SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop
Wireless Network using QOS-Aware Distributed Architecture
Miss. Shraddha V. Pawar1 , Prof. Sachin P. Patil2
1Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
2Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - The WiMAX and LTE are two wireless radio data
transmission technologies based on IEEE 802.16 designed to
ensure broadband wireless access. This paper considers the
problem of detecting rogue node in WiMAX networks. A rogue
node is an attacker node that duplicates a legitimate node. It
may lead to disturbance in service. In this paper we have
proposed an efficient technique forsecure datatransmissionto
ensure the security and integrity of the data packet in the
WiMAX network. We have used an ECDH algorithm for
ensuring secure data transmission.
Key Words: Rogue Node, Distributed Security, Elliptic
Curve Diffie Hellman Algorithm(ECDH), Worldwide
Interoperable for Microwave Access(WiMAX).
1. INTRODUCTION
Vehicular communications have received a great
deal of attention in recent years due to the demand for
multimedia applications during travel andforimprovements
in safety. Safety applications often require fast message
exchanges but do not use much bandwidth. On the other
hand, multimedia services require high bandwidth for
vehicular users.Hence,toprovidemobilebroadbandservices
at a vehicular speed of up to 350 km/h. Worldwide
interoperable for Microwave Access (WiMAX) and Long-
Term Evolution (LTE) are considered the best technologies
for vehicular networks. WiMAX and LTE are Fourth-
Generation (4G) wirelesstechnologiesthathavewell-defined
quality of service (QoS) and security architectures.
WiMAX and LTE resemble each other in some key
aspects, including operating frequency spectrum, high
capacity, mobility, strong QoS mechanisms, and strong
security with a similar key hierarchy from the core network
to the access network. However WiMAX and LTE also differ
from each other in certain aspects, as they haveevolvedfrom
different origins. LTE has evolved from 3rd Generation
Partnership Projects (3GPP): thus, the LTE network has to
support the existing 3G users' connectivity, but there is no
such constraint for WiMAX. Particularly, on the security
aspect, the WiMAX authentication process uses Extensive
Authentication Protocol Tunneled. Maintaining QoS
requirements of a specific application has become a
significant topic and priority is to maximize the QoS
experienced by the user. QoS is the ability of a network to
provide premier service to some fraction of total network
traffic over specific underlying technologies. QoSmetricsare
delay, jitter (delay variation), serviceavailability,bandwidth,
throughput, packet loss rate. Metrics are used to indicate
performance of particular scheme employed. QoS can be
achieved by resource reservation (Integrated services),
prioritization (differentiated services).
2. EASE OF USE
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that
supports QoS-aware and safe multimedia services for
vehicular networks is mandatory for service providers. The
main cause for the MAC layer security threatsin4Gvehicular
networks is due to certain unprotected MAC management
messages between Mobilestation(MS)andBaseStation(BS).
When the control messages are in plain text, the
attackers/intruders can easily spoof, modify,andreplythose
control messages for the intended receiver node. The
severity of the security threats may vary based on the
modification of those control messages. Similarly, the
attackers may send the continuous false packets
unnecessarily to the receiving node for the water torture
attacks. Many research efforts have been published on MAC
layer security threats in both WiMAX and LTE networks and
a few of them discussed the implementationofIPSecsecurity
for WiMAX networks.
In multihop WiMAX, once the user is registeredwith
the home network the security layer may use three levels of
protections for the MAC management messages, i.e., No
protection, CMAC, and Encrypted by AES-CCM. As a
consequence of adding the encryption support for MAC
messages, some of the security threats discussed no longer
exist for multihop WiMAX. However, one of the security
threats such as rogue RN attack is exists that adds a rouge
node/Fake node in network and creates big threaten to the
4G multihop wireless networks. Such attack causes network
QoS gets degraded. So there is a need for strong security
mechanisms and strict authentication methods to overcome
the existing security threats in 4G multihop. But enhancing
security should not degrade network QoS.
Hence we proposed Elliptic Curve Diffie-Hellman
(ECDH) protocol that has proven security strength and low
overhead for 4G wireless networks. ECDH is competitor to
RSA public key algorithm and has very good security. ECDH
consumes less power and suitable for 4G wireless networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314
3. LITERATURE SERVEY
In [1] authors Proposed QoS aware distributed security
architecture based on the Elliptic Curve Diffie-Hellman
(ECDH) protocol. Worldwide Interoperability for Mobile
Access (WiMAX) and Long Term Evolution (LTE) are 4G
wireless technologies which have better Quality of Service
(QoS) and security architectures. Security threats likeDenial
of Service (DoS), Water Torture Attack, rouge RN attack, etc
in WiMAX and LTE are present issues. So there is a need for
strong security mechanisms and strict authentication
methods to overcome the existing security threats in 4G
multihop wireless networks. But enhancing security should
not degrade network QoS.
In [2] authors have researched that there in the VANET
communication, especially in Multihop networks the
forwarder node authentication is more important. So, we
need to provide authentication for each and every hops. Hop
by Hop message authentication is required to provide high
level security in VANET. Simultaneously, the address of the
data origin known by the attacker leads to node capture
attack.
In [3] authors have researched on measuring the QoS
performance for node protection in 4G wireless networks
using network coding. Exclusive OR (XOR) network codingis
used to explain the node protection for multihop 4G wireless
networks. It is followed by measurement of the QoS
performance, such as packet delivery ratio (PDR), latency
and jitter, for different scenarios. Failure of a single and two
relay node with and without proposed protection scheme is
tested along with user's mobility.
In [4] authors proposed Network Protection Codes (NPC)
using network coding to protecttheoperationofthe network
against link and node failures. Their interest was to find the
limits of their NPC and where to deploy their NPC using
several network graphs with a minimum number of edges.
The authors also considered the problem of providing
protection against a single node failureusingnetwork coding
and reduced capacity technique for wired networks.
In [6] authors proposed, cross layer QoS architecture for 4G
heterogeneous network services. QoS engine and cross layer
algorithms are the main components. QoS engine is
composed of QoS daemon, QoS agent and control module.
Cross Layer Architecture monitors and adjusts resources
periodically. In the absence of CLA, average latency and
average packet loss are reduced by 2% and 8.5%
respectively. But throughput achievedisslightlylowerinCLA
than traditional layered approach.
In these existing research efforts, the authors
implemented the relaynodeprotectionusingnetwork coding
for different networks such as wired networks, Wireless
Sensor Networks (WSNs)andoptical networks.However,the
QoS performance of network coding for relay node
protection in a multihop wireless network is not tested until
now. Also, the relay node protection is very useful for
multihop 4G wireless networks.
4. SYSTEM ARCHITECTURE
Figure 1 shows System architecture for proposed
system. After generating WiMAX Multihop network and
implementing ECDH on it, we generateattack byaddingnode
in existing network. Then ECDH detects the rouge node by
using hop-by-hop authentication after completing intial
ranging process. By using distributed security architecture
we prevent the node which is detected as rouge node and
forward massage to next node. This process repeats until
destination node found.
Fig – 1: System Architecture
5. METHODOLOGY
There are four Modules in system:
5.1. Generation of 4G Multihop Network and ECDH
implementation on it.
5.2. Attack Detection
5.3. Attack Prevention
5.4. Performance Evolution
5.1 Generation of 4G Multi Hop WiMAX Network and
ECDH implementation-
In this module, we are implementing initial
configuration and setup of 4G Multihop WiMAX network in
NS 2or NS 3 Network simulator tool. We are adding base
station node, mobile station node and relay node. It creates
multihop network. Having one base station and multiple
ECDH
Detect node by
Distributed Sec.
Prevent Attacker
node
Send Packets to the
Destination
Secured Initial
Ranging Process
Generate WiMAX
Network
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315
mobile stations,relaynodes.Hereweareimplementinginitial
ranging process of ECDH. Which is shown in figure 2.After
downlink channel synchronization (DL Sync),the MS will
send ranging request (RNG_REQ)message. In turn,BS will
responds with RNG_RES message.ThentheSubsequentsteps
are following.
 EAP Based Authentication-
The authenticator intheAccessNetwork Gateway(ASN-GW)
sends an EAP Identity request to the MS, and the MS will
respond to the request by sending PKM-REQ (PKMv2 EAP-
Transfer) message. A PKM-REQ message contains thedetails
of SIM or X.509 certificate. Then the ASN-GW forwards the
PKM-REQ to the AAA server over radius protocol. The AAA
server authenticates the device and provides the Master
Session Key (MSK) in an EAP-TTLS protocol. Then, it
forwards MSK to the authenticator. The authenticator
generates Authorization Keys (AK) from the MSK and
forwards to the BS. At the same time, the MS also generates
the same AK from the MSK. Now, the BS and MS can mutually
authenticate each other using AK.
 Authorization and Security Association-
Once the device or the user is authenticated by the network,
the BS has to authorize the user by its unique Security
Association Identity (SAID) using SA-Transport Encryption
Key (SA-TEK) challenge messages, as depicted in the second
block in Figure 2.
 Traffic EncryptionandMACMessageEncryption-
Fig – 2 : Initial Ranging Process for WiMAX
The MS establishes an SA for each service flow where the
BS provides both uplink and downlink TEK to encrypt the
data. Initially TEK is generated from the EAP-based
authentication and then refreshed by BS periodically.
5.2 Attack Detection-
As author Ebrahim Halil Saruthan has proposed
system to detect and prevent rouge node in real time
wireless network [9] it shows real example of rouge node
in network. Different architectures like Access Point (AP)
architecture, client architecture etc. are used to Detectand
Prevent rouge node. So, we are generating attack in
network using simulator.
Network having attack, adds new rouge/fake node to
existing one to receive data and hand over to some other
nodes, creates traffic jam or to spoof or modify data etc.
Now we have to detect the rouge node with the
help of ECDH. First step is secured initial ranging process
for 1st hop to nth hop node is shown in figure 3.In initial
ASN
GW
AAA
MS BS
EAP Based Authentication
Authorization and Security Association (SA)
Traffic encryption and MAC Message Encryption
Master Session Key Establishment
Ranging Request
Ranging Response
MS context
initialization
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316
ranging process as shown in figure. 2 any WiMAX node
(MS/RS) wants to establish connection with BS generates
the public and private key pairs and sends public key to BS
initial ranging codealongwithRNG_REQmessage.Whichis
encrypted using BS public key.BS responds with RNG_RSP
message which is encrypted using BS public key.
Fig - 3 : Distributed Security using ECDH
BS responds with RNG_RSP message which is
encrypted with the MS/RS Public key. Hence MS/RS
establish secure tunnel with BS and subsequent MAC
messages encrypted using ECDH public key. In secure
initial ranging process the only additional bandwidth
overhead is the exchange of global parameters and public
keys. Now next step is distributed security using ECDH in
multihop WiMAX network. To establish hop to hop
authentication and to reduce computational overhead of
centralized node distributed architecture is necessary. In
which new node is actually identified in WiMAX network.
Figure 3 shows SA and key management in proposed
security architecture.
5.3 Attack Prevention-
This module shows how ECDH helps to prevent RN Attack
using key exchange.NeighborauthenticationandSAisnext
step. If the new RS is connected with network, the BS will
inform to the updated member list to the existing RSs
group in Downlink Channel Descriptor (DCD) message.
Now if new RS will find another RS during channel
scanning it verifies new RS is genuine or not verifying
RS_ID. Then it sends public key and RS_ID to the neighbor
RS to establish SA. The neighbor RS will also send the
public key in response. At the end of association, RS’s
generate uplink
BS
MS1
RS2
RS1
RS3 MS4MS3MS2
MS5
WiMAX Air i/f withECDH
key agreement
Tunnel i/f for ECDH key
agreement
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317
1
1
1
2
3 4
Fig - 4 : Neighbor Authentication Process using ECDH
and downlink CMAC digital signaturesamongthem.Figure
4 shows neighbor authentication process.instep1,theRS3
receives updated list after ECDH agreement with BS.
During scanning process, RS3 may find the DCD and other
downlink parameters of RS2 as shown in step 2.Since RS3
knows that RS2 is a legitimate node based on list received
from BS, it establishes theECDHagreement.AfterthatBoth
share their digital signatures as shown in step3andstep4.
5.3 Performance Evaluation-
This module calculates QoS performance andshows
that how it maintains its stability after applying ECDH using
NS 2 or 3 supporting tools such as X-Graph. We can consider
parameters for calculating performance like latency, service
availability, jitter, Packet loss rate, throughput performance.
6. CONCLUSION
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that
supports QoS-aware and safe multimedia services for
vehicular networks is mandatory for service providers. To
provide high bandwidth support at the vehicular speedof up
to 350 km/h, the WiMAX and LTEnetworksarethepreferred
candidates. 4G networks have well-defined QoS and security
architectures. However, some major security threats suchas
DoS attack still exist in 4G multihop networks, because
certain MAC messages are transmitted only in plain text. For
this reason, we have proposed a distributed security
architecture using the ECDH algorithm in Layer 2 for 4G
multihop wireless networks. In the proposed scheme, the
wireless nodes are initially authenticated by the home
network and then authorized by the access node.Inaddition,
the proposed scheme requires only a slightly higher
bandwidth and computational overhead than the default
standard scheme.
REFERENCES
[1] Perumalraja Rengaraju, Chung-Horng Lung, Member,
IEEE, and Anand Srinivasan “QoS-Aware Distributed
Security Architecture for 4G Multihop Wireless
Networks” IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 63, NO. 6, JULY 2014.
[2] Vinoth V. and C. Monica Manoreya “A SAMA Scheme For
Improving Qos in 4G Multihop Wireless Networks”
Department of Information Technology, Sathyabama
University, Chennai, India,VOL 10,no-7,2015.
[3] Perumalraja Rengaraju, Chung-Horng Lung, Anand
Srinivasan, ”QoS and protection of relay nodes in 4G
wireless networks using network coding”, 9th
International Conference on Wireless Communications
and Mobile Computing (IWCMC), Sardinia ,pp. 282 - 287
,July 2013
[4] S. Aly and A.Kamal, “ Networking Coding-Based
Protection Strategies Against Node Failures” Proc. of
IEEE ICC.,2009.pp.1-5.
[5] S. Aly, A.Kamal and A.Walid, “Network Design and
Protection using Network coding” Proc. of IEEE Theory
Information Workshop.2010, pp.1-5.
[6] Jiann-Liang Chen, Ming-Chiao Chen, Shih-Wei Liu, Jyun-
Yu Jhuo, “Cross-layer QoS architecture for 4G
heterogeneous network services”, 11th Int.Conf.
BS
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318
Advanced Communication Technology (ICACT
2009),Phoenix Park, pp.73-77,Jan 2009.
[7] A. Rammoorthy,and S. Li.”Protection against Link Errors
and Failures using Network Coding in Overlay
Networks”,Proc. Of IEEE International Symposium on
Information Theory, July 2009,pp.986-990.
[8] A. Kamal,”1+N Network Protection for Mesh
Networks:Network Coding-Based Protection using p-
Cycles” ,IEEE/ACM Transactions on Networking, Feb
2010,pp.67-80.
[9] Ibrahim Halil Saruthan,”Detecting and Preventing rouge
devices on network”SANS institutes 2007.

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...journalBEEI
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptslksagar
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET Journal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...Alexander Decker
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
 

What's hot (19)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
 

Similar to A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture

A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless NetworksIRJET Journal
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 

Similar to A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture (20)

A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313 A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture Miss. Shraddha V. Pawar1 , Prof. Sachin P. Patil2 1Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. 2Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - The WiMAX and LTE are two wireless radio data transmission technologies based on IEEE 802.16 designed to ensure broadband wireless access. This paper considers the problem of detecting rogue node in WiMAX networks. A rogue node is an attacker node that duplicates a legitimate node. It may lead to disturbance in service. In this paper we have proposed an efficient technique forsecure datatransmissionto ensure the security and integrity of the data packet in the WiMAX network. We have used an ECDH algorithm for ensuring secure data transmission. Key Words: Rogue Node, Distributed Security, Elliptic Curve Diffie Hellman Algorithm(ECDH), Worldwide Interoperable for Microwave Access(WiMAX). 1. INTRODUCTION Vehicular communications have received a great deal of attention in recent years due to the demand for multimedia applications during travel andforimprovements in safety. Safety applications often require fast message exchanges but do not use much bandwidth. On the other hand, multimedia services require high bandwidth for vehicular users.Hence,toprovidemobilebroadbandservices at a vehicular speed of up to 350 km/h. Worldwide interoperable for Microwave Access (WiMAX) and Long- Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth- Generation (4G) wirelesstechnologiesthathavewell-defined quality of service (QoS) and security architectures. WiMAX and LTE resemble each other in some key aspects, including operating frequency spectrum, high capacity, mobility, strong QoS mechanisms, and strong security with a similar key hierarchy from the core network to the access network. However WiMAX and LTE also differ from each other in certain aspects, as they haveevolvedfrom different origins. LTE has evolved from 3rd Generation Partnership Projects (3GPP): thus, the LTE network has to support the existing 3G users' connectivity, but there is no such constraint for WiMAX. Particularly, on the security aspect, the WiMAX authentication process uses Extensive Authentication Protocol Tunneled. Maintaining QoS requirements of a specific application has become a significant topic and priority is to maximize the QoS experienced by the user. QoS is the ability of a network to provide premier service to some fraction of total network traffic over specific underlying technologies. QoSmetricsare delay, jitter (delay variation), serviceavailability,bandwidth, throughput, packet loss rate. Metrics are used to indicate performance of particular scheme employed. QoS can be achieved by resource reservation (Integrated services), prioritization (differentiated services). 2. EASE OF USE As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. The main cause for the MAC layer security threatsin4Gvehicular networks is due to certain unprotected MAC management messages between Mobilestation(MS)andBaseStation(BS). When the control messages are in plain text, the attackers/intruders can easily spoof, modify,andreplythose control messages for the intended receiver node. The severity of the security threats may vary based on the modification of those control messages. Similarly, the attackers may send the continuous false packets unnecessarily to the receiving node for the water torture attacks. Many research efforts have been published on MAC layer security threats in both WiMAX and LTE networks and a few of them discussed the implementationofIPSecsecurity for WiMAX networks. In multihop WiMAX, once the user is registeredwith the home network the security layer may use three levels of protections for the MAC management messages, i.e., No protection, CMAC, and Encrypted by AES-CCM. As a consequence of adding the encryption support for MAC messages, some of the security threats discussed no longer exist for multihop WiMAX. However, one of the security threats such as rogue RN attack is exists that adds a rouge node/Fake node in network and creates big threaten to the 4G multihop wireless networks. Such attack causes network QoS gets degraded. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop. But enhancing security should not degrade network QoS. Hence we proposed Elliptic Curve Diffie-Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks. ECDH is competitor to RSA public key algorithm and has very good security. ECDH consumes less power and suitable for 4G wireless networks.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314 3. LITERATURE SERVEY In [1] authors Proposed QoS aware distributed security architecture based on the Elliptic Curve Diffie-Hellman (ECDH) protocol. Worldwide Interoperability for Mobile Access (WiMAX) and Long Term Evolution (LTE) are 4G wireless technologies which have better Quality of Service (QoS) and security architectures. Security threats likeDenial of Service (DoS), Water Torture Attack, rouge RN attack, etc in WiMAX and LTE are present issues. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop wireless networks. But enhancing security should not degrade network QoS. In [2] authors have researched that there in the VANET communication, especially in Multihop networks the forwarder node authentication is more important. So, we need to provide authentication for each and every hops. Hop by Hop message authentication is required to provide high level security in VANET. Simultaneously, the address of the data origin known by the attacker leads to node capture attack. In [3] authors have researched on measuring the QoS performance for node protection in 4G wireless networks using network coding. Exclusive OR (XOR) network codingis used to explain the node protection for multihop 4G wireless networks. It is followed by measurement of the QoS performance, such as packet delivery ratio (PDR), latency and jitter, for different scenarios. Failure of a single and two relay node with and without proposed protection scheme is tested along with user's mobility. In [4] authors proposed Network Protection Codes (NPC) using network coding to protecttheoperationofthe network against link and node failures. Their interest was to find the limits of their NPC and where to deploy their NPC using several network graphs with a minimum number of edges. The authors also considered the problem of providing protection against a single node failureusingnetwork coding and reduced capacity technique for wired networks. In [6] authors proposed, cross layer QoS architecture for 4G heterogeneous network services. QoS engine and cross layer algorithms are the main components. QoS engine is composed of QoS daemon, QoS agent and control module. Cross Layer Architecture monitors and adjusts resources periodically. In the absence of CLA, average latency and average packet loss are reduced by 2% and 8.5% respectively. But throughput achievedisslightlylowerinCLA than traditional layered approach. In these existing research efforts, the authors implemented the relaynodeprotectionusingnetwork coding for different networks such as wired networks, Wireless Sensor Networks (WSNs)andoptical networks.However,the QoS performance of network coding for relay node protection in a multihop wireless network is not tested until now. Also, the relay node protection is very useful for multihop 4G wireless networks. 4. SYSTEM ARCHITECTURE Figure 1 shows System architecture for proposed system. After generating WiMAX Multihop network and implementing ECDH on it, we generateattack byaddingnode in existing network. Then ECDH detects the rouge node by using hop-by-hop authentication after completing intial ranging process. By using distributed security architecture we prevent the node which is detected as rouge node and forward massage to next node. This process repeats until destination node found. Fig – 1: System Architecture 5. METHODOLOGY There are four Modules in system: 5.1. Generation of 4G Multihop Network and ECDH implementation on it. 5.2. Attack Detection 5.3. Attack Prevention 5.4. Performance Evolution 5.1 Generation of 4G Multi Hop WiMAX Network and ECDH implementation- In this module, we are implementing initial configuration and setup of 4G Multihop WiMAX network in NS 2or NS 3 Network simulator tool. We are adding base station node, mobile station node and relay node. It creates multihop network. Having one base station and multiple ECDH Detect node by Distributed Sec. Prevent Attacker node Send Packets to the Destination Secured Initial Ranging Process Generate WiMAX Network
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315 mobile stations,relaynodes.Hereweareimplementinginitial ranging process of ECDH. Which is shown in figure 2.After downlink channel synchronization (DL Sync),the MS will send ranging request (RNG_REQ)message. In turn,BS will responds with RNG_RES message.ThentheSubsequentsteps are following.  EAP Based Authentication- The authenticator intheAccessNetwork Gateway(ASN-GW) sends an EAP Identity request to the MS, and the MS will respond to the request by sending PKM-REQ (PKMv2 EAP- Transfer) message. A PKM-REQ message contains thedetails of SIM or X.509 certificate. Then the ASN-GW forwards the PKM-REQ to the AAA server over radius protocol. The AAA server authenticates the device and provides the Master Session Key (MSK) in an EAP-TTLS protocol. Then, it forwards MSK to the authenticator. The authenticator generates Authorization Keys (AK) from the MSK and forwards to the BS. At the same time, the MS also generates the same AK from the MSK. Now, the BS and MS can mutually authenticate each other using AK.  Authorization and Security Association- Once the device or the user is authenticated by the network, the BS has to authorize the user by its unique Security Association Identity (SAID) using SA-Transport Encryption Key (SA-TEK) challenge messages, as depicted in the second block in Figure 2.  Traffic EncryptionandMACMessageEncryption- Fig – 2 : Initial Ranging Process for WiMAX The MS establishes an SA for each service flow where the BS provides both uplink and downlink TEK to encrypt the data. Initially TEK is generated from the EAP-based authentication and then refreshed by BS periodically. 5.2 Attack Detection- As author Ebrahim Halil Saruthan has proposed system to detect and prevent rouge node in real time wireless network [9] it shows real example of rouge node in network. Different architectures like Access Point (AP) architecture, client architecture etc. are used to Detectand Prevent rouge node. So, we are generating attack in network using simulator. Network having attack, adds new rouge/fake node to existing one to receive data and hand over to some other nodes, creates traffic jam or to spoof or modify data etc. Now we have to detect the rouge node with the help of ECDH. First step is secured initial ranging process for 1st hop to nth hop node is shown in figure 3.In initial ASN GW AAA MS BS EAP Based Authentication Authorization and Security Association (SA) Traffic encryption and MAC Message Encryption Master Session Key Establishment Ranging Request Ranging Response MS context initialization
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316 ranging process as shown in figure. 2 any WiMAX node (MS/RS) wants to establish connection with BS generates the public and private key pairs and sends public key to BS initial ranging codealongwithRNG_REQmessage.Whichis encrypted using BS public key.BS responds with RNG_RSP message which is encrypted using BS public key. Fig - 3 : Distributed Security using ECDH BS responds with RNG_RSP message which is encrypted with the MS/RS Public key. Hence MS/RS establish secure tunnel with BS and subsequent MAC messages encrypted using ECDH public key. In secure initial ranging process the only additional bandwidth overhead is the exchange of global parameters and public keys. Now next step is distributed security using ECDH in multihop WiMAX network. To establish hop to hop authentication and to reduce computational overhead of centralized node distributed architecture is necessary. In which new node is actually identified in WiMAX network. Figure 3 shows SA and key management in proposed security architecture. 5.3 Attack Prevention- This module shows how ECDH helps to prevent RN Attack using key exchange.NeighborauthenticationandSAisnext step. If the new RS is connected with network, the BS will inform to the updated member list to the existing RSs group in Downlink Channel Descriptor (DCD) message. Now if new RS will find another RS during channel scanning it verifies new RS is genuine or not verifying RS_ID. Then it sends public key and RS_ID to the neighbor RS to establish SA. The neighbor RS will also send the public key in response. At the end of association, RS’s generate uplink BS MS1 RS2 RS1 RS3 MS4MS3MS2 MS5 WiMAX Air i/f withECDH key agreement Tunnel i/f for ECDH key agreement
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317 1 1 1 2 3 4 Fig - 4 : Neighbor Authentication Process using ECDH and downlink CMAC digital signaturesamongthem.Figure 4 shows neighbor authentication process.instep1,theRS3 receives updated list after ECDH agreement with BS. During scanning process, RS3 may find the DCD and other downlink parameters of RS2 as shown in step 2.Since RS3 knows that RS2 is a legitimate node based on list received from BS, it establishes theECDHagreement.AfterthatBoth share their digital signatures as shown in step3andstep4. 5.3 Performance Evaluation- This module calculates QoS performance andshows that how it maintains its stability after applying ECDH using NS 2 or 3 supporting tools such as X-Graph. We can consider parameters for calculating performance like latency, service availability, jitter, Packet loss rate, throughput performance. 6. CONCLUSION As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. To provide high bandwidth support at the vehicular speedof up to 350 km/h, the WiMAX and LTEnetworksarethepreferred candidates. 4G networks have well-defined QoS and security architectures. However, some major security threats suchas DoS attack still exist in 4G multihop networks, because certain MAC messages are transmitted only in plain text. For this reason, we have proposed a distributed security architecture using the ECDH algorithm in Layer 2 for 4G multihop wireless networks. In the proposed scheme, the wireless nodes are initially authenticated by the home network and then authorized by the access node.Inaddition, the proposed scheme requires only a slightly higher bandwidth and computational overhead than the default standard scheme. REFERENCES [1] Perumalraja Rengaraju, Chung-Horng Lung, Member, IEEE, and Anand Srinivasan “QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 6, JULY 2014. [2] Vinoth V. and C. Monica Manoreya “A SAMA Scheme For Improving Qos in 4G Multihop Wireless Networks” Department of Information Technology, Sathyabama University, Chennai, India,VOL 10,no-7,2015. [3] Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan, ”QoS and protection of relay nodes in 4G wireless networks using network coding”, 9th International Conference on Wireless Communications and Mobile Computing (IWCMC), Sardinia ,pp. 282 - 287 ,July 2013 [4] S. Aly and A.Kamal, “ Networking Coding-Based Protection Strategies Against Node Failures” Proc. of IEEE ICC.,2009.pp.1-5. [5] S. Aly, A.Kamal and A.Walid, “Network Design and Protection using Network coding” Proc. of IEEE Theory Information Workshop.2010, pp.1-5. [6] Jiann-Liang Chen, Ming-Chiao Chen, Shih-Wei Liu, Jyun- Yu Jhuo, “Cross-layer QoS architecture for 4G heterogeneous network services”, 11th Int.Conf. BS
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318 Advanced Communication Technology (ICACT 2009),Phoenix Park, pp.73-77,Jan 2009. [7] A. Rammoorthy,and S. Li.”Protection against Link Errors and Failures using Network Coding in Overlay Networks”,Proc. Of IEEE International Symposium on Information Theory, July 2009,pp.986-990. [8] A. Kamal,”1+N Network Protection for Mesh Networks:Network Coding-Based Protection using p- Cycles” ,IEEE/ACM Transactions on Networking, Feb 2010,pp.67-80. [9] Ibrahim Halil Saruthan,”Detecting and Preventing rouge devices on network”SANS institutes 2007.