Научная статья на тему 'Mobile ad-hoc networks security review paper'

Mobile ad-hoc networks security review paper Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
81
33
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
MANETS / SECURITY

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Al-Rawi Muaayed F.

Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc network (MANET) is a distributed framework less network and essentially depends on singular security arrangements from every mobile node and in this way brought together security control is difficult to execute in it. The nature of ad hoc networks makes them powerless against different types of attack. The arbitrary nature of these networks makes implementation of security a defying issue. The mobile ad hoc network (MANET) is the kind of network wherein mobile nodes can link or depart the network when they need. Because of self-arranging nature of the network malicious nodes enter which are capable to trigger different sorts of active and passive attacks. The active attacks are those which diminish network performance regarding certain parameters. In this article, different methods are reviewed and dissected as far as specific parameters.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Mobile ad-hoc networks security review paper»

Mobile Ad-Hoc Networks Security Review

Paper

Muaayed F. Al-Rawi

Abstract— Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc network (MANET) is a distributed framework less network and essentially depends on singular security arrangements from every mobile node and in this way brought together security control is difficult to execute in it. The nature of ad hoc networks makes them powerless against different types of attack. The arbitrary nature of these networks makes implementation of security a defying issue. The mobile ad hoc network (MANET) is the kind of network wherein mobile nodes can link or depart the network when they need. Because of self-arranging nature of the network malicious nodes enter which are capable to trigger different sorts of active and passive attacks. The active attacks are those which diminish network performance regarding certain parameters. In this article, different methods are reviewed and dissected as far as specific parameters.

Keywords— MANETS; security.

I. INTRODUCTION

MANETs are the arrangement of mobile nodes which are mobile in nature and connect with different nodes packets string in the multi-hops in which there is no focal controller. Inside this network, there are enormous quantities of mobile hosts which use wireless connections so as to communicate with one another. The movement of the nodes is irregular in nature toward any path as this is foundation less network where no focal control [1]. Because of this attributes all the nodes right now as the router in which packets are moved by the host. There are a few cases where ideal solutions are provided by the MANET, for example, in wired or wireless foundation in which the issue of harmed and over-burden exists a lot. The other major design issue looked in MANETs is the bandwidth constraint [2]. Consequently, it is needed to design a routing protocol utilizing which the issue of constrained bandwidth can be defeated because of which network overhead can be limited ideally. Another significant issues looked in the wireless sensor network are collision and congestion. The prompt movement of the nodes inside the network drives to cause data and control packets collisions during the time spent transmitting packets in MANET. The issue of hidden terminal and exposed terminal is additionally looked inside it [3]. The packets collision toward the finish of the receiving node is called as hidden terminal issue. This happens because of the transmission of the nodes synchronous towards those which are definitely not in direct transmission scope of the sender however exists in the receiver transmission scope. The routing protocols will help in decreasing the overhead of routing and decrease in bandwidth consumption because of which packets are delivered appropriately on time. It is needed to done the efficient and effective routing in MNAET for which it is

needed to have different routing protocols all through the network [4]. An essential job is played by the intermediate nodes in the MANET networks as just routing of packets from source to destination relies upon it. In this way, for the MANET so far different routing protocols has been created which known for effective, secure and dispersed routing of data packets. Protocols, reactive and hybrid protocols are the three classifications where it is ordered. In case that there is interface disappointment in the MANETs, a various route is in the event that there is connect disappointment in the MANETs, a various route is produced from source to destination so as to proceed with communication process. If there is detachments happen in the route, at that point it stops the transmission of data. Subsequently, it decreases the multi-casting inside the mobile ad hoc network. During the time spent route revelation, there are a few stages that are followed, for example, searching of the node disjoint, link disjoint or non-disjoint routes [5]. In the condition when connect disappointments happen, the data is send to the source code with the goal that it can make further strides utilizing which information transmission rate can be decrease and any alternate path can be find no problem at all. The issue of the congestion is educated to the source by the congestion control mechanisms in which transmission control protocol are implicated. So as to keep up and allocate the network resources, it is needed to assemble all the users in an effective way. In this procedure, all resources for example, queues, relation of bandwidth on the switches or routers are shared. Every one of those packets biding for their transmission turns is queued. On the off chance that there are huge quantities of packets biding for one same connection so as to free than it causes the overflow of the queue [6]. This overflow made the packets be dropped because of which overflow of request prohibit inside the network. The network is deemed as congested in the event of successive dropping of packets inside the network. This congestion inside the network happen the issue of connection disappointment inside the network. There are two kinds of attacks are available in MANET which stop the security of the networks. The passive attacks are the security attacks which don't decrease network performance as far as specific parameters. In the passive attack the malicious nodes can essentially detect the network information. The examples of the passive attack are eves dropping attack, spoofing attack, which drives to active attack in future [7]. The active attack is the second class of security attacks which influence network information as far as specific parameters. In the dynamic active attack malicious nodes are available in the network which can hurt network ordinary operations. The general dynamic attacks are denial of service attack, modification attack and so on. The wormhole attack is the active kind of attack which decreases network performance on the one hand of delay. In the wormhole attack the malicious node gets packets and sends it to

another location through the tunnel which is made in the network [8]. The source node when send the control packets, the malicious node route to tunnel to influence network operations. The wormhole attacks are called the network layer attack. At the point when the network traffic is diverted through the tunnel to expand network delay it is called worm hole.

II. LITERATURE REVIEW

The article [9] suggested the Absolute Deviation (AD) of statistical methodology for the prohibiting of wormhole attack. The detecting of wormhole attack should be possible in extremely less time span because of the use of total deviation covariance and correlation. The suggested algorithm doesn't need any additional conditions for its execution. The wormhole attackers produce a phony tunnel from source to destination. In any case, there is huge quantity of time expended when the original path is followed. Along these lines, the measure of time expended to keep wormhole attacker from entering the network is to be determined significantly here. Through simulations, it is seen that absolute deviation strategy gives better outcomes in comparison with AODV. Further, the Absolute Deviation Correlation Coefficient is used to distinguish the wormholes by estimating the packet drop pattern. In [10], the authors introduced that within the transmission and propagation procedures, the distinguishing proof and disposal of wormhole attack is the significant point of this paper. The security of ad hoc networks is improved by this suggested algorithm. Such sorts of attacks are kept from this network. The packet delivery ratio is expanded and the control overhead is decreased through the improvement of routing protocols in the networks. For distinguishing the wormhole nodes at fast speed, the table entries at destination node are improved here. The new procedure likewise helps in sending of efficient strategies through which the DoS attacks and hybrid attacks can likewise be kept from enter the networks to such an extent that their security is improved.

The article [11] gave a nitty gritty investigation of the wormhole attack happening in MANET. The false shortest path is introduced by wormhole and all the network traffic is pulled in towards it. The throughput of the network is additionally decreased alongside delays in the network because of the existence of wormhole attacks. Further, different methodologies, for example, time-based methodologies, packet leashes and a lot more which help in detecting and forestalling wormhole attacks are explained in this article. A few protocols, for example, AODV, DSR, and OLSR are additionally discussed in this article with their probable attacks. All the wormhole detection methods are compared based on their quality here. Hence, it is seen that for tackling the issue of wormhole assault, enormous quantity of studies have been proposed. The accessibility of just a single solution for all the situations can't be said to be applied. In any case, a more grounded detection strategy can be related to the assistance of the investigation of different strategies introduced in this article. Accordingly, a suitable solution can be proposed to forestall wormhole attack. In [12], the authors introduced a study identified with the wormhole attack that can be distinguished and mitigated with the assistance of proposed security strategy. The

wormhole attack inside MANETs can be productively related to the assistance of this secured Ad hoc on demand distance vector (AODV) mechanism. For the prohibition of this attack, digital signature is used here. The choice whether the provided node is genuine of wormhole node can be made based on determined tunneling time and threshold value. For the mitigation of wormhole node, the digital signature just as hash chain mechanism is applied. In comparison with the existing methodology, the throughput, and lifetime of proposed mechanism are augmented and the network delay is diminished here. The QoS is improved here utilizing proposed approach be that as it may, the as yet concerning issue is the end of undesirable errors. In [13], the authors considered that it is significant for MANET routing protocols to have properties, for example, anonymous, reactive and stateless according to the outcomes accomplished from previous methodologies. A few methodologies applied for wormhole attack are introduced here. Regarding different parameters, for example, throughput, throughput, routing overhead drop, and packet delivery ratio, the proposed methodology that depends on movement or neighbor based methodology gives improved outcomes. More network parameters are evaluated for abrupt improvement in the networks. Different sorts of probable network layer attacks are forestalled to enter the network too, with the utilization of proposed approach. Further, the proposed methodology can be improved in future with the end goal that the node mobility and dynamic regulation of algorithm parameters should be possible. The article [14] introduced the emerging methodology of Mobile Ad-hoc Network in this article that is used broadly in the wireless connections. Mobility, wireless connectivity and autonomy are a few properties on which this methodology is based. The mobility of the nodes and the lack of the power are a few factors in multi-hop Ad-Hoc network that happen the connection fail losses in the network. They proposed another s routing protocol in this article which primacy is provided to the obtainable routes based on their path stability. They used the connection prediction strategy for the illustration which depends on the signal strength. On the AODV routing protocol, they executed the proposed routing idea. Based on the performed tests, it is deduced that performance of the proposed strategy is better when compared with existing algorithm. The issues of throughput, energy consumption, and the routing overhead for various numbers of tests are improved extensively by this strategy. In [15], the authors introduced the significant issue of the connection failure inside the mobile ad hoc network happened because of the nodes mobility. Along these lines, they proposed an Instant Route Migration convention protocol in this article which promptly path is formed in which path distance and hop count are deemed. So as to get the shortest path promptly, they performed partial topology aware technique. With the assistance of this technique where packets to the destination can be facilely rerouted if there should arise an occurrence of connection failure as at each node cache maintenance is available. According to get results, it is deduced that instant route migration, less end to end delay, maximum throughput is provided by the proposed strategy when compared with the existing systems. The article [16] introduced, the issues of trade-off are as yet a significant concern in these methodologies. The significant issues of existing methodologies are introduced in this

article. Further, to offer enough help to complex cryptographic algorithms with the end goal that the security of information transmission can be improved, a novel secure routing protocol is proposed. Few modest entities are added to improve the multicast routing protocols inside the proposed routing method. According to the simulation results it is seen that as far as packet delivery ratio and energy efficiency of proposed method is superior to previously proposed method. Table 1 shows the comparison of literature review those are discussed above.

Table 1. Literature Review Comparison

Reference No. Year Description Outcome

[9] 2018 The detection of wormhole attack can be accomplished in exceptionally less time term because of the use of absolute deviation covariance and correlation. The proposed algorithm doesn't need any additional conditions for its implement. Through simulations, it has been show that absolute deviation method gives better outcomes in comparison with AODV.

[10] 2017 The security of MANET is improved by this proposed algorithm. Such sorts of attacks are prohibited from this network. The new methodology additionally helps in diffusion of effective techniques through which the DoS attacks and hybrid attacks can likewise be prohibited from enter the networks with the end goal that their security is improved.

[11] 2016 Different methodologies, for example, time-based, packet leashes methodologies and a lot more which help in detecting and prohibiting wormhole attacks are explained in this article. A more grounded detection strategy can be related to the assistance of the investigation of different strategies introduced in this article. Along these lines, an appropriate solution can be proposed to prohibit wormhole attack..

[12] 2016 The wormhole attack inside MANETs can be productively related to the help of this made secured Ad hoc on demand distance vector (AODV) method. For the prohibition of this secured Ad hoc on demand distance vector (AODV) , digital signature is used here. The QoS is improved here utilizing proposed methodology nonetheless, the yet concerning issue is the removing of undesirable errors.

[13] 2016 With respect to various parameters Such as packet delivery ratio, throughput, routing overhead drop, the proposed mechanism that is based on movement or neighbor based approach provides enhanced results. Concerning different parameters, for example, throughput, packet delivery ratio, routing overhead drop, the proposed method that depends on movement or neighbor based methodology gives improved outcomes.

[14] 2017 They proposed a novel routing protocol in this article which primacy is provided to the obtainable routes based on their path stability. The issues of routing overhead, throughput, and the energy consumption for various number of tests is improved extensively by this technique.

[15] 2017 So as to re-route the packets rapidly, different techniques has been proposed so far in which hop count is deemed as the parameter however they don't give the ideal outcomes for end to end delay. According to acquired outcomes, it is inferred that greatest throughput, end to end delay, instant route migration is provided by the proposed technique when compared with existing systems.

[16] 2015 They proposed, the issues of trade-off are as yet a significant interest in these methodologies. The significant issues of existing methodologies are introduced in this article. According to the simulation outcomes it is seen that as far as packet delivery ratio and energy efficiency, the performance of proposed procedure is superior to previously proposed procedure.

III. CONCLUSION

Right now, is inferred that MANETs is the decentralized kind of network wherein mobile nodes change its location whenever. Because of such nature of the network different kind of active and passive attacks are conceivable which influence network execution. In this article, procedures which are proposed to disengage malicious nodes are looked into as far as specific parameters.

ACKNOWLEDGMENT The author thanks Mustansiriyah University for its full support of this work. It is one of the Iraqi public universities named after Mustansiriyah School, which was founded in the time of the Abbasidsin Baghdad in 1233 vby the Caliph Al-Mustansir Billah. It was an important scientific and cultural center. Located in the capital Baghdad. Includes 13 faculties. Founded in 1963. www.uomustansiriyah.edu.iq.

REFERENCES

[1] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures", Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002

[2] U. K. Singh, S. S. KailashPhuleria, and D. Goswami, "An analysis of security attacks found in mobile ad-hoc network," International Journal of Scientific & Engineering Research, vol. 5, no. 5, pp. 1586-1592, May 2014.

[3] G. Paliwal, A. P. Mudgal, and S. Taterh, "A study on various attacks of tcp/ip and security challenges in manet layer architecture," in Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Springer, pp. 191-203, 2015.

[4] A. Shastri, R. Dadhich, and R.C. Poonia, "Performance analysis of on-demand Routing protocols for vehicular ad-hoc Networks", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, issue 6, pp.103111, 2011.

[5] G. Sushma and G. Shilpa, "Attacks on mobile ad hoc networks," International Journal of Pure and Applied Research in Engineering and Technology, vol. 2, no. 8, pp. 672-681, 2014.

[6] O. Singh, J. Singh, and R. Singh, "SAODV: statistical ad hoc on-demand distance vector routing protocol for preventing mobile adhoc network against flooding attack," Advances in Computational Sciences and Technology, vol. 10, no. 8, pp. 2457- 2470, 2017.

[7] J. Kaur and G. Singh, "MANET routing protocols: a review," International Journal of Computer Sciences and Engineering (ICSE), vol. 5, no. 3, pp. 60-64, 2017.

[8] S. Tamilarasan, "Securing and Preventing AODV Routing Protocol from Black Hole Attack using Counter Algorithm", International Journal of Engineering Research & Technology, Vol.1, No. 5, pp.23-31, 2012.

[9] Sayan Majumder, Prof. Dr. Debika Bhattacharyya, "Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach", 2018, IEEE.

[10] Roshani Verma, PROF. Roopesh Sharma, Upendra Singh, "New Approach through Detection and Prevention of Wormhole Attack in MANET", International Conference on Electronics, Communication and Aerospace Technology ICECA 2017.

[11] Sunil Kumar Jangir, Naveen Hemrajani, "A Comprehensive Review On Detection Of Wormhole Attack In MANET", 2016, IEEE.

[12] H.Ghayvat, S.Pandya, S.Shah, S.C.Mukhopadhyay, M.H.Yap, K.H.Wandra, "Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET", 2016 Tenth International Conference on Sensing Technology.

[13] Chitra Gupta, Priya Pathak, "Movement Based or Neighbor Based Tehnique For Preventing Wormhole Attack in MANET", 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[14] Pratik Gite, "Link Stability Prediction for Mobile Ad-hoc Network Route Stability", International Conference on Inventive Systems and Control, 2017.

[15] Kavitha T, Muthaiah R, " INSTANT ROUTE MIGRATION DURING LINK FAILURE IN MANETS", International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 2017.

[16] S. B. Geetha, Dr. Venkanangouda C. Patil, "Elimination of Energy and Communication Tradeoff to Resist Wormhole Attack in MANET", International Conference on Emerging Research in Electronics, Computer Science and Technology - 2015.

Muaayed F. AL-Rawi was born in Iraq, 1971. He received B.Sc. degree in electrical and nuclear engineering from Baghdad University, Iraq, in 1992, and M.Sc. degree in communication and electronics engineering from Jordan University of Science and Technology, Jordan, in 1999. He had worked as nuclear and electrical engineer for several years at Iraqi Atomic Energy Organization, Iraq. Currently he is with department of electrical engineering, AL-Mustansiryia University, Iraq. His research interests include computer communication networks, digital communications, analogue and digital electronics, digital signal processing, and biomedical engineering. E-mail, muaayed@uomustansiriyah.edu.iq

i Надоели баннеры? Вы всегда можете отключить рекламу.