Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. This type of network faces several attacks because of its mobility nature. In MANET, black hole attacks may cause packet dropping or misrouting of packets during transmission from sender to receiver. This may lead to performance degradation in the network. To surmount this issue, we propose the modified secret sharing scheme to provide the data protection from unauthorized nodes, consistency of data and genuineness. In this algorithm, initially the identification of black hole attacks is achieved and followed by data protection from malicious nodes and also this scheme checks for the reality of the data. Here, we detect the misbehaviour that is dropping or misrouting using verifiable secret sharing scheme. The proposed algorithm achieves the better packet delivery ratio, misbehaviour detection efficiency, fewer packets overhead and end-to-end delay than the existing schemes. These can be viewed in the simulation results.
In recent years, MANET is not only used widespread [
In this type of attack, node is used to convey that this node is very near to all, which becomes cause to all nodes around it to route data packets towards it. The AODV protocol is the best to such kind of attack because of having network centric property, where each node of the network has to share their routing tables among each other.
A malicious node may use the routing protocol to advertise itself that only through that node the shortest path to the destination is available. Whenever a source node wants to send data packets to a destination node, if there is no route available in its Routing
Moreover, node B does not check its routing table to send a false message to the source node and also its response time is very less when compared to the original destination node. This makes the source node thinks that the routing discovery process is completed, ignores all other reply messages, and begins to send data packets. The forged routing has been created. As a result, all the packets through node B are simply consumed or lost and it does not attain the destination node. Node B could be said to form a black hole in the network, and it is said to be the black hole attack.
Amol A. Bhosle et al. [
Firoz Ahmed et al. [
M. Umaparvathi and Dharmishtan K. Varughese et al. [
Disha et al. [
Sushil Kumar et al. [
Ping Yi et al. [
N. Bhalaji et al. [
In [
The paper is organized as follows. Section 1 describes introduction about overview of MANETs and black hole attacks. Section 2 deals with the previous work which is related to the wormhole attacks. Section 3 is devoted for the implementation of proposed algorithm. Section 4 describes the performance evaluation and the last section concludes the work.
In the proposed algorithm Efficient Multipath Routing Tree based Energy Minimization (EMRTEM) in WSNs, there are 8 steps to achieve the minimal energy consumption through multipath routing tree. Here we added parent node, route node selection, finding multipath routing tree for message length queries and minimizing the average energy consumption. The alternative healing method is protected inside the proposed set of rules which gives the course redundancy to take away the route repair like node and link failure sessions.
In our proposed scheme, a cross-layer design is proposed while the MAC layer predicts the state of the channel whether it is good or bad. This calculation depends on Rayleigh fading channel model where using the previous signal strength requirements. Once the channel is good which is determined by MAC layer, the data transmission gets started. The prediction model for the Rayleigh fading channel is cooperated with a Markovian model for IEEE 802.11 standards MAC to analyze the performance of the proposed scheme. The main reason for predicting the Rayleigh fading channel is to improve performance of the network. The mobile node at the destination end observes the power levels of each received transmission from the receiver. By using these measurements, the destination node predicts whether the channel would be in good or bad state during the next transmission phase. If it fails, then it informs the sender about the fade and stops transmission of any reply packets to the source node. The destination node may inform the source node about the forthcoming fade by setting a flag in the acknowledgment (ACK) or clear-to-send (CTS) packet that it transmits to the source node.
When the supply node receives this notification, then it right away halts the transmission, the predicted fade length is decided and schedules future transmissions accordingly. The Network Allocation Vector (NAV) at the neighbours is also updated when they overhear a CTS or ACK whose flag bit is marked. The simulation results using object oriented discrete even simulator obtained indicate the cross-layer implementation performs better than the layer implementation in terms of received signal strength, throughput, fraction of packets dropped, throughput, delivery ratio and congestion ratio.
Multipath routing has been used in several different contexts. Multipath routing technique uses the multiple alternate paths through a network which benefits fault tolerance and reliability. Traditional circuit switched telephone networks used a type of multipath routing called alternate path routing. In alternate path routing, node pair has a set of multiple paths which comprises a primary path and alternate paths. Alternate path routing was proposed in order to decrease the call blocking probability and increase overall network utilization. It is spreading of traffic from source to destination over providing many paths through network.
In alternate path routing, traffic is routed through the shortest path which is one hop. If the shortest path is engaged or unavailable due to full capacity or link failure, the traffic is routed through the alternate path which is of two hops instead of blocking the connection. When the same label traffic flows, the router dynamically splits the traffic flow into different paths based on the QoS constraints (minimum delay and maximum bandwidth).
The steps for achieving load distribution through the multipath routing are follows:
Step 1: Calculate the
Step 2: Find the path
Bw(pm) = Bw(pk) and the distance Sd(m) = Sd (l).
Step 3: If (Path failure occurs)
{
Choose the alternative backup path form the set 1 {Pl, Pm, ×××, Pn} with least hop distance. If the source is l and the destination n.
}
else
{
Stop the transfer of the data from source to destination.
}
Step 4:
Select the path from the maximum number of edge disjoint paths which satisfies the bandwidth and delay requirements
Step 5:
Establishing the multipath routing among all the mobile nodes in the network.
Step 6:
Achieving the load balancing to improve the throughput and network connectivity.
Step 1:
Source S wants to communicate with node D. It broadcasts the request message RREQ. RREQ includes the level of security it requires and D’s id, a sequential number and Pb D [Sid] is the Source’s id encrypted by Destination’s public key and Trust Active. RREQ is like this: {RREQ, seq_num, Pb D [Sid], Did, TA}, where TA Trust active is the time-dependent trust value. Initially node A have the trust value on node B is at time t1; but after a certain period, node B may travel to another zone which is out of radio range of node A due to nodes mobility in MANET. At time t2, node B happens to back in node A’s radio range again. The trust value should decay during this time gap. Let ATB(t1) be the trust value of node A to node B at time t1 and ATB(t2) be the decayed value of the same at time t2. Then trust active is defined as follows,
1. Node A receives RREQ. It looks up its trust list for the trust values of the neighbors. And A will encrypt if own id with proper policy and append in the message. The message which will sent by A is like this:{RREQ, seq_num, Pb D[Pv A[Aid], PbD[Sid], Did,
2. D receives RREQ. It uses its private key and the public key of the intermediate nodes to authenticate them. D checks if there are any bad nodes. If they are all trusted, D generates a number for the flow Fid , and broadcasts the following message(suppose A and B are the intermediate nodes): {RREP, Pb B[Fid, Pb A[Fid, Pb S[Pv D[Fid]]]]};
3. Intermediate node that receives the RREP uses its private key to decrypt the message and gets the flow id. Then it updates its route table with Fid designated to destination D;
4. S receives RREP, uses its private key to decrypt the message and D’s public key to identify the destination. Afterwards, it will send message with the flow id Fid.
5. Cluster Head maintains the Trust threshold value based on trust active and node proposal to detect the attacks.
6. If any nodes below the Trust threshold value that node is encountered by an attacks.
Step 1: Let (S1, S2, ×××, Sn) be an (t,n) sharing of the secret key S of the service with the node k having Sk.
When Sk, is defined from a finite a finite field D = Zr and g is a primitive element in F.
Step 2: Node K (K Î{1, 2, 3, ×××, n}) which randomly generates Sk’s sub shares like (Si1, Si2, ×××, Sin) for (n,t) sharing.
Step 3: All subshares Skp (p Î{1, 2, 3, ×××, n}) is distributed to node p through the secure link.
Step 4: When node j gets the sub shares {S1k, S2k, ×××, Snk}. It computes a new share from these sub shares and its old share with an equation.
Step 1: Share holder node M sends PSS_start flag to all share holder nodes.
Step 2: All Share holder nodes sends PSS_start_ack flag to the share holder node M.
Step 3: Initiated the sharing procedure.
Step 4: Node send the refresh_flag to all share holder nodes. All nodes refresh its share to send shares to other share holder nodes with digital signature and encrypted public key of destination nodes.
Step 5: Verify the digital signature trust active using trust mechanism.
Step 6: Send end flag to all share holder nodes. After receiving this end flag, send_ack flag again and send refresh_end flag to all share holder nodes.
Step 7: In detection phase, we use the concept of Virtual Sharing scheme procedure to detect any misbehaviour.
Each share holder node verify his own share by using,
If the share holder node does not broadcast the above information, misbehaviour will be broadcasted to all the share nodes.
Step 8: The secret key is reconstructed. If Sk holds shares (m1, n1) and Sp hold shares (m2, n2), share holder node reconstructs If m1 = m2, then the secret is n1, otherwise the secret is n2.
QualNet version 4.5 is used to simulate our proposed algorithm. QualNet is one of the best tools to analyse Mobile Ad-hoc Networks and Wireless Sensor Networks. We can easily implement the designed protocols by writing C++ Program. Visual Studio is used as an Integrated Development Environment (IDE) to develop the coding. QualNet helps to prove our theory analytically and Visual Studio is used to develop the User Interface (UI). In our simulation, 50 mobile nodes move in a 1600 meter × 1600 meter square region for 60 seconds simulation time. All nodes have the equal transmission range of 250 meters. Our simulation settings and parameters are summarized in
We evaluate mainly the performance according to the following metrics.
Throughput: It is known as the number of packets delivered successfully.
End-to-end delay: It is averaged over all surviving data packets from the source to the destination.
Packet delivery ratio: The ratio of packet received to the packet sent in the network is referred as Packet Delivery Ratio. This ratio also represents the loss ratio of the routing protocol Ideally the ratio should be 1.If the ratio is less than 1,then it indicates some fault in the network design. Otherwise, if it is greater than 1 then it indicates that the sink node receives the same data packet once again. If it is so, then network resources may get wasted. Based on the number of duplicates received by the destination, appropriate action will be taken to reduce the redundancy.
No. of Nodes | 50 |
---|---|
Area Size | 1600 × 1600 |
Mac | 802.11 |
Radio Range | 250 m |
Simulation Time | 60 sec |
Traffic Source | CBR |
Packet Size | 512 bytes |
Mobility Model | Random Way Point |
Transmitter Amplifier | 150 pJ/bit/m2 |
Package rate | 5 pkt/s |
Protocol | DSR |
Mobility is the ultimate freedom of MANET nodes. Higher mobility ensures stable communication while the mobile nodes are moving with higher velocity. A better security protocol must allow the nodes to move faster and with random changes in velocity as well as directions.
Wireless Ad Hoc Networks consist of wireless nodes with none centralized infrastructure. Here node may be stricken by numerous attacks. It may cause the packet losing, routing the information to some other unknown destination. In our proposed work, we focus on detection of the black hole attacks. This attack degrades the per-
formance of the mobile ad hoc networks. So that, we advocate the modified proactive secret sharing scheme to stumble on the black hole attacks. In first segment, the black hole attacks are detected and isolated. In second segment, the proactive scheme provides the data protection from unauthorized nodes and also consistency of data and genuineness. By using the extensive simulation results, the proposed EDIESS scheme achieves better results than the existing schemes.
R. Mohandas Rengaraju,K. Krishnamoorthi, (2016) Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET. Circuits and Systems,07,3174-3182. doi: 10.4236/cs.2016.710270