Conference PaperPDF Available

Detecting Forged Acknowledgements in MANETs

Authors:

Abstract and Figures

Over the past few years, with the trend of mobile computing, Mobile Ad hoc NETwork (MANET) has become one of the most important wireless communication mechanisms among all. Unlike traditional network, MANET does not have a fixed infrastructure, every single node in the network works as both a receiver and a transmitter. Nodes directly communicate with each other when they are both within their communication ranges. Otherwise, they rely on their neighbors to store and forward packets. As MANET does not require any fixed infrastructure and it is capable of self configuring, these unique characteristics made MANET ideal to be deployed in a remote or mission critical area like military use or remote exploration. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. It is crucial to develop suitable intrusion detection scheme to protect MANET from malicious attackers. In our previous research, we have proposed a mechanism called Enhanced Adaptive ACKnowledgement (EAACK) scheme. Nevertheless, it suffers from the threat that it fails to detect misbehaving node when the attackers are smart enough to forge the acknowledgement packets. In this paper, we introduce Digital Signature Algorithm (DSA) into the EAACK scheme, and investigate the performance of DSA in MANET. The purpose of this paper is to present an improved version of EAACK called EAACK2 that performs better in the presence of false misbehavior and partial dropping. Keywords—MANET; Digital Signature; DSA; EAACK
Content may be subject to copyright.
A preview of the PDF is not available
... Furthermore, Kang et al., [12] in attempt to reduce this overhead proposed Enhanced Adaptive ACKnowledgement (EAACK) to solve four significant problems of Watchdog mechanism, such as ambiguous collisions, receiver collisions, limited transmission power and false misbehaviour report. His work was further enhanced in [13] to include digital signature as a security means, however it incurred more overhead. Muhammad et al., [14] also proposed a novel Adaptive Trust Threshold (ATT) computation strategy, which adapts the trust threshold in the routing protocol according to network conditions such as rate of link changes, node degree and connectivity, and average neighborhood trustworthiness. ...
... The degrees of packet delivery between the two schemes in scenario 1 and 2 are as shown in Fig. 3 and 4 respectively. In the first scenario, it's been observed that MAACK achieved a higher delivery ratio than EAACK by a total of 28.9% this shows that the detection efficiency of our model MAACK as compared to EAACK is higher, a higher PDR shows that MAACK detect more malicious nodes than EAACK according to Kang et al [13]. In the second scenario, it's been observed that EAACK outperforms MAACK by 8.13% at 0% to 30% malicious nodes, this is because the punitive measure applied to the misbehaving nodes was a dropping scheme, and therefore the flow monitor identifies them (packets dropped to punish misbehaving nodes) as a lost packets, hence the result. ...
Article
Full-text available
Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks (MANETs) are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work, a Mobile Agent-Based Acknowledgement scheme (MAACK) was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol (IP) address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 (NS-3) and results benchmarked with an existing scheme; the Enhanced Adaptive Acknowledgment (EAACK) using packet delivery ratio, routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio, lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.
... By means of compromised node, transmission of all the packet will be directed and the node which is able to drop the packets. [5,7] The attack can be identified through the common networking tools, only if the malicious node attempts to drop all the packets. Hence, there is no packet transmission through the compromised node. ...
... The prevention and detection of selfish nodes and packet dropping attack play a significant role in MANET. [4,5,7,8] ...
... Though the displacement assisted routing standard considers that the source nodes have all the needed data, the displacement and degree of direction for the target these data are normally anonymous. The dynamic source routing (DSR) is charmingly effective routing protocol precisely planned for multi-hop wireless ad hoc networks [8]. Usually, the network standards eternally alter the based on the node displacements, therefore, the presently employed path might become disconnected due to the routing related data stored within the path cache that might be decayed particularly during increased displacements experienced as in vehicular ad hoc networks. ...
... From eqn.(8) A ≥ 0 and C ≤ 0. If A = 0 representing that two nodes are regarded to hold the identical node displacement position then the distance prevailing among them would never alter unless one of them modifies their displacement position. ...
Article
Full-text available
The conventional dynamic source routing (DSR) standard chooses the path in need of minimal hop counts for communicating the information from the source to the target. Therefore due to node displacements in autonomous self – regulatory ad hoc networks, the path comprising a minimal number of probably increased extent hops do not works well always. Moreover, the presently employed path might split due to the node displacements and the path related data acquired from the path identification might become illogical. For avoiding the probably imprecise nature of the route-related data a fuzzy logic supported scheme is initiated into the routing scheme for evading the control of rough routing related data. Extensively the fuzzy logic supported schemes are probable of operating various inputs which therefore are used for both the anticipated path lifespan and the hop counts as their input thus permitting to combine the physical layer and the network layer into a mutually modeled routing standard. The lifetime of the path is usually minimized based on the increased node displacements. The precise path with increased path constancy is lastly chosen for communicating the data and based on the lifetime of the path the path cache termination time is altered erratically. The illustration is performed for the designed fuzzy based DSR scheme which outdoes the traditional DSR in terms of reasonable network outcomes rather with minimal network governance load. Lastly measuring the influence of the physical layer is performed over the possible behavior of the network layer for various physical layer schemes using NS 2 simulator.
... In order to measure and compare the performances of our proposed scheme, we continue to adopt the following two performance metrics [13]. During the simulation, the source route broadcasts an RREQ message to all the neighbors within its communication range. ...
Article
Full-text available
A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new intrusion detection system named Reinforce Adaptive ACKnowledgement (RAACK) specially designed for MANETs. By the adoption of MRA scheme, RAACK is capable of detecting malicious nodes despite the existence of false misbehavior report. In this paper, we propose and implement a new intrusion-detection system named Reinforce Adaptive ACKnowledgment (RAACK) specially designed for MANETs. Compared to contemporary approaches, RAACK demonstrates higher malicious-behavior-detection rates.
... Course revelation is finished by source node (SN). The course demand (RREQ) is submitted to its neighbors for course recognizable proof [17]. When a middle hub (IN) gets this RREQ, it examines the way to the objective in its steering table. ...
Article
Full-text available
Security and correspondence happening between network central point will be an instance for principal issues in Mobile Ad-hoc Networks (MANETs). Due to some ideas created by the organization leading to avoid attacks but may end in failure due to inappropriate way and thus attacks need recognized and cleared. The Dual-Cooperative Bait Detection Scheme (D-CBDS) is one of the ways that is in the stake for the discovery of MANET-dark/dim opening assailants. The current CBDS calculation consolidates the intensity of proactive and responsive security advancements to characterize lure mode assailants as proactive and receptive engineering. In CBDS, an adjacent source node is randomly selected as a bait target for searching. By reverse tracking as a reactive method, the attackers are identified. However, in some time, the chosen bait destination node may be an intruder that is not handled in the current CBDS approach. This paper therefore reinforces the CBDS with the dual mode of selecting two nearby nodes as two bait destinations. Dual reverse tracking enables effective collaborative assailants in MANET. Finally, when we analyze D-CBDS with respect to Routing overhead, End-End delay and throughput it gives much productivity than other methods like DSR, CBDS.
Article
Full-text available
Future wireless communication systems will be greatly dependent on the instantaneous deployment of independent mobile users. Some of the notable and interesting examples include creating sustainable, well organized, well planned, effective, and active communication systems for emergency/exigency/crises operations, catastrophe relief efforts, and military networks. Such networking situations depend on distributed, dispersed and disorganized connectivity, and can be designed as applications of Mobile Ad Hoc networks. A MANET is a self-governing and self-organizing collection of mobile nodes with relatively equal bandwidth that communicate over restricted wireless links. A MANET network is decentralized and disseminated, where all networking including topology discovery and conveying the messages must be achieved by the nodes themselves, i.e., routing capabilities are assimilated into mobile nodes. However, determining feasible routing paths for distributing messages in a decentralized network where network topology varies is a difficult job. Factors such as the open medium and vast distribution of nodes, topological changes, variable wireless link quality, and propagation path loss become pertinent issues and make MANET unprotected to intrusions. Thus, it becomes pivotal to develop a systematic intrusion detection scheme to secure Mobile Ad Hoc networks from intruders. In this paper, we put forward and applied an efficient IDS mechanism based on Enhanced Adaptive Acknowledgment (EAACK) especially made for MANETs which performs better than the previous techniques such as Watchdog, TWOACK and AACK. Keywords: Mobile Ad hoc Network (MANET) Acknowledgment (ACK), Secure Acknowledgment (S-ACK), Misbehavior Report Authentication (MRA), Digital Signature Algorithm (RSA), Enhanced Adaptive Acknowledgment (EAACK). 1. Introduction WIRELESS networking is the need of hour for many applications because of its easier network expansion, increased mobility [27] [29], improved responsiveness, better access to information, and enhanced guest access. In addition, with the increasing standard of industry and use of lightweight network hardware devices that are even smaller and largely mobile. The wireless communication is enhanced by Mobile ad hoc networks (MANETs) having high degree of node mobility. A Mobile Ad Hoc Network (MANET) [28] is a self-maintaining and self-configuring network with autonomous nodes, collection of mobile nodes formed without the use of centralized infrastructure. The communication between the nodes is done with wireless transmitter and wireless receiver within the specified communication range. This means that the two nodes can communicate only if they are present in specified range. MANET [28] solves this issue by allowing the intermediate nodes to transmit data transmissions. This is attained by dividing Mobile Adhoc Networks into two types of networks, viz, single-hop and multi-hop. In a single-hop, all mobile nodes which lie in the same radio communication range transfer data directly among each other [9]. On the other side, in a multi-hop network, nodes depend on other intermediate nodes to transmit data, if destination node is beyond their radio communication range. MANETs are growing rapidly. Manets are used in various fields due to their large applications like in Military, Industrial use, civilian use. Manets can be set up without using static infrastructure or human interaction. The network topology changes frequently [29] as the mobile nodes have an important property i.e. the mobility that gives them the flexibility to move anywhere in the network or can move outside the network. This flexibility provided is useful but on the other hand makes it vulnerable to new security risks due to the cooperativeness and open broadcast medium of the mobile devices (that generally possess computational capacities and different resource, and limited battery power). As a result, intrusion detection becomes an indispensable part of security for MANETs. The intrusion detection techniques designed for traditional wired networks cannot be implemented for wireless networks due to different characteristics. Therefore, to make intrusion detection systems work effectively new techniques need to be developed for MANETs. This paper is divided into different sections as follows. Section 2 gives brief idea on the background of intrusion Mumtaz Ahmed et al.
Article
Full-text available
The migration to wireless network from wired network has been a global trend in the past few years. The scalability and mobility brought by wireless network made it possible in many applications. Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and distinctive applications. On the contrary to ancient spec, MANET doesn't need a set network infrastructure; each single node works as a transmitter and a receiver and they trust their neighbors to relay messages. Nodes communicate directly with each other when they are both within the same transmission range. Or else, they rely on their neighbors to relay messages. Self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. Therefore it is very crucial to develop efficient intrusion detection mechanisms to protect MANET from attacks. In this paper, we define solid privacy requirements regarding malicious attackers in Mobile Ad-hoc Network. We propose and implement a new intrusion detection system named Enhanced Intrusion Detection System with On-Demand Routing Protocol using Hybrid Cryptographic Techniques for MANETs. Compared to contemporary approaches, it demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Chapter
Mobile ad hoc network is an important application in the current wifi world. There is no need of any network infrastructure. Each node acts as a transmitter that transmits the messages to the nearby nodes and receiver that receives the messages. Each node also acts as a cluster head to receive information from the virtually connected nodes. All grouped information is sent to base station. MANET is self-governing networks. The dynamic nature of MANET, where the topology is changing very rapidly and randomly. Wireless network medium used for message dispersion is prone to attack, as it is accessible by all. It is a necessity to develop a secure and efficient technique to identify cyber attackers to protect MANET from attacks. The proposed technique ‘Modified S-ACK’ will provide secure and efficient way of data transmission in Mobile Networks.
Chapter
Full-text available
This paper discusses the application of NodeMCU to intelligent monitoring of bearings via an online method using an accelerometer to detect the vibration level. An accelerometer was used to detect the vibration level and NodeMCU module for sending a message to the end-user regarding excessive vibration levels. NodeMCU module serves as a low-cost industrial-internet-of-things setup for online monitoring of bearings. In the experiment, the set-up had a motor (to provide torque to the shaft), two ball bearings set, a shaft coupling (to connect main shaft to motor shaft), a NodeMCU (for sending a warning message), an accelerometer (to detect the vibration level), and Blynk app (to control the NodeMCU). The experimental setup was designed to detect the vibration level in time domain as well as in frequency domain and the setup was able to send the warning message in both the cases. By using this type of experimental setup, the unwanted breakdown and uncertain failure of machines due to bearing failure can be avoided. The setup helped in alerting the user about any failure in real time whenever the magnitude of vibrations exceeded its predetermined threshold limit. This experimental setup is found to be very relevant for applications in small- and medium-scale industries due to its low-cost, ease of operation, and good accuracy. KeywordsAccelerometerBearingsBlynk appIndustrial-internet-of-thingsNodeMCU
Chapter
Full-text available
Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11]
Book
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Chapter
A mobile ad hoc network (MANET) is a self-configurable, self-organizing, infrastructureless multi-hop wireless network. By self-configurable and self-organizing, we mean that an ad hoc network can be formed, merged together or partitioned into separated networks on the fly depending on the networking needs, and few administrative actions need to be performed for network setup and maintenance. By infrastructureless, we mean that an ad hoc network can be promptly deployed without relying on any existing infrastructure such as base stations for wireless cellular networks. By multi-hop wireless, we mean that in an ad hoc network the routes between end users may consist of multi-hop wireless links, as compared to the single wireless hop in a wireless LAN or a cellular network, where only the last hop, e.g. from the end user to the access point or the base station, is wireless, all the links beyond that point remain wired. In addition, each node in a mobile ad hoc network is capable of moving independently and forwarding packets to other nodes. The rapidly deployable and self-organizing features make mobile ad hoc networking very attractive in military applications, where fixed infrastructures are not available or reliable, and fast network establishment and self-reconfiguration are necessary. Primary applications of mobile ad hoc networks include the tactical communications in battlefields and disaster rescue after an earthquake, for example, where the environments are hostile and the operations are security-sensitive, yet fast and reliable deployments are a must. Recently, due to the availability of wireless communication devices that operate in the ISM (Industrial, Scientific and Medical) bands and other unlicensed band, the interest in mobile ad hoc networks has been extended to civilian life such as on-the-fly setup for conferencing and home-area wireless networking.
Article
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.
Article
Some security research in Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have been designed based on cryptographic techniques, such as public key infrastructures and identity-based cryptography. In fact, some of them are fully adapted to fit the network requirements on limited resources such as storage, CPU, and power limitations. For example, one way hash functions are used to construct disposable secret keys instead of choosing private key in public key infrastructure. To gain a quick understanding of security design, we provide a survey on cryptography applications to secure MANETs and WSNs. Through this survey, we present network security schemes and protocols according to cryptographic techniques, give a few case studies on popular techniques of cryptography application, and dissect one of the designs using cryptographic techniques.
Chapter
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal.