) limited transmission power 4) false misbehavior 5) collision 6) partial dropping. 3.2.4 Analysis of Watchdog's weaknesses Figure 4: Ambiguous Collision 3.2.4.1 Ambiguous collision The ambiguous collision problem prevents A from overhear- ing transm issions fr om B. As fi gure3.5 il lustrates, a packet collision occur at A while it is listening for B to forward on a packet. A does not know if the collision was caused by for- warding on a p acket as it should or if B never forwarded the packet and t he collision w as caused by o ther nod es in A’s neighborhood. Bec ause of t his un certainty, A sh ould i nstead continue to watch B over a period of time. Figure 5: Receiver Collision. 3.2.4.2 Receiver collision In the re ceiver collision pr oblem, no de A can o nly t ell whether B sends the packet to C, but it cannot tell if C rece- ives it. If a coll ision occurs at C when B first forwards the packet, A onl y see s B f orwarding the packet a nd a ssumes that C successfully receives it. Thus, B could skip retransmit- ting the packet and evade detection [9][10]. 3.2.4.3 False misbehavior False misbehavior can occur when nodes falsely report other nodes as m isbehaving. A malic ious node could a ttempt t o partition the network by claiming that some nodes following it in the pat h are misbehaving. For instance, node A could report that node B i s not forwarding packets when in fact it is. This will cause S to mark B as misbehaving when A is the culprit. This behavior, however, will be detected. Since A is passing mes sages onto B (as verified by S), t hen any ac- knowledgements from D to S will go through A to S, and S will wonder why it receives replies from D when supposedly B dropped packets in the forward direction. In addition, if A drops acknowledgements to hide them from S, the no de B will detect this misbehavior and will report it to D. 3.2.4.4 Limited transmission power Another problem is that a misbehaving node that can control its transmission power can circumvent the watchdog. A node could l imit its t ransmission pow er suc h that the s ignal i s strong enough to be overheard by the previous node but too weak to be received by the true recipient. 3.2.4.5 Multiple colluding nodes Multiple nodes in collusion can mount a mo re sophisticated attack. For example, B and C from figure3.4 could collude to cause mi schief. In t his ca se, B fo rwards a packet to C but does not report to A when C drops the packet. Because of its limitation, it may be necessary to disallow two consecutive untrusted nodes in a routing path. 3.2.4.6 Partial dropping A node can circumvent the watchdog by dropping packets at a lower rate than the watchdog’s configured minimum mis- behavior t hreshold. Al though t he watchdog will no t d etect this node as misbehaving, this node is forced to forward at the threshold bandwidth. In this way the watchdog serves to enforce this minimum bandwidth. For the watchdog to work properly it must know where a packet should be in two hops. 3.3 Pathrater Just like the watchdog, the pathrater is ru n by eac h node. It Paper ID: 05130918 70 of 74
  • 4. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 combines the knowledge o f misbeha ving nodes w ith li nk reliability data t o pick. Ea ch node m aintains a rat ing for every other node it knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the over- all reliability of different paths and allows pathrater to emu- late t he sh ortest length pa th alg orithm w hen no rel iability information ahs b een collected, as ex plained below. If there are multiple p aths to the sa me desti nation, w e choose the path with the highest metric. Since the pathrater depends on knowing the e xact p ath a packet has trave rsed, i t must be implemented on top of a source routing protocol. The pathrater assigns ratings to nodes according to the fol- lowing algorithm. When anode in the network becom es known to the pathrater (through route discovery), the pathra- ter assigns it a “neutral” rating of 0.5. A node a lways rates itself w ith a 1. 0. Th is e nsures that w hen ca lculating p ath rates, i f a ll o ther n odes a re ne utral nodes (rather tha n s us- pected misbehaving nodes); the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 2 00 ms. An actively used path is one on which the node has sent a p acket within the p revious ra te increment int erval. Th e maximum value a neu tral node can attain is 0.8. We decre- ment a n ode’s ra ting by 0.0 5 w hen w e detect a link break during p acket f orwarding and t he node b ecomes unreacha- ble. The low er bound rating of a “neutral” node is 0.0. Th e pathrater does not modify the ratings of nodes that are not currently in active use. We assign special highly negative value, -100 in the simula- tions, to nodes su spected of mi sbehaving by the wat chdog mechanism. When the pa thrater c alculates t he pa th m etric, negative pa th values indicate t he existence of o ne or mo re suspected misbehaving nodes in the path. If a node is marked as misbehaving due to a temporary malfunction or incorrect accusation it would be preferable if it were not permanently excluded from routing. Therefore n odes that have negative ratings should have their ratings slowly increased or set back to a non-negative value after a long timeout. 3.3.1 Performance Throughput and Overhead The watchdog and pathrater mechanism with DSR algorithm improves throughput by 27% while increasing the overhead from 12% to 24%. But this overhead is due to the way DSR operates to maintain ro utes. The watchdog itself a dds very little o verhead. Although t he ove rhead is s ignificant, t hese extensions still i mprove net thr oughput. In ne tworks w ith moderate mobility throughput improves by 17% while over- head transmission increases from 9% to 17%. 3.4 Security-Aware Ad-hoc Routing (SAR) It makes use of trus t le vels (security attributes a ssigned to nodes) t o m ake in formed, se cure rou ting d ecision. C urrent routing pr otocols d iscover t he sh ortest pa th between t wo nodes. B ut S AR c an d iscover a pa th w ith de sired sec urity attributes (E.g. a path through nodes with a particular shared key) [12]. A node initiating route discovery sets the sought security le vel for t he ro ute i.e. the requ ired minimal tr ust level for n odes part icipating in the q uery/ repl y pro paga- tion[13],[14]. Nodes at each trust level share symmetric en- cryption keys. Intermediate nodes of different levels cannot decrypt in-transit routing packets or de termine whether the required security attributes can be sa tisfied and dro p them. Only the nodes with the correct key can read the header and forward the packet. So if a packet has reached the destina- tion, it must have been propagated by nodes at the same lev- el, since only they can decrypt the packet, see its header and forward it. Figure 6: Forwarding packet by secure route 3.5 Implementation SAR can extend any routing protocol. Here we see how to extend AODV and call it SAODV. Most of AODV’s original behavior suc h as on- demand d iscovery u sing flooding, re - verse pa th maintenance an d forward path se tup v ia Ro ute Request and Reply (RREP) messages is retained. The RREQ (Route REQuest) and the RREP (Route REPly) packets f ormats are modifie d to carry addi tional secur ity information. The RREQ packet has an additional field called RQ_SEC_REQIREMENT that indicates the required securi- ty level for the r oute t he sender w ishes to discover. Th is could be a bit vector.. An intermediate node at the required trust le vel, u pdates th e R REQ pac ket by updating a nother new f ield, RQ_SEC_GUARANTEE f ield. The RQ_SEC_GUARANTEE field contains the minimum securi- ty offered in the route. This can be achieved if each interme- diate node at the required trust level performs an ‘AND’ op- eration with RQ_SEC_GUARAN TEE field it r eceives and puts the updated value ba ck in to the RQ_SEC_GUARANTEE field before forwarding the packet. Finally the packet reaches the destination if a route exists. In the RREP packet one additional field is also added. When an RREQ successfully traverses the network to the sender, the RQ_SEC_GUARANTEE represent s the minim um secur ity level i n t he e ntire pa th from source to d estination. S o the destination copies this from the RREQ to the RREP, into a new field called RP_SEC_GUARANTEE field. The sender can use this value to determine t he sec urity le vel on t he whole pa th, s ince the se nder can fi nd ro utes w hich offer Paper ID: 05130918 71 of 74
  • 5. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 more secur ity than a sked for , w ith which he ca n ma ke in- formed decisions. Drawbacks: A lot of encryption overhead, since each inter- mediate node has to performs it. 3.6 Secure Routing Protocol A Security Association (SA) exists between the source node (S) and destination node (T).One way of establishing this SA is negotiating a shared secret key by the knowledge of the public key of the other end. The existence of the SA is justi- fied, because the end hosts choose a secure communication scheme and consequently should be able to authenticate each other. The S A w ould b e established b y any of gr oup key exchange schemes [9] [11]. However the exists of SAs with any of t he intermediate nodes is unnecessary. It is required that the e nd nodes be able to use n on-volatile m emory to maintain state information regarding relayed queries, so that previously seen route requests are discarded. It is also e x- pected that a one to one mapping exists between MAC and IP addresses exists. Finally the broadcast nature of the radio channels requires that each tr ansmission i s rec eived b y all neighbors, which are ass umed t o o perate in promisc uous mode (i.e. able to o verhear all transm issions from nodes within the range of their transceiver). 3.6.1 Working Figure 7: Secure Routing Network The s ource node ( S) initiates the r oute discovery b y con- structing a rout e request packet. The route request packet is identified by a random query identifier (rnd#) and a sequence number (sq #). We a ssumed th at a security ass ociation (a shared key KST) is established between source (S) and des- tination (T). S constructs a Message Authentication Code (MAC) which is a hash of source, destination, random query identifier, se- quence n umber and K ST i .e. MAC = h(S, T, r nd#, s q#, KST). In add ition the ide ntifier (IP addr esses) o f the tra - versed intermediate nodes are accumulated in the route re- quest packet. I ntermediate n odes re lay route req uests. The intermediate nodes also maintain a limited amount of state information regarding relayed queries (by storing their ran- dom sequ ence nu mber), so t hat p reviously se en ro ute re- quests are discarded. More than one ro ute request packet reaches the destination through different routes. The destination T calculates a MAC covering the route reply contents and then returns the packet to S ov er th e re verse ro ute a ccumulated in th e resp ective request packet. The destination resp onds to one or mor e route request packets to provide the source with an as diverse topology picture as possible. 4. Advantages Computing the MAC is not computationally expensive. Mes- sage i ntegrity is preserved. If c onfidentiality of data is re - quired w e c ould encrypt the pa y load w ith the share d k ey KST. Di fferent a ttacks on rou ting an d how t hey are co un- tered Let M1, M2 be two malicious intermediate nodes. We denote the query request as a list {QST; n1, n2
 nk}. QST denotes the SRP header for a query searching for T and initiated by S. ni, i n ot = {1 ,k} are the IP addresses of the intermediate nodes and n1= S, nk= T. Similarly, a route reply is denoted as {RST; n1, n2, 
. nk} Case 1: When M receives {QST; S} it tries to mislead S by generat- ing { RST; S , M1, T} i.e. it fa kes that destination T is its neighbor. This is possible in a regula r routing protocol, but not here, since only T can generate the MAC which is veri- fied by S. Case 2: If M1 discards request packets that it receives, it narrows the topology view of S. But at the same time it practically re- moves itself from S ’s view . Th us it ca nnot i nflict harm t o data flows originating from S, and route chosen by S would not include M1. Case 3: When M1 receives {RST; S, 1, M1, S, 4, T} it tampers with its contents and relays {RST; S, 1, M, Y, T}. Y being any sequence of n odes, S readily disc ards the reply due to th e integrity protection provided by MAC. Case 4: When M2 receives {QST; S, 2, 3} i t corrupts the accumu- lated route and relays {QST; S, X, 3, M2} to its neighbors, where X is a false IP address. This request arrives at T, which constructs the reply and routes it over {T, M2, 3, X, S} towards S. but when node 3 receives the reply it cannot forward it any further since X is not its neighbor and the reply is dropped. Case 5: If M1 replays route requests to consume network resources, they w ill be discarded by i ntermediate n odes, sinc e th ey maintain a list of query identifiers seen in the past. The query identifier is a random number, so that it is not guessable by the malicious node. Paper ID: 05130918 72 of 74
  • 6. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 Case 6: If M1 attempts to forward {QST; S, M*} i.e. it spoofs its IP address. Consequently S would accept {RST; S, M*, 1, 4, T} as a ro ute. Bu t the c onnectivity in formation co nveyed by such a reply is correct. However, in practice, neighbor dis- covery that maintain information on the binding of the MAC and IP address can strengthen the protocol. Packets would be discarded when relayed by same data link interface i.e. same MAC address with more than one different IP address. 3.7 Attacks on SRP Protocol Tunneling If 2 nodes collude during the 2 phases (request and reply) of a single rout e disc overy, then the protocol c ould be attacked. e.g.: if M1 received a route request, it can tunnel it to M2 i.e. discover a route to M2 and send the request encapsulated in a data packet. Then M2 broadcasts a request with the route seg- ment between M1 and M2 falsified { QST; S, M1, Z, M2}. T receives the request and constructs a reply which is routed one {T, M2, Z, M1, S}. M2 receives the reply and tunnels it back to M1, which then returns it to S. As a result the connectivity information is only partially correct. 5. Replay If M1 rew rites the RND# with some other random number, its neighbors think that it is a genuine packet and keep for- warding i t, t hus w asting t heir reso urces. O nly when the packet re aches the d estination can t his misuse be d etected using the MAC. 6. Conclusion We have presented an overview of the existing security sce- nario i n t he Ad-Hoc netw ork e nvironment. Key m anage- ment, Ad-hoc routing aspects of wireless Ad-hoc networks was discussed. Ad-hoc networking is s till a raw area of re- search as can be seen with the problems that exist in these networks and the emerging solutions. The key management protocols are still very expensive and not fail safe. Several protocols for routing i n Ad-hoc networks have been pro- posed. There is a need to make them more secure and robust to adapt to the demanding requirements of these networks. Intrusion detection is a critical security area. But it is a diffi- cult goal to achieve in the resource deficient Ad-hoc envi- ronment [1]. But the flexibility, ease and speed with which these ne tworks c an be set u p i mplies t hey w ill gain w ider application [14] [15] . Th is leaves A d-hoc networks w ide open for research to meet these demanding application. References [1] Yongguang Zhang, Wenke Lee , Yi-An H uang“Intrusion Detection in Wireless Ad-hoc Net works”, Wireless Net - works 9 (5), 545-556,2003 [2] N.Asokan, Philip Ginzboorg, ”Key Agreement in Adhoc Networks, Preprint submitted to Elsevier preprint,3 Freb- uary 2003 [3] L. Zhou, Z.J. Haas, Cornell Univ., “Securing ad hoc net- works,” IEEE Network, Volume: 13 , Page(s): 24-30, ISSN: 0890-8044. Nov/Dec 1999 [4] B D ahill, BN Le vine, E Ro yer, C Shields “A Secure Routing Protocol for Ad Hoc Networks” Network Proto- cols, 2002. Proceedings. 10th IEEE International Confe- rence on 12-15 Nov. 2002 [5] Janne L undberg, H elsinki U niversity o f Technolo- gy,Routing S ecurity in Ad Hoc N etworks, Tik-110.501 Seminar on Network Security, HUT TML 2000 [6] Seung Yi, Prasad Nal durg, Robin Kravets, Security- Aware Ad-Hoc Routing for Wireless Networks, Proceed- ing MobiHoc '01 Proceedings of the 2nd ACM interna- tional symposium on Mob ile ad hoc networking & com- puting, Pages 299-302, ACM New York, NY, USA ©2001 [7] S Marti, TJ Giuli, K Lai, M Baker, “Mitigating Routing Misbehaviour in Ad Hoc Networks”,International Confe- rence on Mobile Computi ng a nd Networking: Proceed- ings,2000 [8] Maarit Hietalahti,Key Establ ishment in Ad H oc Net- works, Electronic Notes in Theoretical Computer Science, Elsevier,2008 [9] M Steiner, G Tsudik, MWaidner Key Agreement in Dy- namic P eer Groups” Pa rallel and D istributed S ystems, IEEE Transactions on 11 (8), 769-780, 2000. [10] S. Corson, J. M acker,”Mobile Ad Hoc Networking (MA- NET): Routing Protocol Performance Issues and Evalua- tion Consideration”, MANET Performance Issues January 1999 [11] RJ Anderson, MG K uhn “I nformation hiding-a sur- vey”,FAP Petit colas, Proceed ings of the IEEE 87 (7), 1062-1078,1999 [12] E. M. Royer and C.K. Toh.” Review of Current Routing Protocols for Ad H oc Mo bile Wireless Net- works”,Personal Co mmunications, IEEE 6 (2), 46 -55A, 1999 [13] DB Johnson, DA Maltz,” The Dynamic Source Routing Protocol for Mobi le Ad H oc N et- works”,KluwerInternational Series in Eng ineering and Computer Science, 153-179,1996 [14] Perkins, Charl es E., a nd Eli zabeth Royer. "Ad-Hoc On- Demand Distance Vector Routing." WMCSA'99. Second IEEE Workshop on, 1999 [15] ZJ Haas, MR Pearlman,” The performance of query con- trol schemes for the zone routing protocol”, IEEE/ACM Transactions on Networking (TON) 9 (4), 427-438,2001 Author Profile Chinmaya Kumar Nayak is an Assistant Profes- sor in the Department of Computer Science & En- gineering, Gandhi Instit ute for Technological Ad- vancement (GITA), Bh ubaneswar, Odisha, India. He is an author of the book “Data Structure Using C”. He published many papers in national seminars and inter- national journals. His research area includes image processing, adhoc networks etc. Paper ID: 05130918 73 of 74
  • 7. International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878 Volume 1 Issue 1, September 2013 Manoranjan Pradhan hol ds a Ph. D D egree in Computer Science. He is p resently w orking as a professor and Head of the Department of Comput- er S cience & Engineering, G andhi Insti tute for Technological Advancement (G ITA), Bhubaneswar, O disha, India. He has 14 years of t eaching experience. He h as p ub- lished many papers in national and international journals. His research interests include Computer Security, Intrusion Detec- tion and Soft Computing. Paper ID: 05130918 74 of 74