SlideShare a Scribd company logo
D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 68–73, 2011.
© CS & IT-CSCP 2011 DOI: 10.5121/csit.2011.1208
ASSURED NEIGHBOR BASED COUNTER PROTOCOL
ON MAC-LAYER PROVIDING SECURITY IN MOBILE
AD HOC NETWORKS
Gulshan Kumar and Mritunjay Rai
Department of Computer Science, Lovely Professional University, Jalandhar, India.
gulshan_acet@yahoo.com,raimritunjay@gmail.com
ABSTRACT
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined
differencing the malicious and non malicious nodes. If the value of the node in trust counter
lacks below the threshold value then the node is considered as malicious. The second part focus
on providing the security in the link layer, the security is provided using CTR (Counter)
approach for authentication and encryption. Hence simulating the results in NS-2, we come to
conclude that the proposed protocol can attain high packet delivery over various intruders
while attaining low delays and overheads.
KEYWORDS
Security, Threshold level, Encryption, MAC-Layer, Attackers .
1. INTRODUCTION
1.1 Mobile Ad hoc Networks
The word Mobile Adhoc Networks (MANET) is derived from two words Mobile means moving
and Ad hoc means structure less. Thus MANET refers to network comprises of nodes(devices)
which are self configured and having no predefined structure thus the nodes in the network can
move free. Addition and deletion of nodes from the network also have no predefined rules.
Because of their self-configuration and self maintenance capabilities MANET is in marvelous
attention.
1.2 Security threats
There are different types of attacks that are recorded in the current mobile adhoc networks but the
most vulnerable attack on 802.11 MAC is DoS. In this form of attack the attacker may corrupt
frames easily by adding some bits or ignoring the ongoing transmission. Whereas among the
connecting nodes the binary exponential scheme can favour the last node which has to capture
effect . In capture effect the nodes are heavily loaded and tries to consume the channel by sending
Computer Science & Information Technology (CS & IT) 69
the data continuously, thus resulting the lightly loaded neighbor to back off endlessly taking the
factor that the malicious node will try to take the advantage of capture effect vulnerability.
Whereas the nodes that tend to make the passive attack with the aim of saving battery for
communication are considered to be selfish. Thus these attacks are classified as fabrication,
Modification, Worm hole and Lack of Co-operation.
2. RELATED WORK
Farooq Anjoom et al. [1] gave the proposed work regarding intrusion detection in Ad hoc
networks. Anand Patwardhan et al. [2] have proposed a routing protocol on AODV providing
security over IPv6.
3. OBJECTIVES AND OVERVIEW OF THE PROPOSED PROTOCOL
3.1 Objectives
The motive behind this paper is to design a trust based security protocol which ensures
confidentiality, Integrity and Authentication of packet in routing layer and link layer. It can also
be beneficial in the application regarding high speed communication. In includes the following
objectives:
• Resistance against the various attacks that include detecting evaluating and correcting the
different sort of attacks
• Reliable against the energy consumption.
• Scalable in contrast to the network size
• Adjustable with amidst nodes along with the other protocol to attain high level security.
• Provides simplicity in terms of extension of network lifetime that uses basic application
of ciphers like the symmetric algorithm and hash functions.
3.2 Overview of the proposed protocol
In our proposed protocol we applied certain changes on existing Ad hoc On-demand Distance
Vector AODV, providing the new structure called Assured Neighbor based Counter Table
(ANCT). It uses dynamical process of calculating the value of nodes in trust counter and adding
the trusted nodes is prior contrasting selecting the shortest path. This protocol basically used mark
and sweep process to restrict the malicious nodes to enter in the network providing the most
secure network.
Let (AC1, AC2,…………….) be the initial counter having assured nodes (N1, N2, ……….) having
the Route R1 from Source S to Destination D. The reliability of neighbor nodes of a particular
node cannot be assured initially, whether they are trusted or not and for stabilizing the route from
source S to destination D, S has to send to Route Request (RREQ) packet. Forward Counter FC is
used by each node to keep track of the number of packets. It has forwarded through route R. Each
time, a node nr receive a packet from node ni, then nr increases the Forward Counter FC of node ni.
If
(Packet Received nr from ni)
Then
(Forward Counter
FCni= FCn+1, where (i=1,2,3…….n) packet ) ------------------------------ (1)
70 Computer Science & Information Technology (CS & IT)
After this process ANCT of node nr is modified with node nr is modified with the value of the
forward counter FCni. In the same way each node determined ANCT and finally packet reach
from source S to determine D. When RREQ packet is received by the destination D, it measures
the number of received packet PR. Once the number of packet received is known, it constructs the
Message Authentication Code (MAC) on PR based on the shared key among S and D.
After this process Rote Reply (RREP) packet is created that contains the id of both source and
destination. Based on this the MAC of PR along with calculated route from the RREQ which will
be digitally signed by the destination in RREP is send back to the source using inverse route
R1while RREP packet is reverting back from Destination D to source S, each intermediate node
computes its Success Ratio (SR).
SRi= FCni/PR ----------------------------------- (2)
The verification process is conducted by the intermediate node by verifying the digital signature
and the MAC i.e. stored in the RREP packet. If the verification fails, the RREP packet is dropped.
Otherwise further signed by the intermediate node and reverted back from destination to source in
a previous manner.
If the verification process of the digital signature by the intermediate node i.e. contain in RREP is
successful, then trusted counter is incremented by one, if not then decremented by one.
If successful
TCi=TCi + 1
If not successful
TCi=TCi - 1,
where 1 is the step value.
Another aspect is for any node nr, if the Success Ratio of r (SRr) is less than the minimum
threshold values, then it trust counter value is decremented.
If
SRr<Smin
Then
TCi =TCi- , where 2 is the step value which is less than .
Now for node nr, if the trust counter value of TCR is less than the trusted threshold value then that
node is marked as malicious. In case if the RREP is not received by the source for a time period t
second, it will be consider as route is terminated or failed. Then again route discovery process is
initiated by the source and same process will be repeated for R2,R3, etc.
1. Dynamic process of calculating the values of nodes in trust counter.
2. Adding trusted node is prior contrasting selecting the shortest path
3. Protocol use mark and sweep to restrict the malicious nodes to entire in the network
which provides more secure network.
Certain changes are made on existing AODV giving a new structure called Assured Neighbors
based Counter Table which maintained for each network node.
Computer Science & Information Technology (CS & IT) 71
Let {Ac1,Ac2…………………….} be the initial counter having assured nodes {n1,n2………} having
the route R from source S to destination D. The reliability of the neighbor nodes of a particular
node n cannot be assured., Initially whether they are trusted or not and for stabilizing the route
from source S to destination D. S has to send the route request (RREQ) packet.
4. PERFORMANCE EVALUATION
4.1 Simulation Model and Parameters
For the purpose of simulation we use NS2. As a MAC layer protocol we use DCF (Distributed
Coordination Function) of IEEE 802.11 for wireless LANs and the channel capacity of mobile
hosts are set to 2 Mbps. While simulating we have a network of 100 nodes on 1000x1000 area
size. Where the radio range is 250m and simulation time is 50 sec taking Constant Bit Rate
(CBR). The Packet Size is 512 bytes. Taking Random Way Point Mobility Model and varying
speed to 10, 20, 30, 40, 50 m/s where Pause time is 5 m/s.
72 Computer Science & Information Technology (CS & IT)
4.2 Performance Metrics
Hardware efficiency: Parallelism can be achieved by counter mode by applying this mode on
multiple blocks of plaintext or cipher text.
Software efficiency: Processors that involves the features like aggressive pipelining, multiple
instruction dispatch per clock cycle, number of registers and SIMD instructions can be efficiently
utilized.
Preprocessing: We can see from the diagram above that the execution of the involved encryption
algorithm is independent of the plaintext or cipher text. So as a preprocessing task, we can
generate the output of the encryption units if proper memory and security is imposed. Next, when
we shall get the plaintext or cipher text, the only thing is to be done is to calculate the XOR
functions. This can enhance the efficiency of the counter mode and increase the throughput.
Random access: When we need to decrypt a particular block of message we need for random
access. As, in this mode message blocks are independent of the processing of its previous block,
random access can be easily achieved.
Provable security: As encryption is used, it must be a secure mode.
Simplicity: Here only encryption algorithm is applied and no decryption algorithm is in the view.
Even, Decryption key scheduling need to be applied here.
5. RESULTS
Following is the result we evaluate on the basis of Attackers Vs Delivery ratio where our
proposed protocol Assured Neighbor based Counter ( ANCT ) gives the best result compared to
TMLS, LLSP and RSRP.
6. CONCLUSION
In our paper, we have designed Assured Neighbor based Counter Protocol which gives
confidentiality, authentication and data integrity using a parallel approach of routing packets on
MAC Layer in MANETs. The protocol is divided into two phases where the first phase assures
the isolation and detection of malicious nodes based on routing layer information. A certain
Computer Science & Information Technology (CS & IT) 73
threshold level is defined with a certain value. The trust counter for each node maintains the trust
value based on which the counter value increases or decreases depending on the threshold value
which decides whether the node is malicious or not. In the second phase we provide the security
on the Link layer using COUNTER mode to provide authentication, integrity and encryption. By
simulating our protocol we can conclude that our protocol attains high packet delivery ratio
corresponding to various attackers.
REFERENCES
[1] Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar “Signature based Intrusion Detection for
Wireless Ad-Hoc Networks: A Comparative study of various routing protocols” in proceedings of
IEEE 58th Conference on Vehicular Technology, 2003.
[2] Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga and Tom Karygiannis “Secure Routing
and Intrusion Detection in Ad Hoc Networks” Third IEEE International Conference on Pervasive
Computing and Communications, March 2005.
[3] S. Bouam and J. B. Othman, “Data Security in Ad Hoc Networks Using MultiPath Routing.” Beijing,
China: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC’03), September 2003.
[4] W. Lou, W. Liu, and Y. Fang, “SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc
Networks.” Hong Kong, China: IEEE Conference on Computer Communications (INFOCOM’04),
March 2004.
[5] Panagiotis Papadimitratos, and Zygmunt J. Haas, “Secure Data Communication in Mobile Ad Hoc
Networks”, IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, February 2006.
[6] Ernesto Jiménez Caballero, “Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc
Networks - The routing problem”, 2006.
[7] Yanchao Zhang, Wenjing Lou, Wei Liu, and Yuguang Fang, “A secure incentive protocol for mobile
ad hoc networks”, Wireless Networks (WINET), vol 13, No. 5, October 2007.
[8] Liu, Kejun Deng, Jing Varshney, Pramod K. Balakrishnan and Kashyap “An Acknowledgment-based
Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transactions on Mobile
Computing, May 2007.
Authors
Gulshan Kumar pursuing his M. Tech degree in Computer Science and Engineering
from Lovely Professional University, Jalandhar, India. His research interest includes
Cryptography and Mobile Adhoc Networks.
Mritunjay Kumar Rai received his Ph.D. Degree from from ABV-Indian Institute of
Information Technology and Management, Gwalior, India. His research interest area is
Mobile Adhoc Networks and Wireless Sensor Networks.

More Related Content

What's hot (20)

PDF
A new ids scheme against blackhole attack to enhance security in wireless net...
eSAT Journals
 
PDF
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
IJMER
 
PDF
A survey on trust based secure routing in manet
csandit
 
PDF
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
IJMTST Journal
 
PDF
C241721
irjes
 
PDF
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
IJNSA Journal
 
PDF
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
 
PDF
Safe Trust Alert Routing in MANET
Computer Science Journals
 
PDF
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
IJNSA Journal
 
PDF
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
ijsrd.com
 
PDF
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
 
PDF
Effective Path Identification Protocol for Wireless Mesh Networks
IDES Editor
 
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
PDF
A Novel Multipoint Relay based Secure Routing in MANET
IJNSA Journal
 
PDF
Secure and Efficient Transmission Using Jammer and Relay Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
Packet hiding methods for preventing selective jamming attacks
eSAT Publishing House
 
PDF
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
idescitation
 
PDF
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 
PDF
Administrator&trust based routing protocol
Ninad Samel
 
A new ids scheme against blackhole attack to enhance security in wireless net...
eSAT Journals
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
IJMER
 
A survey on trust based secure routing in manet
csandit
 
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
IJMTST Journal
 
C241721
irjes
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
IJNSA Journal
 
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
 
Safe Trust Alert Routing in MANET
Computer Science Journals
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
IJNSA Journal
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
ijsrd.com
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
 
Effective Path Identification Protocol for Wireless Mesh Networks
IDES Editor
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
A Novel Multipoint Relay based Secure Routing in MANET
IJNSA Journal
 
Secure and Efficient Transmission Using Jammer and Relay Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Packet hiding methods for preventing selective jamming attacks
eSAT Publishing House
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
idescitation
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 
Administrator&trust based routing protocol
Ninad Samel
 

Similar to ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MOBILE AD HOC NETWORKS (20)

PDF
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
cscpconf
 
PDF
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
drsrinivasanvenkataramani
 
PDF
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
PDF
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
PDF
A Trust Conscious Secure Route Data Communication in MANETS
CSCJournals
 
PDF
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
PDF
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
PDF
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
PDF
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
 
PDF
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
 
PDF
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
PDF
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
IRJET Journal
 
PDF
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
paperpublications3
 
PDF
Placate packet dropping attack using secure routing protocol and incentive ba...
eSAT Publishing House
 
PDF
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET Journal
 
PDF
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
cscpconf
 
PDF
Jf3416691674
IJERA Editor
 
PDF
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
 
PDF
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
PDF
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
 
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
cscpconf
 
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
drsrinivasanvenkataramani
 
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
A Trust Conscious Secure Route Data Communication in MANETS
CSCJournals
 
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
 
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
IRJET Journal
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
paperpublications3
 
Placate packet dropping attack using secure routing protocol and incentive ba...
eSAT Publishing House
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET Journal
 
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
cscpconf
 
Jf3416691674
IJERA Editor
 
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
 
Ad

More from cscpconf (20)

PDF
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
cscpconf
 
PDF
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
cscpconf
 
PDF
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 
PDF
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
cscpconf
 
PDF
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
cscpconf
 
PDF
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
cscpconf
 
PDF
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
cscpconf
 
PDF
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
cscpconf
 
PDF
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
PDF
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
 
PDF
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
cscpconf
 
PDF
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
cscpconf
 
PDF
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
PDF
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
cscpconf
 
PDF
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
cscpconf
 
PDF
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
cscpconf
 
PDF
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
cscpconf
 
PDF
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
cscpconf
 
PDF
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
cscpconf
 
PDF
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
cscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
cscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
cscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
cscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
cscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
cscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
cscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
cscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
cscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 
Ad

Recently uploaded (20)

PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
community health nursing question paper 2.pdf
Prince kumar
 
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 

ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MOBILE AD HOC NETWORKS

  • 1. D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 68–73, 2011. © CS & IT-CSCP 2011 DOI: 10.5121/csit.2011.1208 ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MOBILE AD HOC NETWORKS Gulshan Kumar and Mritunjay Rai Department of Computer Science, Lovely Professional University, Jalandhar, India. [email protected],[email protected] ABSTRACT In this paper, we have taken out the concern of security on a Medium Access Control layer implementing Assured Neighbor based Security Protocol to provide the authentication, confidentiality and taking in consideration High speed transmission by providing security in parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically divide the protocol into two different segments as the first portion concentrates, based on Routing layer information; we implement the scheme for the detection and isolation of the malicious nodes. The trust counter for each node is maintained which actively increased and decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads. KEYWORDS Security, Threshold level, Encryption, MAC-Layer, Attackers . 1. INTRODUCTION 1.1 Mobile Ad hoc Networks The word Mobile Adhoc Networks (MANET) is derived from two words Mobile means moving and Ad hoc means structure less. Thus MANET refers to network comprises of nodes(devices) which are self configured and having no predefined structure thus the nodes in the network can move free. Addition and deletion of nodes from the network also have no predefined rules. Because of their self-configuration and self maintenance capabilities MANET is in marvelous attention. 1.2 Security threats There are different types of attacks that are recorded in the current mobile adhoc networks but the most vulnerable attack on 802.11 MAC is DoS. In this form of attack the attacker may corrupt frames easily by adding some bits or ignoring the ongoing transmission. Whereas among the connecting nodes the binary exponential scheme can favour the last node which has to capture effect . In capture effect the nodes are heavily loaded and tries to consume the channel by sending
  • 2. Computer Science & Information Technology (CS & IT) 69 the data continuously, thus resulting the lightly loaded neighbor to back off endlessly taking the factor that the malicious node will try to take the advantage of capture effect vulnerability. Whereas the nodes that tend to make the passive attack with the aim of saving battery for communication are considered to be selfish. Thus these attacks are classified as fabrication, Modification, Worm hole and Lack of Co-operation. 2. RELATED WORK Farooq Anjoom et al. [1] gave the proposed work regarding intrusion detection in Ad hoc networks. Anand Patwardhan et al. [2] have proposed a routing protocol on AODV providing security over IPv6. 3. OBJECTIVES AND OVERVIEW OF THE PROPOSED PROTOCOL 3.1 Objectives The motive behind this paper is to design a trust based security protocol which ensures confidentiality, Integrity and Authentication of packet in routing layer and link layer. It can also be beneficial in the application regarding high speed communication. In includes the following objectives: • Resistance against the various attacks that include detecting evaluating and correcting the different sort of attacks • Reliable against the energy consumption. • Scalable in contrast to the network size • Adjustable with amidst nodes along with the other protocol to attain high level security. • Provides simplicity in terms of extension of network lifetime that uses basic application of ciphers like the symmetric algorithm and hash functions. 3.2 Overview of the proposed protocol In our proposed protocol we applied certain changes on existing Ad hoc On-demand Distance Vector AODV, providing the new structure called Assured Neighbor based Counter Table (ANCT). It uses dynamical process of calculating the value of nodes in trust counter and adding the trusted nodes is prior contrasting selecting the shortest path. This protocol basically used mark and sweep process to restrict the malicious nodes to enter in the network providing the most secure network. Let (AC1, AC2,…………….) be the initial counter having assured nodes (N1, N2, ……….) having the Route R1 from Source S to Destination D. The reliability of neighbor nodes of a particular node cannot be assured initially, whether they are trusted or not and for stabilizing the route from source S to destination D, S has to send to Route Request (RREQ) packet. Forward Counter FC is used by each node to keep track of the number of packets. It has forwarded through route R. Each time, a node nr receive a packet from node ni, then nr increases the Forward Counter FC of node ni. If (Packet Received nr from ni) Then (Forward Counter FCni= FCn+1, where (i=1,2,3…….n) packet ) ------------------------------ (1)
  • 3. 70 Computer Science & Information Technology (CS & IT) After this process ANCT of node nr is modified with node nr is modified with the value of the forward counter FCni. In the same way each node determined ANCT and finally packet reach from source S to determine D. When RREQ packet is received by the destination D, it measures the number of received packet PR. Once the number of packet received is known, it constructs the Message Authentication Code (MAC) on PR based on the shared key among S and D. After this process Rote Reply (RREP) packet is created that contains the id of both source and destination. Based on this the MAC of PR along with calculated route from the RREQ which will be digitally signed by the destination in RREP is send back to the source using inverse route R1while RREP packet is reverting back from Destination D to source S, each intermediate node computes its Success Ratio (SR). SRi= FCni/PR ----------------------------------- (2) The verification process is conducted by the intermediate node by verifying the digital signature and the MAC i.e. stored in the RREP packet. If the verification fails, the RREP packet is dropped. Otherwise further signed by the intermediate node and reverted back from destination to source in a previous manner. If the verification process of the digital signature by the intermediate node i.e. contain in RREP is successful, then trusted counter is incremented by one, if not then decremented by one. If successful TCi=TCi + 1 If not successful TCi=TCi - 1, where 1 is the step value. Another aspect is for any node nr, if the Success Ratio of r (SRr) is less than the minimum threshold values, then it trust counter value is decremented. If SRr<Smin Then TCi =TCi- , where 2 is the step value which is less than . Now for node nr, if the trust counter value of TCR is less than the trusted threshold value then that node is marked as malicious. In case if the RREP is not received by the source for a time period t second, it will be consider as route is terminated or failed. Then again route discovery process is initiated by the source and same process will be repeated for R2,R3, etc. 1. Dynamic process of calculating the values of nodes in trust counter. 2. Adding trusted node is prior contrasting selecting the shortest path 3. Protocol use mark and sweep to restrict the malicious nodes to entire in the network which provides more secure network. Certain changes are made on existing AODV giving a new structure called Assured Neighbors based Counter Table which maintained for each network node.
  • 4. Computer Science & Information Technology (CS & IT) 71 Let {Ac1,Ac2…………………….} be the initial counter having assured nodes {n1,n2………} having the route R from source S to destination D. The reliability of the neighbor nodes of a particular node n cannot be assured., Initially whether they are trusted or not and for stabilizing the route from source S to destination D. S has to send the route request (RREQ) packet. 4. PERFORMANCE EVALUATION 4.1 Simulation Model and Parameters For the purpose of simulation we use NS2. As a MAC layer protocol we use DCF (Distributed Coordination Function) of IEEE 802.11 for wireless LANs and the channel capacity of mobile hosts are set to 2 Mbps. While simulating we have a network of 100 nodes on 1000x1000 area size. Where the radio range is 250m and simulation time is 50 sec taking Constant Bit Rate (CBR). The Packet Size is 512 bytes. Taking Random Way Point Mobility Model and varying speed to 10, 20, 30, 40, 50 m/s where Pause time is 5 m/s.
  • 5. 72 Computer Science & Information Technology (CS & IT) 4.2 Performance Metrics Hardware efficiency: Parallelism can be achieved by counter mode by applying this mode on multiple blocks of plaintext or cipher text. Software efficiency: Processors that involves the features like aggressive pipelining, multiple instruction dispatch per clock cycle, number of registers and SIMD instructions can be efficiently utilized. Preprocessing: We can see from the diagram above that the execution of the involved encryption algorithm is independent of the plaintext or cipher text. So as a preprocessing task, we can generate the output of the encryption units if proper memory and security is imposed. Next, when we shall get the plaintext or cipher text, the only thing is to be done is to calculate the XOR functions. This can enhance the efficiency of the counter mode and increase the throughput. Random access: When we need to decrypt a particular block of message we need for random access. As, in this mode message blocks are independent of the processing of its previous block, random access can be easily achieved. Provable security: As encryption is used, it must be a secure mode. Simplicity: Here only encryption algorithm is applied and no decryption algorithm is in the view. Even, Decryption key scheduling need to be applied here. 5. RESULTS Following is the result we evaluate on the basis of Attackers Vs Delivery ratio where our proposed protocol Assured Neighbor based Counter ( ANCT ) gives the best result compared to TMLS, LLSP and RSRP. 6. CONCLUSION In our paper, we have designed Assured Neighbor based Counter Protocol which gives confidentiality, authentication and data integrity using a parallel approach of routing packets on MAC Layer in MANETs. The protocol is divided into two phases where the first phase assures the isolation and detection of malicious nodes based on routing layer information. A certain
  • 6. Computer Science & Information Technology (CS & IT) 73 threshold level is defined with a certain value. The trust counter for each node maintains the trust value based on which the counter value increases or decreases depending on the threshold value which decides whether the node is malicious or not. In the second phase we provide the security on the Link layer using COUNTER mode to provide authentication, integrity and encryption. By simulating our protocol we can conclude that our protocol attains high packet delivery ratio corresponding to various attackers. REFERENCES [1] Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar “Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols” in proceedings of IEEE 58th Conference on Vehicular Technology, 2003. [2] Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga and Tom Karygiannis “Secure Routing and Intrusion Detection in Ad Hoc Networks” Third IEEE International Conference on Pervasive Computing and Communications, March 2005. [3] S. Bouam and J. B. Othman, “Data Security in Ad Hoc Networks Using MultiPath Routing.” Beijing, China: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’03), September 2003. [4] W. Lou, W. Liu, and Y. Fang, “SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks.” Hong Kong, China: IEEE Conference on Computer Communications (INFOCOM’04), March 2004. [5] Panagiotis Papadimitratos, and Zygmunt J. Haas, “Secure Data Communication in Mobile Ad Hoc Networks”, IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, February 2006. [6] Ernesto Jiménez Caballero, “Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem”, 2006. [7] Yanchao Zhang, Wenjing Lou, Wei Liu, and Yuguang Fang, “A secure incentive protocol for mobile ad hoc networks”, Wireless Networks (WINET), vol 13, No. 5, October 2007. [8] Liu, Kejun Deng, Jing Varshney, Pramod K. Balakrishnan and Kashyap “An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transactions on Mobile Computing, May 2007. Authors Gulshan Kumar pursuing his M. Tech degree in Computer Science and Engineering from Lovely Professional University, Jalandhar, India. His research interest includes Cryptography and Mobile Adhoc Networks. Mritunjay Kumar Rai received his Ph.D. Degree from from ABV-Indian Institute of Information Technology and Management, Gwalior, India. His research interest area is Mobile Adhoc Networks and Wireless Sensor Networks.