IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Secure and Efficient Route Discovery by selecting Link Stability Neighbor in MANETs D.Sujeetha*, M.Saratha** *PG Scholar, CSE Department, Computer Science and Engineering, Anna University, Chennai **Assistant professor, CSE Department. Vivekananda College of technology for women, Elayampalayam,Tiruchengode. Tamilnadu, India. *[email protected] ** [email protected] Energy awareness for computation and protocol management is becoming a crucial factor in the design of MANET protocols and algorithms. Because of mobility, we need the support of scalable routing strategies and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce fake neighbor position for route discovery. Often energy saving and path duration and stability can be two contrasting efforts and trying to satisfy both of them can be very difficult because such a process can be easily abused or disrupted by adversarial nodes. Neighbor discovery is an important part of many protocols for mobile ad hoc networks, including localization and routing. Communications and protocols performance will depreciate, when neighbor discovery fails. In this paper, we address this open issue by proposing secure and efficient neighbor discovery with respect to select the most stable path so as to reduce the overhead due to route reconstruction and link failures, which offers a measure of protection against fake positions by allowing participating mobile nodes to securely determine if they are neighbors.We prove the security properties of our protocol, and demonstrate the effectiveness of our protocol through GLOMOSIM simulations.

Index Terms: MANET, Neighbor discovery, position verification, path stability.

I.

Introduction

Wireless Mobile Ad Hoc Networks (MANETs) have emerged as an advanced networking concept based on collaborative efforts among numerous self-organized wireless devices. MANET is a network where no fixed infrastructure exists. Such networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable and movement of communicating parties is possible. The topology of MANETs is dynamic, because the link among the nodes may vary with time due to device mobility, new device arrivals, and the possibility of having mobile devices. Hence, any routing protocol design must consider the physical limitations and constraints imposed by the ad hoc environment so that the resulting routing protocol does not degrade system performances. Since in MANET, there is no fixed-infrastructure such as base stations, mobile devices need to operate as routers in order to maintain the information about the network connectivity, as a result the conventional routing protocols cannot be supported easily by ad hoc networks. Several research studies have been launched to study this issue, those defined by the IETF MANET group can be classified into two categories: proactive protocols and reactive protocols. MANET’s technology offers both new challenges and opportunities for many applications. The major challenges for ad hoc technology is secure and efficient routing, due essentially to MANET features (e.g., open medium, lack of centralized management, nodes mobility). Several approaches have been proposed to secure ad hoc routing. Some existing solutions in wireless networks employ mechanisms used to protect routing protocols in wired networks that are based on the presence of a centralized infrastructure. These solutions are not appropriate for a decentralized ad hoc network.In mobile ad hoc networks, neighbor discovery is the process by which a node in a network determines the total number and identity of other nodes in its vicinity. It is a fundamental building block of many protocols including localization, routing, leader election,

D.Sujeetha, IJRIT

43

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

and group management. Time-based communications and many media access control mechanisms rely on accurate neighbor information. Neighbor discovery is especially important to the proper functioning of wireless networks. In wireless networks, neighbors are usually defined as nodes that lie within radio range of each other. Thus, neighbor discovery can be considered as the exploration of the volume of space or “neighborhood” immediately surrounding a wireless node. Nodes found within the neighborhood are neighbors and, depending on network configuration and topology, may cooperate in the performance of various tasks including communications, routing and localization. However, wireless communications are vulnerable to attacks. Attackers have the freedom to perform malicious activities ranging from simple denial of service to sophisticated deception. In this paper, we explore the security problem and neighbor selection in route discovery in mobile ad hoc networks by proposing a new security aspect for DSR on-demand protocol. The proposed protocol isspecifically designed to an open ad hoc network where each node must verify the identity of the node with which it communicates. This allows nodes to be authenticated before taking into account any information during the route discovery. In our proposal, we focus on attacks carried out by traditional external illegitimate nodes which do not have the access rights to the network. We also take into consideration several attacks carried out by internal malicious nodes which inject false information about their position. Moreover, the proposed solution ensures the reliability and stability of the route discovery process. Our contributions are illustrated in what follows: _ Proposing a new secure and efficient route discovery based on DSR _ Proposed protocol will ensure the establishment of a routebetween two nodes if it exists _ Detecting and rejecting adversaries _Select the most stable path for transmitting data among remaining true neighbors based on path and total energy needed to process and transmit the data

II.

stability, residual energy

Related Works

We first expose relevant research work related to secure and efficient route discovery in MANETs.Then, we explicit how our approach combines both the secure and link stability metrics, to find the reliable path for communication and extend the network lifetime. Most of the routing algorithms proposed forMANETs are based on reactive routing strategy, inwhich route is established only when there is a needto transmit a packet. In these protocols route recoveryand maintenance procedures are initiated only after aroute break. This procedure consumes extrabandwidth and power at processing nodes and alsoincreases the delay.It is important to find routes that last longer, toreduce the route breakage and consumption ofresources. In [1], Link stability is defined as a measure ofhow stable the link is and how long thecommunication will endure. Signal Strength is one ofthe parameter used to estimate the stability of links. In [2], [3], the route discovery is based on signal strengthand location stability of nodes. In SSA, a mobile nodedetermines the average signal strength at which thepackets are exchanged between nodes and locationstability is used to choose longer-lived route.Sulabh Agarwal and Pal Singh propose RABR[4], in which the route selection is done based on theintelligent residual lifetime assessment of thecandidate routes. This major challenge with thisprotocol is, to choose the optimal threshold values. In[5], the authors estimated the link stability based onthe signal strength. If the received signal strength isgreater than a certain threshold, the link is considered to be stable. In [6], Min-Gu and Sun ggulee proposed a route selection based on Differentiated signal strength [DSS]. DSS indicates whether thenodes are getting closer or getting farther apart. If thesignal strength is getting stronger, the link isconsidered to be stable. If the signal strength isgetting weaker in case of node moving away isconsidered to be unstable link. In [7], N.Sharma and S.Nandi propose RSQR ,in which the link stability and route stability arecomputed using received signal strength. Based onthe threshold values the links are classified as stableor unstable link. Link stability and link uncertaintyvalues are used for stable route selection among allthe feasible routes.Gun Woo and Lee propose EBL [8], in whichthe authors give importance to both link stability and the residual Battery capacity. The EBL not onlyimprove the energy efficiency but also reducenetwork partition. Floriano and Guerriero proposeLAER [9], in which they consider joint metric oflink stability and energy drain rate into routediscovery, which results in reduced control overheadand balanced traffic load. The expected route lifetime is mainly predictedwith the parameters node battery energy and linkstability. It is preferable to select stable links i.e. linkshaving longer predicted lifetime, instead of selectingweak links which break soon and introduce routing overhead [10].In [11], Guerriero propose PERRA, an reactiverouting protocol, which accounts both link stabilityand power efficiency. Intermediate nodes in PERRApropagates route request, only if it meet the energyrequirement specified by the source node. Thus, thepath established is a stable path that incurs residualenergy, path stability and estimated energy for datatransmission. It also maintain alternate path, whichcan be used before link break occurs to reduce thepath breakage. Control overhead is greatly reduceddue to constrained flooding and maintenance ofalternate path. In [12], an efficient secure routing protocol(ASRP) to ensure the routing security in adhoc D.Sujeetha, IJRIT

44

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

networks is proposed. ASRP provides powerful security extensions to the reactive AODV protocol, based on modified secure remotepassword protocol and Diffie-Hellman (DH) algorithms. In[13],the NPV, neighbor position verification protocol for finding independent and colluding adversaries in the networks which is advertising false position for participating in the data transmission.We propose a new route discovery process to combine both the efficient and secure neighbor discovery process in a route discovery phase of routing process. We organized the paper as follows. In Section III we give proposed system In section IV we give performance evaluation of the proposed system. We conclude in Section V.

III.

Proposed System

To ensure the reliability and stability of the routing process we propose EfficientNeighbor Route DiscoveryProtocol (ENRDP).To our knowledge, our protocol is the first to provide a distributed, lightweight solution to the neighbor position verification problem that need not require infrastructure or a priori trusted neighbors and is robust against several different attacks, including coordinated attacks by independent and colluding adversaries. Next, it provides best selection of neighbor based on the stability of the link. The working procedure of ENRDP protocol is described in the Fig.1.We divide the ENDRP protocol in to two tasks 1) Distributed cooperative NPV 2) Path stability prediction technique Distributed cooperative scheme for NPV We propose a fully distributed cooperative scheme for NPV, which enables a node, called verifier, to discover and verify the position of its communication neighbors. A verifier can initiate the protocol at any time, by triggering the message exchange called POLL, REPLY,REVEAL and REPORT, within its 1-hop neighborhood.

D.Sujeetha, IJRIT

45

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

Start Simulation

MANET network setup Nodes distribution and placement

Mobility

Route discovery by send route request

Receives route reply

Positions of Neighbor nodes

N Generate link cost values of each neighbor

Is position valid?

Y

Path Stability technique

Route established to next forwarding node

N Isdest?

Y Packet delivery

Stop Simulation

Figure 1 ENRDP Protocol The aim of the message exchange is collect information that it is used to compute distances between any pair of its communicationneighbors.The POLL and REPLY messages are first broadcasted byverifier and its neighbors, respectively. These messages are anonymous, allowing nodes to record reciprocal timing information without disclosing their identities. Then, after a REVEAL message broadcast by the verifier, nodes disclose to verifier, through REPORT messages. The REPORT messages are secure and authenticated. Neighbor nodes identities as well as the anonymous timing information are collected. The verifier uses such data to match timings and identities; then, it uses the timings to perform ranging and compute distances between all pairs of communicating nodes in its neighborhood. Propose a lightweight, distributed, and efficient protocol that enables each node to discover and verify the position of its neighbors. The protocol can be executed at any point in time, without prior knowledge or assumed trustworthiness of the other nodes that participate by any node. A fully D.Sujeetha, IJRIT

46

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

distributed cooperative scheme for NPV protocol allows any node in the network to discover and verify the position of its communication neighbors that participate in the protocol message exchange. The procedure is performed in a reactive manner, i.e., it can be run by any node at any time instant, by initiating the message exchange. Such node will be referred to as the verifier.Based on this knowledge, the verifier performs security tests to tag its communication neighbors as: · Verified, i.e., nodes the verifier deems to be trustworthy; · Faulty, i.e., nodes the verifier deems to have announced an incorrect position; · Unverifiable, i.e., nodes the verifier cannot prove to be either correct or faulty – this may happen due to lack of sufficient information on these nodes or because the verifier cannot form a clear opinion on their behavior. Clearly, the objective of our protocol is to be robust to adversarial nodes in that it minimizes the number of unverifiable nodes and the number of positive/negative false. By the latter we mean correct nodes declared as faulty and adversaries tagged as verified. Path stability prediction technique A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between two nodes. Ensuring a path to be valid for adequately longer period of time is a very difficult problem in MANET due to its high mobility nature. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. As per Distributed cooperative scheme for NPV technique, solves the neighbor verification and this scheme does not concentrate on link failures which is more often in MANET network so neighbor position verification is not get optimized results thus provide solution to link breakages through path quality technique and enhance neighbor position verification technique as per path quality technique which delivers results in efficient manner. This routing technique applies the following three metrics for path quality neighbor coverage selection: 1) The total energy to transmit and process a data packet; 2) The residual energy; 3) The path stability. Route maintenance and route discovery procedures are similar to the DSR protocol, but with the route selection based on the three aforementioned metrics. Delivery probabilities are synthesized locally from context information’s like value describes the above metrics. A delivery probability of each node is used to select link stability path over dynamic route discovery.

IV.

Performance Evaluation

The performance of the proposed algorithm is evaluated via glomosim simulator. Performance metrics are utilized in the simulations for performance comparison. •

Packet arrival rate. The ratio between the number of received data packets to the number of total data packets sent by the source.



Average end-to-end delay. The average time elapsed for delivering a data packet within a successful transmission from source to destination.



Communication overhead. The average number of transmitted control bytes per second, including both header of the data packetsand the control packets.



Energy consumption. The energy consumption for the entire network, including transmission and processing energy consumption for both the data and control packets.

V. Conclusion In mobile ad hoc networks, knowledge of neighbor positions is a requirement in a number of important tasks. However, distributed techniques to perform secure neighbor position discovery, suitable for highly mobile ad hoc environments, are described in the proposed system under discovery of neighbor by avoiding false positions neighbors and also we addressed the selection of stable path among the neighbors which not only describes the selection of correct position neighbors but also best D.Sujeetha, IJRIT

47

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 43-48

link stability neighbors. Thus overcome the adversary and also link failures. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility in terms of malicious activities. As a future work, we will simulate these algorithms in various mobility models and radio propagation model. Most of all, the distributed version of algorithms should be designed and applied to real environment in near future.

VI. References [1] T-Cabrera, A., N-Perez, I., Casilari, E., &Ganete, F. J.(2006) “Ad hoc routing based on the stability of routes”,in MobiWAC’06, Terromolinos, Spain, pp. 100–103. [2] C-K. Toh, “Associativity-Based Routing for Ad hocMobile Networks,” IEEE Personal Communications, Vol.4, No. 2, pp. 103 – 139, March 1997. [3] R.Dube, C.D. Rais, K. Wang and S.K. Tripathi, “SignalStability Based Adaptive Routing for Ad-Hoc mobilenetwork IEEE Personal Communication, Feh 1997. [4] SulobhAgorcvol, AshishAhujo, Jorinder Pol Singh,“Route-Lifetime Assessment Based Routing (RABR)Protocol for Mobile Ad-Hoc Networks”. [5] Hwee Xian, Winston Seah, “Limiting Control OverheadsBased on Link Stability for Improved performance inMobile Adhoc Networks”, Springer,WWIC 2005,UNCS3510, pp.258-268. [6] Lee, M.-G., & Lee, S. “A link stability model and stablerouting for mobile ad-hoc networks”, in EUC 2006, LNCS4096, Seoul, Korea, pp. 904–913. [7] NityanandaSarma, Sukumar Nandi, “Route StabilityBasedQoS Routing in Mobile Ad Hoc Networks”,Springer, March 2009. [8] G.W. Park, S.Lee, “A routing protocol for Extent NetworkLifetime through the Residual Battery and Link Stabilityin MANET”, ACC ’08, Istanbul, Turkey, May 27-30,2008. [9] F.D. Rango, F. Guerriero, “Link Stability and EnergyAware Routing Protocol in Distributed WirelessNetworks”, IEEE Transactions on Parallel andDistributed systems, vol.23, no. 4, April 2012. [10] S. Singh, M. Woo, and C.S. Raghavendra, “Power-awarerouting in mobile ad hoc networks,” in Proc. Int. Conf.Mobile Computing and Networking, pp. 181-190, 1998. [11] F.Guerriero“ ABiojective Optimization Model forRouting in Mobile Ad-hoc Networks”, IEICE Trans.Comm. Pp 45884597. [12]Ahmed Nabet, RidaKhatoun, LyesKhoukhi, Juliette Dromard and Dominique Gaïti “Towards Secure Route Discovery Protocol inMANET,” IEEE 2011. [13] Marco Fiore, Claudio EttoreCasetti,Carla-FabianaChiasserini, and PanagiotisPapadimitratos, “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks”, IEEE Transactions On Mobile Computing, VOL. 12, No. 2, February 2013.

D.Sujeetha, IJRIT

48

Secure and Efficient Route Discovery by selecting ...

*[email protected]. ** sarathavamsha@gmail.com ... networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed .... The aim of the message exchange is collect information that it is used to compute distances between any pair of its.

101KB Sizes 0 Downloads 169 Views

Recommend Documents

Secure and Efficient Data Transmission.pdf
Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the

Iterative Route Discovery in AODV
A major challenge in the design of ad hoc network is the ..... Thus, it is logical to assess the behavior of an approach .... [9] D. B. Johnson and D. A. Maltz.

Enabling And Secure Efficient Ranked Keyword Search Over ...
... searchable encryption, order-preserving mapping, confidential data, cloud computing. ✦ ... management, universal data access with independent ..... Enabling And Secure Efficient Ranked Keyword Search Over Outsourced Cloud Data.pdf.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
Abstract—Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be ...

The Implementation of Secure and Efficient Digital ...
A cloud server can make a decision that some digital goods contain specific keywords assigned by the buyer, but can not know any information about the ...

An Efficient and Secure User Revocation Scheme in ...
a set of custom simulations built in Java. In the following, we detail .... fine-grained data access control in cloud computing,” in INFOCOM,. 2010, pp. 534–542.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ...

Design of secure and energy-efficient cooperative video distribution ...
www.ijrit.com. ISSN 2001-5569. Design of secure and energy-efficient cooperative video distribution over wireless networks. 1 Divya J Alapatt, 2 Prof.Gayathri N.

Design of secure and energy-efficient cooperative video distribution ...
In a real-time video broadcast where multiple users are interested in the same content, mobile-to- mobile cooperation can be utilized to improve delivery efficiency and reduce network utilization. Under such cooperation, however, real-time video tran

Efficient Runtime Service Discovery and ... - Research at Google
constraint as defined by Roy T. Fielding, stating that the ... of autonomously finding more information and performing ... technologies iii) that emphasizes simplicity and elegance. The ... All operations on these resources use the standard HTTP.

An Efficient Genetic Algorithm Based Optimal Route Selection ... - IJRIT
Wireless sensor Network (WSN) is getting popular especially for applications where installation of the network infrastructure is not possible, such as.

An Efficient Genetic Algorithm Based Optimal Route Selection ... - IJRIT
infrastructure, but imposes some drawbacks and limitations (mainly on .... Networks”, http://www.monarch.cs.rice.edu/monarch-papers/dsr-chapter00.pdf.

Efficient Secure Primitive for Privacy Preserving ...
Department of Computer Science and Technology,. University of ... with each other to conduct computations on the union of data they each hold. ... benefits, the hospitals may be unwilling to compromise patients' privacy or vio- late any ... serving h

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
The ABE scheme can be specialised to obtain an IBBE system with constant sized ... product encryption have been omitted due to reasons explained earlier.

Music selecting apparatus and method
Feb 25, 2009 - A degree of chord change is stored as data for each of a plurality of music ...... average value Mave of the characteristic values C1 to Cj for.

Energy Efficient Expanding Ring Search for Route ...
work of user devices that are connected by wireless links in infrastructure-less situation. ... disadvantages that need to be alleviated in order to get better results.

Efficient Adaptively Secure IBBE from the SXDH ... - CSE IIT Kgp
applications including pay-TV, copyright protection of digital content and encrypted file systems. At a broad level, there are two settings for BE. In symmetric key ...

An efficient secure distributed anonymous routing ...
Available online 30 September 2004. Abstract. An ad hoc wireless network ... communicate with each other without the intervention of any centralized administration or established infrastructure. Due to the limited transmission range ..... neighboring

Efficient Semantic Service Discovery in Pervasive ... - Semantic Scholar
computing environments that integrate heterogeneous wireless network technolo- ... Simple Object Access Protocol (SOAP) on top of Internet protocols (HTTP, SMTP). .... In this area, various languages have been proposed to describe.

Selecting different protein representations and ...
Apr 7, 2010 - selects the best type of protein representation in a data-driven manner, ..... lection seems similar to the well-known idea of feature selection in data mining ..... Figure 3: Analysis of relative protein representation importance on th

Selecting different protein representations and ...
Apr 7, 2010 - Figure 3: Analysis of relative protein representation importance on ..... prot: web-based support vector machine software for functional classifica-.

Innovation-Tournaments-Creating-And-Selecting-Exceptional ...
Download Eric Stanberry, Jr.; Jarrett Willi ebook file free of. charge and this ebook pdf found at Saturday 8th of December 2012 10:07:42 AM, Get a lot of Ebooks from our online library. related with Creating Opportunities .. Palms on: Amazon Kindle

Discovery, Settlement, and Demographics
39.2. 69.5. 34.5. 22.3. 32.4. 20th. 219.7. 121.5. 152.6. 156.0. 68.9. 138.4. 49.9. 54.6. 43.0 the most inhabited island, with a population of 164,136 and a density of ...