SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop
Wireless Network using QOS-Aware Distributed Architecture
Miss. Shraddha V. Pawar1 , Prof. Sachin P. Patil2
1Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
2Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - The WiMAX and LTE are two wireless radio data
transmission technologies based on IEEE 802.16 designed to
ensure broadband wireless access. This paper considers the
problem of detecting rogue node in WiMAX networks. A rogue
node is an attacker node that duplicates a legitimate node. It
may lead to disturbance in service. In this paper we have
proposed an efficient technique forsecure datatransmissionto
ensure the security and integrity of the data packet in the
WiMAX network. We have used an ECDH algorithm for
ensuring secure data transmission.
Key Words: Rogue Node, Distributed Security, Elliptic
Curve Diffie Hellman Algorithm(ECDH), Worldwide
Interoperable for Microwave Access(WiMAX).
1. INTRODUCTION
Vehicular communications have received a great
deal of attention in recent years due to the demand for
multimedia applications during travel andforimprovements
in safety. Safety applications often require fast message
exchanges but do not use much bandwidth. On the other
hand, multimedia services require high bandwidth for
vehicular users.Hence,toprovidemobilebroadbandservices
at a vehicular speed of up to 350 km/h. Worldwide
interoperable for Microwave Access (WiMAX) and Long-
Term Evolution (LTE) are considered the best technologies
for vehicular networks. WiMAX and LTE are Fourth-
Generation (4G) wirelesstechnologiesthathavewell-defined
quality of service (QoS) and security architectures.
WiMAX and LTE resemble each other in some key
aspects, including operating frequency spectrum, high
capacity, mobility, strong QoS mechanisms, and strong
security with a similar key hierarchy from the core network
to the access network. However WiMAX and LTE also differ
from each other in certain aspects, as they haveevolvedfrom
different origins. LTE has evolved from 3rd Generation
Partnership Projects (3GPP): thus, the LTE network has to
support the existing 3G users' connectivity, but there is no
such constraint for WiMAX. Particularly, on the security
aspect, the WiMAX authentication process uses Extensive
Authentication Protocol Tunneled. Maintaining QoS
requirements of a specific application has become a
significant topic and priority is to maximize the QoS
experienced by the user. QoS is the ability of a network to
provide premier service to some fraction of total network
traffic over specific underlying technologies. QoSmetricsare
delay, jitter (delay variation), serviceavailability,bandwidth,
throughput, packet loss rate. Metrics are used to indicate
performance of particular scheme employed. QoS can be
achieved by resource reservation (Integrated services),
prioritization (differentiated services).
2. EASE OF USE
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that
supports QoS-aware and safe multimedia services for
vehicular networks is mandatory for service providers. The
main cause for the MAC layer security threatsin4Gvehicular
networks is due to certain unprotected MAC management
messages between Mobilestation(MS)andBaseStation(BS).
When the control messages are in plain text, the
attackers/intruders can easily spoof, modify,andreplythose
control messages for the intended receiver node. The
severity of the security threats may vary based on the
modification of those control messages. Similarly, the
attackers may send the continuous false packets
unnecessarily to the receiving node for the water torture
attacks. Many research efforts have been published on MAC
layer security threats in both WiMAX and LTE networks and
a few of them discussed the implementationofIPSecsecurity
for WiMAX networks.
In multihop WiMAX, once the user is registeredwith
the home network the security layer may use three levels of
protections for the MAC management messages, i.e., No
protection, CMAC, and Encrypted by AES-CCM. As a
consequence of adding the encryption support for MAC
messages, some of the security threats discussed no longer
exist for multihop WiMAX. However, one of the security
threats such as rogue RN attack is exists that adds a rouge
node/Fake node in network and creates big threaten to the
4G multihop wireless networks. Such attack causes network
QoS gets degraded. So there is a need for strong security
mechanisms and strict authentication methods to overcome
the existing security threats in 4G multihop. But enhancing
security should not degrade network QoS.
Hence we proposed Elliptic Curve Diffie-Hellman
(ECDH) protocol that has proven security strength and low
overhead for 4G wireless networks. ECDH is competitor to
RSA public key algorithm and has very good security. ECDH
consumes less power and suitable for 4G wireless networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314
3. LITERATURE SERVEY
In [1] authors Proposed QoS aware distributed security
architecture based on the Elliptic Curve Diffie-Hellman
(ECDH) protocol. Worldwide Interoperability for Mobile
Access (WiMAX) and Long Term Evolution (LTE) are 4G
wireless technologies which have better Quality of Service
(QoS) and security architectures. Security threats likeDenial
of Service (DoS), Water Torture Attack, rouge RN attack, etc
in WiMAX and LTE are present issues. So there is a need for
strong security mechanisms and strict authentication
methods to overcome the existing security threats in 4G
multihop wireless networks. But enhancing security should
not degrade network QoS.
In [2] authors have researched that there in the VANET
communication, especially in Multihop networks the
forwarder node authentication is more important. So, we
need to provide authentication for each and every hops. Hop
by Hop message authentication is required to provide high
level security in VANET. Simultaneously, the address of the
data origin known by the attacker leads to node capture
attack.
In [3] authors have researched on measuring the QoS
performance for node protection in 4G wireless networks
using network coding. Exclusive OR (XOR) network codingis
used to explain the node protection for multihop 4G wireless
networks. It is followed by measurement of the QoS
performance, such as packet delivery ratio (PDR), latency
and jitter, for different scenarios. Failure of a single and two
relay node with and without proposed protection scheme is
tested along with user's mobility.
In [4] authors proposed Network Protection Codes (NPC)
using network coding to protecttheoperationofthe network
against link and node failures. Their interest was to find the
limits of their NPC and where to deploy their NPC using
several network graphs with a minimum number of edges.
The authors also considered the problem of providing
protection against a single node failureusingnetwork coding
and reduced capacity technique for wired networks.
In [6] authors proposed, cross layer QoS architecture for 4G
heterogeneous network services. QoS engine and cross layer
algorithms are the main components. QoS engine is
composed of QoS daemon, QoS agent and control module.
Cross Layer Architecture monitors and adjusts resources
periodically. In the absence of CLA, average latency and
average packet loss are reduced by 2% and 8.5%
respectively. But throughput achievedisslightlylowerinCLA
than traditional layered approach.
In these existing research efforts, the authors
implemented the relaynodeprotectionusingnetwork coding
for different networks such as wired networks, Wireless
Sensor Networks (WSNs)andoptical networks.However,the
QoS performance of network coding for relay node
protection in a multihop wireless network is not tested until
now. Also, the relay node protection is very useful for
multihop 4G wireless networks.
4. SYSTEM ARCHITECTURE
Figure 1 shows System architecture for proposed
system. After generating WiMAX Multihop network and
implementing ECDH on it, we generateattack byaddingnode
in existing network. Then ECDH detects the rouge node by
using hop-by-hop authentication after completing intial
ranging process. By using distributed security architecture
we prevent the node which is detected as rouge node and
forward massage to next node. This process repeats until
destination node found.
Fig – 1: System Architecture
5. METHODOLOGY
There are four Modules in system:
5.1. Generation of 4G Multihop Network and ECDH
implementation on it.
5.2. Attack Detection
5.3. Attack Prevention
5.4. Performance Evolution
5.1 Generation of 4G Multi Hop WiMAX Network and
ECDH implementation-
In this module, we are implementing initial
configuration and setup of 4G Multihop WiMAX network in
NS 2or NS 3 Network simulator tool. We are adding base
station node, mobile station node and relay node. It creates
multihop network. Having one base station and multiple
ECDH
Detect node by
Distributed Sec.
Prevent Attacker
node
Send Packets to the
Destination
Secured Initial
Ranging Process
Generate WiMAX
Network
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315
mobile stations,relaynodes.Hereweareimplementinginitial
ranging process of ECDH. Which is shown in figure 2.After
downlink channel synchronization (DL Sync),the MS will
send ranging request (RNG_REQ)message. In turn,BS will
responds with RNG_RES message.ThentheSubsequentsteps
are following.
 EAP Based Authentication-
The authenticator intheAccessNetwork Gateway(ASN-GW)
sends an EAP Identity request to the MS, and the MS will
respond to the request by sending PKM-REQ (PKMv2 EAP-
Transfer) message. A PKM-REQ message contains thedetails
of SIM or X.509 certificate. Then the ASN-GW forwards the
PKM-REQ to the AAA server over radius protocol. The AAA
server authenticates the device and provides the Master
Session Key (MSK) in an EAP-TTLS protocol. Then, it
forwards MSK to the authenticator. The authenticator
generates Authorization Keys (AK) from the MSK and
forwards to the BS. At the same time, the MS also generates
the same AK from the MSK. Now, the BS and MS can mutually
authenticate each other using AK.
 Authorization and Security Association-
Once the device or the user is authenticated by the network,
the BS has to authorize the user by its unique Security
Association Identity (SAID) using SA-Transport Encryption
Key (SA-TEK) challenge messages, as depicted in the second
block in Figure 2.
 Traffic EncryptionandMACMessageEncryption-
Fig – 2 : Initial Ranging Process for WiMAX
The MS establishes an SA for each service flow where the
BS provides both uplink and downlink TEK to encrypt the
data. Initially TEK is generated from the EAP-based
authentication and then refreshed by BS periodically.
5.2 Attack Detection-
As author Ebrahim Halil Saruthan has proposed
system to detect and prevent rouge node in real time
wireless network [9] it shows real example of rouge node
in network. Different architectures like Access Point (AP)
architecture, client architecture etc. are used to Detectand
Prevent rouge node. So, we are generating attack in
network using simulator.
Network having attack, adds new rouge/fake node to
existing one to receive data and hand over to some other
nodes, creates traffic jam or to spoof or modify data etc.
Now we have to detect the rouge node with the
help of ECDH. First step is secured initial ranging process
for 1st hop to nth hop node is shown in figure 3.In initial
ASN
GW
AAA
MS BS
EAP Based Authentication
Authorization and Security Association (SA)
Traffic encryption and MAC Message Encryption
Master Session Key Establishment
Ranging Request
Ranging Response
MS context
initialization
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316
ranging process as shown in figure. 2 any WiMAX node
(MS/RS) wants to establish connection with BS generates
the public and private key pairs and sends public key to BS
initial ranging codealongwithRNG_REQmessage.Whichis
encrypted using BS public key.BS responds with RNG_RSP
message which is encrypted using BS public key.
Fig - 3 : Distributed Security using ECDH
BS responds with RNG_RSP message which is
encrypted with the MS/RS Public key. Hence MS/RS
establish secure tunnel with BS and subsequent MAC
messages encrypted using ECDH public key. In secure
initial ranging process the only additional bandwidth
overhead is the exchange of global parameters and public
keys. Now next step is distributed security using ECDH in
multihop WiMAX network. To establish hop to hop
authentication and to reduce computational overhead of
centralized node distributed architecture is necessary. In
which new node is actually identified in WiMAX network.
Figure 3 shows SA and key management in proposed
security architecture.
5.3 Attack Prevention-
This module shows how ECDH helps to prevent RN Attack
using key exchange.NeighborauthenticationandSAisnext
step. If the new RS is connected with network, the BS will
inform to the updated member list to the existing RSs
group in Downlink Channel Descriptor (DCD) message.
Now if new RS will find another RS during channel
scanning it verifies new RS is genuine or not verifying
RS_ID. Then it sends public key and RS_ID to the neighbor
RS to establish SA. The neighbor RS will also send the
public key in response. At the end of association, RS’s
generate uplink
BS
MS1
RS2
RS1
RS3 MS4MS3MS2
MS5
WiMAX Air i/f withECDH
key agreement
Tunnel i/f for ECDH key
agreement
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317
1
1
1
2
3 4
Fig - 4 : Neighbor Authentication Process using ECDH
and downlink CMAC digital signaturesamongthem.Figure
4 shows neighbor authentication process.instep1,theRS3
receives updated list after ECDH agreement with BS.
During scanning process, RS3 may find the DCD and other
downlink parameters of RS2 as shown in step 2.Since RS3
knows that RS2 is a legitimate node based on list received
from BS, it establishes theECDHagreement.AfterthatBoth
share their digital signatures as shown in step3andstep4.
5.3 Performance Evaluation-
This module calculates QoS performance andshows
that how it maintains its stability after applying ECDH using
NS 2 or 3 supporting tools such as X-Graph. We can consider
parameters for calculating performance like latency, service
availability, jitter, Packet loss rate, throughput performance.
6. CONCLUSION
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that
supports QoS-aware and safe multimedia services for
vehicular networks is mandatory for service providers. To
provide high bandwidth support at the vehicular speedof up
to 350 km/h, the WiMAX and LTEnetworksarethepreferred
candidates. 4G networks have well-defined QoS and security
architectures. However, some major security threats suchas
DoS attack still exist in 4G multihop networks, because
certain MAC messages are transmitted only in plain text. For
this reason, we have proposed a distributed security
architecture using the ECDH algorithm in Layer 2 for 4G
multihop wireless networks. In the proposed scheme, the
wireless nodes are initially authenticated by the home
network and then authorized by the access node.Inaddition,
the proposed scheme requires only a slightly higher
bandwidth and computational overhead than the default
standard scheme.
REFERENCES
[1] Perumalraja Rengaraju, Chung-Horng Lung, Member,
IEEE, and Anand Srinivasan “QoS-Aware Distributed
Security Architecture for 4G Multihop Wireless
Networks” IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 63, NO. 6, JULY 2014.
[2] Vinoth V. and C. Monica Manoreya “A SAMA Scheme For
Improving Qos in 4G Multihop Wireless Networks”
Department of Information Technology, Sathyabama
University, Chennai, India,VOL 10,no-7,2015.
[3] Perumalraja Rengaraju, Chung-Horng Lung, Anand
Srinivasan, ”QoS and protection of relay nodes in 4G
wireless networks using network coding”, 9th
International Conference on Wireless Communications
and Mobile Computing (IWCMC), Sardinia ,pp. 282 - 287
,July 2013
[4] S. Aly and A.Kamal, “ Networking Coding-Based
Protection Strategies Against Node Failures” Proc. of
IEEE ICC.,2009.pp.1-5.
[5] S. Aly, A.Kamal and A.Walid, “Network Design and
Protection using Network coding” Proc. of IEEE Theory
Information Workshop.2010, pp.1-5.
[6] Jiann-Liang Chen, Ming-Chiao Chen, Shih-Wei Liu, Jyun-
Yu Jhuo, “Cross-layer QoS architecture for 4G
heterogeneous network services”, 11th Int.Conf.
BS
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318
Advanced Communication Technology (ICACT
2009),Phoenix Park, pp.73-77,Jan 2009.
[7] A. Rammoorthy,and S. Li.”Protection against Link Errors
and Failures using Network Coding in Overlay
Networks”,Proc. Of IEEE International Symposium on
Information Theory, July 2009,pp.986-990.
[8] A. Kamal,”1+N Network Protection for Mesh
Networks:Network Coding-Based Protection using p-
Cycles” ,IEEE/ACM Transactions on Networking, Feb
2010,pp.67-80.
[9] Ibrahim Halil Saruthan,”Detecting and Preventing rouge
devices on network”SANS institutes 2007.

More Related Content

What's hot (19)

PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
journalBEEI
 
PDF
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
PPTX
Module 6 Wireless Network security
nikshaikh786
 
PPTX
Eaack—a secure intrusion detection.ppt
slksagar
 
PDF
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
 
PDF
A New Trust Model for 5G Networks
Paul Bradley
 
PDF
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET Journal
 
PPT
Blug Talk
guestb9d7f98
 
PDF
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
PDF
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
VLSICS Design
 
PDF
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
 
PDF
11.providing security to wireless packet networks by using optimized security...
Alexander Decker
 
PDF
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
 
PDF
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
PDF
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
 
PDF
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
PDF
Research review of iot
Abdullah Aziz
 
PDF
Security-aware fair transmission scheme for 802.11 based cognitive IoT
IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
journalBEEI
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
Module 6 Wireless Network security
nikshaikh786
 
Eaack—a secure intrusion detection.ppt
slksagar
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
 
A New Trust Model for 5G Networks
Paul Bradley
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET Journal
 
Blug Talk
guestb9d7f98
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
VLSICS Design
 
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
 
11.providing security to wireless packet networks by using optimized security...
Alexander Decker
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
Research review of iot
Abdullah Aziz
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
IJECEIAES
 

Similar to A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture (20)

PDF
7215nsa05
Shivanand Manjaragi
 
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
PDF
Comprehensive survey of possible
IJNSA Journal
 
PPT
4g security presentation
Kyle Ly
 
PDF
A Brief Review on Wireless Networks
IRJET Journal
 
DOCX
A secure and service oriented
Jayanta Khumanthem
 
DOCX
Bhanuprakash123
lakshmi bhanu prakash reddy
 
PDF
Congestion Control Technique with Safety Transmission of Messages in Vehicula...
IRJET Journal
 
PDF
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)
IJERA Editor
 
PDF
IRJET- Improve Rerouting Scheme to Multilink Failure using Interface Specific...
IRJET Journal
 
PDF
A Review on security issues in WiMAX
Editor IJMTER
 
PDF
A countermeasure for flooding
ijcsa
 
PDF
Wireless Network Security 1st Edition Yang Xiao Xuemin Shen Dingzhu Du
sunemcrippa
 
PPTX
Secure routing for wireless NANs
Reza Sadeghi
 
PDF
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
IRJET Journal
 
PDF
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
PPTX
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Shantanu Sharma
 
PDF
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
IJCSIS Research Publications
 
PDF
Review of authentication techniques for wireless networks & manet
eSAT Journals
 
PDF
Zigbee sensor network integrated with 4 g for iot
eSAT Publishing House
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
Comprehensive survey of possible
IJNSA Journal
 
4g security presentation
Kyle Ly
 
A Brief Review on Wireless Networks
IRJET Journal
 
A secure and service oriented
Jayanta Khumanthem
 
Congestion Control Technique with Safety Transmission of Messages in Vehicula...
IRJET Journal
 
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)
IJERA Editor
 
IRJET- Improve Rerouting Scheme to Multilink Failure using Interface Specific...
IRJET Journal
 
A Review on security issues in WiMAX
Editor IJMTER
 
A countermeasure for flooding
ijcsa
 
Wireless Network Security 1st Edition Yang Xiao Xuemin Shen Dingzhu Du
sunemcrippa
 
Secure routing for wireless NANs
Reza Sadeghi
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
IRJET Journal
 
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Shantanu Sharma
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
IJCSIS Research Publications
 
Review of authentication techniques for wireless networks & manet
eSAT Journals
 
Zigbee sensor network integrated with 4 g for iot
eSAT Publishing House
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PPTX
NEUROMOROPHIC nu iajwojeieheueueueu.pptx
knkoodalingam39
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
NEUROMOROPHIC nu iajwojeieheueueueu.pptx
knkoodalingam39
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
site survey architecture student B.arch.
sri02032006
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Thermal runway and thermal stability.pptx
godow93766
 
inherently safer design for engineering.ppt
DhavalShah616893
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 

A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313 A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture Miss. Shraddha V. Pawar1 , Prof. Sachin P. Patil2 1Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. 2Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - The WiMAX and LTE are two wireless radio data transmission technologies based on IEEE 802.16 designed to ensure broadband wireless access. This paper considers the problem of detecting rogue node in WiMAX networks. A rogue node is an attacker node that duplicates a legitimate node. It may lead to disturbance in service. In this paper we have proposed an efficient technique forsecure datatransmissionto ensure the security and integrity of the data packet in the WiMAX network. We have used an ECDH algorithm for ensuring secure data transmission. Key Words: Rogue Node, Distributed Security, Elliptic Curve Diffie Hellman Algorithm(ECDH), Worldwide Interoperable for Microwave Access(WiMAX). 1. INTRODUCTION Vehicular communications have received a great deal of attention in recent years due to the demand for multimedia applications during travel andforimprovements in safety. Safety applications often require fast message exchanges but do not use much bandwidth. On the other hand, multimedia services require high bandwidth for vehicular users.Hence,toprovidemobilebroadbandservices at a vehicular speed of up to 350 km/h. Worldwide interoperable for Microwave Access (WiMAX) and Long- Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth- Generation (4G) wirelesstechnologiesthathavewell-defined quality of service (QoS) and security architectures. WiMAX and LTE resemble each other in some key aspects, including operating frequency spectrum, high capacity, mobility, strong QoS mechanisms, and strong security with a similar key hierarchy from the core network to the access network. However WiMAX and LTE also differ from each other in certain aspects, as they haveevolvedfrom different origins. LTE has evolved from 3rd Generation Partnership Projects (3GPP): thus, the LTE network has to support the existing 3G users' connectivity, but there is no such constraint for WiMAX. Particularly, on the security aspect, the WiMAX authentication process uses Extensive Authentication Protocol Tunneled. Maintaining QoS requirements of a specific application has become a significant topic and priority is to maximize the QoS experienced by the user. QoS is the ability of a network to provide premier service to some fraction of total network traffic over specific underlying technologies. QoSmetricsare delay, jitter (delay variation), serviceavailability,bandwidth, throughput, packet loss rate. Metrics are used to indicate performance of particular scheme employed. QoS can be achieved by resource reservation (Integrated services), prioritization (differentiated services). 2. EASE OF USE As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. The main cause for the MAC layer security threatsin4Gvehicular networks is due to certain unprotected MAC management messages between Mobilestation(MS)andBaseStation(BS). When the control messages are in plain text, the attackers/intruders can easily spoof, modify,andreplythose control messages for the intended receiver node. The severity of the security threats may vary based on the modification of those control messages. Similarly, the attackers may send the continuous false packets unnecessarily to the receiving node for the water torture attacks. Many research efforts have been published on MAC layer security threats in both WiMAX and LTE networks and a few of them discussed the implementationofIPSecsecurity for WiMAX networks. In multihop WiMAX, once the user is registeredwith the home network the security layer may use three levels of protections for the MAC management messages, i.e., No protection, CMAC, and Encrypted by AES-CCM. As a consequence of adding the encryption support for MAC messages, some of the security threats discussed no longer exist for multihop WiMAX. However, one of the security threats such as rogue RN attack is exists that adds a rouge node/Fake node in network and creates big threaten to the 4G multihop wireless networks. Such attack causes network QoS gets degraded. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop. But enhancing security should not degrade network QoS. Hence we proposed Elliptic Curve Diffie-Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks. ECDH is competitor to RSA public key algorithm and has very good security. ECDH consumes less power and suitable for 4G wireless networks.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314 3. LITERATURE SERVEY In [1] authors Proposed QoS aware distributed security architecture based on the Elliptic Curve Diffie-Hellman (ECDH) protocol. Worldwide Interoperability for Mobile Access (WiMAX) and Long Term Evolution (LTE) are 4G wireless technologies which have better Quality of Service (QoS) and security architectures. Security threats likeDenial of Service (DoS), Water Torture Attack, rouge RN attack, etc in WiMAX and LTE are present issues. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop wireless networks. But enhancing security should not degrade network QoS. In [2] authors have researched that there in the VANET communication, especially in Multihop networks the forwarder node authentication is more important. So, we need to provide authentication for each and every hops. Hop by Hop message authentication is required to provide high level security in VANET. Simultaneously, the address of the data origin known by the attacker leads to node capture attack. In [3] authors have researched on measuring the QoS performance for node protection in 4G wireless networks using network coding. Exclusive OR (XOR) network codingis used to explain the node protection for multihop 4G wireless networks. It is followed by measurement of the QoS performance, such as packet delivery ratio (PDR), latency and jitter, for different scenarios. Failure of a single and two relay node with and without proposed protection scheme is tested along with user's mobility. In [4] authors proposed Network Protection Codes (NPC) using network coding to protecttheoperationofthe network against link and node failures. Their interest was to find the limits of their NPC and where to deploy their NPC using several network graphs with a minimum number of edges. The authors also considered the problem of providing protection against a single node failureusingnetwork coding and reduced capacity technique for wired networks. In [6] authors proposed, cross layer QoS architecture for 4G heterogeneous network services. QoS engine and cross layer algorithms are the main components. QoS engine is composed of QoS daemon, QoS agent and control module. Cross Layer Architecture monitors and adjusts resources periodically. In the absence of CLA, average latency and average packet loss are reduced by 2% and 8.5% respectively. But throughput achievedisslightlylowerinCLA than traditional layered approach. In these existing research efforts, the authors implemented the relaynodeprotectionusingnetwork coding for different networks such as wired networks, Wireless Sensor Networks (WSNs)andoptical networks.However,the QoS performance of network coding for relay node protection in a multihop wireless network is not tested until now. Also, the relay node protection is very useful for multihop 4G wireless networks. 4. SYSTEM ARCHITECTURE Figure 1 shows System architecture for proposed system. After generating WiMAX Multihop network and implementing ECDH on it, we generateattack byaddingnode in existing network. Then ECDH detects the rouge node by using hop-by-hop authentication after completing intial ranging process. By using distributed security architecture we prevent the node which is detected as rouge node and forward massage to next node. This process repeats until destination node found. Fig – 1: System Architecture 5. METHODOLOGY There are four Modules in system: 5.1. Generation of 4G Multihop Network and ECDH implementation on it. 5.2. Attack Detection 5.3. Attack Prevention 5.4. Performance Evolution 5.1 Generation of 4G Multi Hop WiMAX Network and ECDH implementation- In this module, we are implementing initial configuration and setup of 4G Multihop WiMAX network in NS 2or NS 3 Network simulator tool. We are adding base station node, mobile station node and relay node. It creates multihop network. Having one base station and multiple ECDH Detect node by Distributed Sec. Prevent Attacker node Send Packets to the Destination Secured Initial Ranging Process Generate WiMAX Network
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315 mobile stations,relaynodes.Hereweareimplementinginitial ranging process of ECDH. Which is shown in figure 2.After downlink channel synchronization (DL Sync),the MS will send ranging request (RNG_REQ)message. In turn,BS will responds with RNG_RES message.ThentheSubsequentsteps are following.  EAP Based Authentication- The authenticator intheAccessNetwork Gateway(ASN-GW) sends an EAP Identity request to the MS, and the MS will respond to the request by sending PKM-REQ (PKMv2 EAP- Transfer) message. A PKM-REQ message contains thedetails of SIM or X.509 certificate. Then the ASN-GW forwards the PKM-REQ to the AAA server over radius protocol. The AAA server authenticates the device and provides the Master Session Key (MSK) in an EAP-TTLS protocol. Then, it forwards MSK to the authenticator. The authenticator generates Authorization Keys (AK) from the MSK and forwards to the BS. At the same time, the MS also generates the same AK from the MSK. Now, the BS and MS can mutually authenticate each other using AK.  Authorization and Security Association- Once the device or the user is authenticated by the network, the BS has to authorize the user by its unique Security Association Identity (SAID) using SA-Transport Encryption Key (SA-TEK) challenge messages, as depicted in the second block in Figure 2.  Traffic EncryptionandMACMessageEncryption- Fig – 2 : Initial Ranging Process for WiMAX The MS establishes an SA for each service flow where the BS provides both uplink and downlink TEK to encrypt the data. Initially TEK is generated from the EAP-based authentication and then refreshed by BS periodically. 5.2 Attack Detection- As author Ebrahim Halil Saruthan has proposed system to detect and prevent rouge node in real time wireless network [9] it shows real example of rouge node in network. Different architectures like Access Point (AP) architecture, client architecture etc. are used to Detectand Prevent rouge node. So, we are generating attack in network using simulator. Network having attack, adds new rouge/fake node to existing one to receive data and hand over to some other nodes, creates traffic jam or to spoof or modify data etc. Now we have to detect the rouge node with the help of ECDH. First step is secured initial ranging process for 1st hop to nth hop node is shown in figure 3.In initial ASN GW AAA MS BS EAP Based Authentication Authorization and Security Association (SA) Traffic encryption and MAC Message Encryption Master Session Key Establishment Ranging Request Ranging Response MS context initialization
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316 ranging process as shown in figure. 2 any WiMAX node (MS/RS) wants to establish connection with BS generates the public and private key pairs and sends public key to BS initial ranging codealongwithRNG_REQmessage.Whichis encrypted using BS public key.BS responds with RNG_RSP message which is encrypted using BS public key. Fig - 3 : Distributed Security using ECDH BS responds with RNG_RSP message which is encrypted with the MS/RS Public key. Hence MS/RS establish secure tunnel with BS and subsequent MAC messages encrypted using ECDH public key. In secure initial ranging process the only additional bandwidth overhead is the exchange of global parameters and public keys. Now next step is distributed security using ECDH in multihop WiMAX network. To establish hop to hop authentication and to reduce computational overhead of centralized node distributed architecture is necessary. In which new node is actually identified in WiMAX network. Figure 3 shows SA and key management in proposed security architecture. 5.3 Attack Prevention- This module shows how ECDH helps to prevent RN Attack using key exchange.NeighborauthenticationandSAisnext step. If the new RS is connected with network, the BS will inform to the updated member list to the existing RSs group in Downlink Channel Descriptor (DCD) message. Now if new RS will find another RS during channel scanning it verifies new RS is genuine or not verifying RS_ID. Then it sends public key and RS_ID to the neighbor RS to establish SA. The neighbor RS will also send the public key in response. At the end of association, RS’s generate uplink BS MS1 RS2 RS1 RS3 MS4MS3MS2 MS5 WiMAX Air i/f withECDH key agreement Tunnel i/f for ECDH key agreement
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317 1 1 1 2 3 4 Fig - 4 : Neighbor Authentication Process using ECDH and downlink CMAC digital signaturesamongthem.Figure 4 shows neighbor authentication process.instep1,theRS3 receives updated list after ECDH agreement with BS. During scanning process, RS3 may find the DCD and other downlink parameters of RS2 as shown in step 2.Since RS3 knows that RS2 is a legitimate node based on list received from BS, it establishes theECDHagreement.AfterthatBoth share their digital signatures as shown in step3andstep4. 5.3 Performance Evaluation- This module calculates QoS performance andshows that how it maintains its stability after applying ECDH using NS 2 or 3 supporting tools such as X-Graph. We can consider parameters for calculating performance like latency, service availability, jitter, Packet loss rate, throughput performance. 6. CONCLUSION As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. To provide high bandwidth support at the vehicular speedof up to 350 km/h, the WiMAX and LTEnetworksarethepreferred candidates. 4G networks have well-defined QoS and security architectures. However, some major security threats suchas DoS attack still exist in 4G multihop networks, because certain MAC messages are transmitted only in plain text. For this reason, we have proposed a distributed security architecture using the ECDH algorithm in Layer 2 for 4G multihop wireless networks. In the proposed scheme, the wireless nodes are initially authenticated by the home network and then authorized by the access node.Inaddition, the proposed scheme requires only a slightly higher bandwidth and computational overhead than the default standard scheme. REFERENCES [1] Perumalraja Rengaraju, Chung-Horng Lung, Member, IEEE, and Anand Srinivasan “QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 6, JULY 2014. [2] Vinoth V. and C. Monica Manoreya “A SAMA Scheme For Improving Qos in 4G Multihop Wireless Networks” Department of Information Technology, Sathyabama University, Chennai, India,VOL 10,no-7,2015. [3] Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan, ”QoS and protection of relay nodes in 4G wireless networks using network coding”, 9th International Conference on Wireless Communications and Mobile Computing (IWCMC), Sardinia ,pp. 282 - 287 ,July 2013 [4] S. Aly and A.Kamal, “ Networking Coding-Based Protection Strategies Against Node Failures” Proc. of IEEE ICC.,2009.pp.1-5. [5] S. Aly, A.Kamal and A.Walid, “Network Design and Protection using Network coding” Proc. of IEEE Theory Information Workshop.2010, pp.1-5. [6] Jiann-Liang Chen, Ming-Chiao Chen, Shih-Wei Liu, Jyun- Yu Jhuo, “Cross-layer QoS architecture for 4G heterogeneous network services”, 11th Int.Conf. BS
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318 Advanced Communication Technology (ICACT 2009),Phoenix Park, pp.73-77,Jan 2009. [7] A. Rammoorthy,and S. Li.”Protection against Link Errors and Failures using Network Coding in Overlay Networks”,Proc. Of IEEE International Symposium on Information Theory, July 2009,pp.986-990. [8] A. Kamal,”1+N Network Protection for Mesh Networks:Network Coding-Based Protection using p- Cycles” ,IEEE/ACM Transactions on Networking, Feb 2010,pp.67-80. [9] Ibrahim Halil Saruthan,”Detecting and Preventing rouge devices on network”SANS institutes 2007.