a review on security techniques in manet - ijettcs...2017/10/01  · physical layer has preventing...

3
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected] Volume 6, Issue 5, September- October 2017 ISSN 2278-6856 Volume 6, Issue 5, September – October 2017 Page 124 A Review on Security Techniques in MANET JayashreeAgarkhed Professor, Department of C.S.E, P.D.A College of Engineering, Kalaburagi, India. Abstract— The Mobile ad hoc network (MANET)is more prone to various attacks due to its network characteristics such as unreliable of links, lack of centralized administration and mobile nodes in the network. The defense in the network has to be increased tremendously to face the bad attacks. In order to achieve security in MANET, availability, integrity, non- repudiation and authentication must be satisfied by the network. Providing authentication is the key issue in MANET during detection of correct route in infrastructure less network. This paper reviews various security attacks Keywords— Security, Ad hoc network, Routing, MANET I. INTRODUCTION MANET refers to the way the mobile networks encompasses the wireless nodes with mobility for communication. Thus it consists of set of wireless nodes with mobility and ability of communicating with each other in a infrastructure network without centralized administration. Nodes organize themselves vigorously in random and leads to unstable topologies. MANET support range of applications like ad hoc gaming, intelligent system, smart agriculture, disaster recovery and forest monitoring. These applications demand a system that can transfer reliable information from a source to destination, mobile nodes. The mobile nodes may be subjected to a crucial attacked. It is so, because a node can receive a packet of data that is sent within its frequency range. Due to mobility of nodes, the intermediate node at any time can travel out of frequency range. The non existence of centralized control and predetermined infra structure allows any node to enter into the network. In wired networks, measures have to be taken while communication occurs by use of firewalls and secured gateways which provide secure communication though network. In MANET, frequent change in topology leads to lot of vulnerabilities and provide chance to the attackers to collapse the network partially or fully. Thus there is a necessity to understanding of the various attack related problems allied with the MANET while routing the information [1]. The paper is organized in the following sections: Section II deals with the related work. Section III gives information about different types of attacks prone to routing. Section IV gives the security issues and challenges in MANETs. Section V details about security techniques in MANET and Section VI gives the conclusion part. II. RELATED WORK The main intend of ad hoc network is to provide efficient and robust operation in the network using routing protocols [2]. A number of the design challenges and characteristics of MANETs include 1. Wireless link: The wireless link availability is not reachable to everyone. 2. Secure boundaries: Lack of secure boundaries welcomes various threats and attacks within the network. 3. Infrastructure less: Specific infrastructure has not been defined. 4. Limitation in nodes: Nodes limitation will lead to less availability. 5. Link limitations: Link limitation will pose bandwidth limitation. 6. Multi-hop routing: This type of routing can cause fabricated routes within the network. 7. Dynamic topology of network: The topology of network changes frequently due to mobility behaviour of nodes in MANET. 8. Sharing communication medium: They are shared in nature and leads to more interference. 9. Openness of network architecture: It has open architecture in nature and hence is prone to many types of attacks. 10. Inflexible resource constraints: It has resources which are inflexible to use. In [3] author has made survey on fundamental security issues on multi hop network connection in MANET. In [4] author has presented the range of security aspects in mobile ad hoc network and dealt with various characteristics and tools which can be used in MANET. In [5] author has discussed some new security aspects in fixed infrastructure Wireless Sensor Networks (WSN) and MANETs. The design challenges, issues and services of secure group communication over the wireless network are given in detail in the work. Authors in [6] have discussed about the security challenges for secured transmission of information in MANET. Various security issues in MANET include availability, integrity, confidentiality, authentication, non-repudiation, scalability etc. A number of the techniques used for securing the MANET are prevention, performing detection and reaction approaches. These techniques to overcome attacks while routing in

Upload: others

Post on 06-Oct-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Review on Security Techniques in MANET - IJETTCS...2017/10/01  · Physical layer has preventing signal jamming denial-of-service attacks. V SECURITY TECHNIQUES IN WIRELESS ADHOC

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected]

Volume 6, Issue 5, September- October 2017 ISSN 2278-6856

Volume 6, Issue 5, September – October 2017 Page 124

A Review on Security Techniques in MANET

JayashreeAgarkhed Professor, Department of C.S.E, P.D.A College of Engineering,

Kalaburagi, India.

Abstract— The Mobile ad hoc network (MANET)is more prone to various attacks due to its network characteristics such as unreliable of links, lack of centralized administration and mobile nodes in the network. The defense in the network has to be increased tremendously to face the bad attacks. In order to achieve security in MANET, availability, integrity, non-repudiation and authentication must be satisfied by the network. Providing authentication is the key issue in MANET during detection of correct route in infrastructure less network. This paper reviews various security attacks Keywords— Security, Ad hoc network, Routing, MANET I. INTRODUCTION MANET refers to the way the mobile networks encompasses the wireless nodes with mobility for communication. Thus it consists of set of wireless nodes with mobility and ability of communicating with each other in a infrastructure network without centralized administration. Nodes organize themselves vigorously in random and leads to unstable topologies. MANET support range of applications like ad hoc gaming, intelligent system, smart agriculture, disaster recovery and forest monitoring. These applications demand a system that can transfer reliable information from a source to destination, mobile nodes. The mobile nodes may be subjected to a crucial attacked. It is so, because a node can receive a packet of data that is sent within its frequency range. Due to mobility of nodes, the intermediate node at any time can travel out of frequency range. The non existence of centralized control and predetermined infra structure allows any node to enter into the network. In wired networks, measures have to be taken while communication occurs by use of firewalls and secured gateways which provide secure communication though network. In MANET, frequent change in topology leads to lot of vulnerabilities and provide chance to the attackers to collapse the network partially or fully. Thus there is a necessity to understanding of the various attack related problems allied with the MANET while routing the information [1]. The paper is organized in the following sections: Section II deals with the related work. Section III gives information about different types of attacks prone to routing. Section IV gives the security issues and challenges in MANETs. Section V details about security techniques in MANET and Section VI gives the conclusion part.

II. RELATED WORK The main intend of ad hoc network is to provide efficient and robust operation in the network using routing protocols [2]. A number of the design challenges and characteristics of MANETs include

1. Wireless link: The wireless link availability is not reachable to everyone.

2. Secure boundaries: Lack of secure boundaries welcomes various threats and attacks within the network.

3. Infrastructure less: Specific infrastructure has not been defined.

4. Limitation in nodes: Nodes limitation will lead to less availability.

5. Link limitations: Link limitation will pose bandwidth limitation.

6. Multi-hop routing: This type of routing can cause fabricated routes within the network.

7. Dynamic topology of network: The topology of network changes frequently due to mobility behaviour of nodes in MANET.

8. Sharing communication medium: They are shared in nature and leads to more interference.

9. Openness of network architecture: It has open architecture in nature and hence is prone to many types of attacks.

10. Inflexible resource constraints: It has resources which are inflexible to use.

In [3] author has made survey on fundamental security issues on multi hop network connection in MANET. In [4] author has presented the range of security aspects in mobile ad hoc network and dealt with various characteristics and tools which can be used in MANET. In [5] author has discussed some new security aspects in fixed infrastructure Wireless Sensor Networks (WSN) and MANETs. The design challenges, issues and services of secure group communication over the wireless network are given in detail in the work. Authors in [6] have discussed about the security challenges for secured transmission of information in MANET. Various security issues in MANET include availability, integrity, confidentiality, authentication, non-repudiation, scalability etc. A number of the techniques used for securing the MANET are prevention, performing detection and reaction approaches. These techniques to overcome attacks while routing in

Page 2: A Review on Security Techniques in MANET - IJETTCS...2017/10/01  · Physical layer has preventing signal jamming denial-of-service attacks. V SECURITY TECHNIQUES IN WIRELESS ADHOC

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected]

Volume 6, Issue 5, September- October 2017 ISSN 2278-6856

Volume 6, Issue 5, September – October 2017 Page 125

MANET reviewed in the literature are discussed in this paper discussed. III. DIFFERENT TYPES OF ATTACKS Attackers sensing the data traffic network as depicted in figure 1, continuously and intrude themselves into the route established between the source node and destination node. In this way attacker take the control of data traffic flowing in the network which is shown in figure 2.

Fig. 1 Route between source node 1 and destination node 5 with no attacker

Fig. 2 Route between source node 1 and destination node 5 with attacker denoted by node M As depicted in the figure 2, M acts as a malicious node which enters route established between sender 1 and receiver 5. Such routing attack stops forwarding of packet in the network to destination and leads to various vulnerabilities in MANETs. Routing attack advertize routing updates without considering the specifications of the any routing techniques. Routing protocols are subjected to following types of attacks.

1. Overflowing Routing Table: In a proactive routing the routing table is updated with information routed at regular intervals. This attack advertises extreme routes to overflow routing table information of the target node. It targets that creating of new routes and their implementation is prevented due the presence of enough routes and protocol is overwhelmed.

2. Poisoning Routing Table Attack: Nodes information in the route table can be corrupted by the route table poisoning attack in the network. This attack creates false routes by broadcasting false information about traffic and thus creates false entries in the routing tables of other nodes. Other way is to generate RREQ

packets with a high priority sequences numbers thus leading to deletion of routes with low sequence numbers.

3. Attack by replication of packets: Replication done by replicating packets by an enemy node, using up extra bandwidth and energy of a node.

4. Rushing Attack: Protocols at route discovery use duplicate repression process [7]. When malicious node receives Route Request packet (RREQ), it floods the packet over network before the nodes which also received the same packets. The node on receiving original RREQ, assume that the just received packet as duplicate and discard the packet. Thus source node cannot find the secure routes.

5. Cache information corruption Attack Routing table entries are updated frequently. Attacker corrupts routing information in cache while routing [8]. This happens when stored information in the routing tables is modified, deleted or injected with false information.

6. Location discovery attack:Intruder identifies the location of node or structure of network.

7. Black Hole:In this type, malicious node inserts fake route as shortest path to divert the network traffic or even inserts a malicious node.

8. Wormhole:In this type of attack, intruder say node X capture the data traffic and establish link with other node say Y. Then later inserts this link into network and controls all nodes in network connected to this link.

MANETs are analyzed in two wide categories.

a. Intrusion Detection System (IDS): IDS is a security system used for identifying the violations made for security policies. Certain measures must be taken if the security is breached in the network. Various types of IDS include misuse-based, anomaly-based, specification-based system [9].

b. Secure routing techniques: These routing techniques are greatly required for known threats and attacks in MANET. It includes mechanisms on harder techniques like warm hole and rush attacks [10].

Apart from these mechanisms, various security techniques are to be considered as discussed next. IV. SECURITY ISSUES AND CHALLENGES IN MANET The following discussion highlights the various security issues and design challenges in MANET. MANET is considered as self configured network, connecting mobile nodes. Some of the security issues in MANET are listed according to network layers. The layers

Page 3: A Review on Security Techniques in MANET - IJETTCS...2017/10/01  · Physical layer has preventing signal jamming denial-of-service attacks. V SECURITY TECHNIQUES IN WIRELESS ADHOC

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected]

Volume 6, Issue 5, September- October 2017 ISSN 2278-6856

Volume 6, Issue 5, September – October 2017 Page 126

of protocol stack in the network are included for considering the design issues in the MANET [11].

a. Application layer include detection and prevention of worms, viruses, malicious codes and application abuses.

b. Transport layer has authenticates and secures end-to-end information communication through data encryption.

c. Network layer include protection of the ad hoc wirelessly routing protocols.

d. Link layer include protection of the wireless MAC layer protocol and support link-layer security.

e. Physical layer has preventing signal jamming denial-of-service attacks.

V SECURITY TECHNIQUES IN WIRELESS ADHOC NETWORKS There is need to provide security against these attacks and providing high information security in wireless mobile networks are major concern today. Major security mechanisms in are classified into broad categories.The major security techniques in MANET are.

a. Identity based cryptography: It is a cryptographic method which includes public key

for encrypting the files. This technique involves shared key generation, new master key sharing idea, certificate chaining method and private key method [12].

b. HMAC (Homomorphic Message Authentication

Code): It is a cryptographic solution under the network for

inspection the authentication of the code inside the sensor nodes. This is a type of symmetric key solution method.

c. Digital signatures: It is a symmetric based cryptographic method for

encryption and decryption of the data within the network. It works against denial of service attack in MANET.

MANETS are usually more prone to physical threats as they have mobile devices connected together. They have movable platforms and therefore have more security threats in the network. MANET has got lot of vulnerabilities due to enormous functions like routing and packet forwarding etc. The security goals are required in MANETs as there are sensitive in security applications. The well known features of MANETs are required for wireless technology in order to design the network solutions. VI. CONCLUSION MANETs have the capacity of self configuring of nodes and network maintenance. Nodes is MANET are subjected a lot of issue and challenges to make available a reliable transmission of information. Thus providing safety measures has turned out to be a major concern in wireless

communication. In that aspect, major security issues and challenges have been addressed while designing of the protocols. REFERENCES [1] Sarika, S., et al. "Security Issues in Mobile Ad Hoc

Networks." Procedia Computer Science 92 (2016): 329-335.

[2] Garg, Nishu, and R. P. Mahapatra. "Manet security issues" IJCSNS 9.8 (2009): 241.

[3] Yang, Hao, et al. "Security in mobile ad hoc networks: challenges and solutions." IEEE wireless communications 11.1 (2004): 38-47.

[4] Sogani, Priyanka, and DrAman Jain. "A Study on Security Issues in Mobile Ad Hoc Networks." IJIACS ISSN (2015): 2347-8616.

[5] Pandey, Aditi, RajashreeDutta, and RanjanaThalore. "SECURITY SERVICES IN GROUP COMMUNICATIONS OVER MOBILE AD HOC AND WIRELESS SENSOR NETWORKS." connections 6.05 (2017).

[6] Goyal, Vikas, and GeetaArora. "Review Paper on Security Issues in Mobile Adhoc Networks." Engineering and Science 2.1 (2017): 203-207.

[7] V. Palanisamy, P.Annadurai, Impact of Rushing attack on Multicast in Mobile Ad-hoc Network, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, pp:183-189, ISSN:1947-5500, 2009

[8] K.P.Manikandan, Dr.R.Satyaprasad, Dr.K.Rajasekhararao, A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Adhoc Networks, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, pp: 7-12, March 2011

[9] Kalnoor, Gauri, and JayashreeAgarkhed. "Pattern matching intrusion detection technique for Wireless Sensor Networks." Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 2016 2nd International Conference on. IEEE, 2016.

[10] Chare, Varsha S., and JayashreePatil. "Secure and efficient data transmission in wireless sensor networks using elliptical curve cryptography." IJARCET 3.7 (2014).

[11] Islam, Noman, and Zubair A. Shaikh. "Security issues in mobile ad hoc network." Wireless networks and security (2013): 49-80.

[12] Narayana, V. Lakshman, and C. R. Bharathi. "IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS." Journal of Theoretical and Applied Information Technology 95.5 (2017): 1173