Probabilistic Framework for Assessing the Threat Level Using Novel Decision Constructs in Mobile Adhoc Network

Probabilistic Framework for Assessing the Threat Level Using Novel Decision Constructs in Mobile Adhoc Network

International Journal of Network Security, Vol.20, No.6, PP.1085-1092, Nov. 2018 (DOI: 10.6633/IJNS.201811 20(6).09) 1085 Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network V. Sangeetha1 and S. Swapna Kumar2 (Corresponding author: V. Sangeetha) Department of Computer Science and Engineering, Kammavari Sangha Institute of Technology1 14, Kanakapura Main Road, Municipal Corporation Layout, Raghuvanahalli, Bengaluru, Karnataka 560062, India (Email: [email protected]) Department of Electronics and Communication Engineering, Vidya Academy of Science and Technology2 P.O. Thalakottukara, Kaipparambu, Thrissur, Kerala 680501, India (Received June 19, 2017; revised and accepted Nov. 5, 2017) Abstract 5) Fault tolerance; 6) Cost effective [1, 7]. The existing secure routing protocol in Mobile Adhoc Net- work (MANET) lacks the capability of identifying the du- It has its wide range of applicability in tactical network, bious communication behavior of a mobile node, which is emergency services, education applications, location- essential in order to construct policy to resist them. This based services [12, 19, 20]. However, an interesting fact could happen when the malicious nodes choose to act like to observe that although MANET is being studied and a regular node in order to bypass security. After review- investigated from more than two decades, but still date ing the existing research approach, we found that existing there are few application that is commercially available studies are carried out in highly controlled research envi- or known to the common people. ronment which is no more applicable if the environment The communication in MANET is supported by three changes. Therefore, we introduce a framework which is different routing protocols i.e. proactive, reactive, and capable of assessing the level of legitimacy of the node in hybrid [18]. At present, there are more than thousand a network before confirming the route establishment with numbers of research work on routing protocols till date, it. The study uses a novel decision making constructs for but majority of them suffers from one or other issues. For implementing its strategy of communication and it also in- an example, proactive protocols suffers from slow con- corporates strategic construction of assessing the security vergence rate, tendency for loop creation, higher depen- threat. The study outcome of proposed system is found to dencies on resources, unexploited routing information etc. excel better communication performance when compared Reactive protocols suffers from out-date routing informa- with existing security routing protocols in MANET. tion, maximized delay, overhead cost, etc. Finally, hybrid Keywords: Intrusion Detection; Intrusion Prevention; protocol suffers from usage of random schemes (proactive) Malicious; Mobile Adhoc Network over the simulation area, latencies involved in inter-zones routing, routing over zones are highly resource dependent. Hence, it will be unwise to highlight any specific routing 1 Introduction protocol in MANET to be highly efficient one. Although, these routing protocols are sufficient to form communica- Mobile Adhoc Network is one of the best way to provide tion among mobile nodes but they are not enough pow- seamless communication platform without any kind of ered to resist different forms of attacks e.g. active at- fixed infrastructure. Hence, this communication feature tack and passive attack in MANET. Some of the attacks allows it to perform adhoc based communication [9, 22]. in MANET are modification, Denial-of-Service, Spoofing, Significant advantage of MANET system includes Impersonating, Masquerade, wormhole attack, Sybil at- 1) Infrastructure independent; tack, black-hole attack, rushing attack, replay attack, etc. 2) Multi-hop routing; Some of the standard routing protocols in MANET are 3) Autonomous terminal; 1) Secured Efficient Distance vector (SEAD); 4) Dynamic topology; 2) Secured Destination Sequence Distance Vector International Journal of Network Security, Vol.20, No.6, PP.1085-1092, Nov. 2018 (DOI: 10.6633/IJNS.201811 20(6).09) 1086 (SDSDV); attack. Although this work is targeted for mesh network 3) Secure Line State routing protocol (SLSP); but it is equally applicable for MANET. Surendran and Prakash [26] have used bio-inspired algorithm for retain- 4) Server Routing Protocol (SRP); ing maximum resiliency of routing process in MANET. 5) Byzantine Failure Resilient Protocol; Zhang et al. [33] have presented a technique that can of- 6) Authenticated Routing for Adhoc Networks fer mitigation from jamming-based intrusion in MANET. (ARAN); Study towards investigating traffic behavior was car- ried out by Qin et al. [21] using statistical approach. Liu 7) Secured Position-Aided Adhoc Routing (SPAAR); and Yu [14] have introduced a routing technique that of- 8) Security Aware Routing (SAR), etc. [24, 28, 31]. fers both robust authentication as well as anonymity in MANET using digital signature. Sekaran and Parasura- However, all the existing secure routing protocols suffer man [23] have used conventional cryptographic approach from problems that really don't assist in proper identifi- in order to secure the routing protocol. Usage of network cation [11]. code for supporting a cryptographic scheme is seen in the At present there are also various techniques based on work of Zhang et al. [18] for enhancing the confidentiality. trust and reputation [27] meant for checking the security Shakshuki et al. [10] have presented a unique mechanism validity of the next node. Unfortunately, all these tech- of intrusion detection system on the basis of the acknowl- niques have not offered any evidence that their outcome in edge in the control message. the form of identification process is reliable or not. Hence, Liu et al. [15] have enhanced the reliability by pre- existing process doesn't offer any form of standardized senting a clustering scheme for assisting in revocation validity that the outcome generated by security protocol of certificate in MANET. Lv and Li [16] have imple- should be believed as universal standard. This is a serious mented a mechanism for securing group-based communi- problem as it doesn't lead us to find the distinct differ- cation system in MANET. Study towards trust effective- ence between different types of mobile nodes in MANET. ness is emphasized by Zhao et al. [34] considering the pat- Therefore, if there is any malicious node pretending to be terns of cyclic movements using stochastic approach and normal node existing within simulation that it may lead to Bellmam-Ford algorithm. Zhao et al. [35] have presented collateral damage. Therefore, the proposed system offers a mechanism for identifying the extent of risk involved a framework that applies the potential of decision making in capturing the response message in MANET. Chen and approach for strategy building in order to investigate the Wu [4] have designed a secure protocol for safeguarding pattern of malicious communication behavior of mobile the anonymity process during routing using hash func- nodes. tion. The outcome of the study is meant to be used for both El-Defrawy and Tsudik [6] have also focused on privacy intrusion detection system as well as intrusion prevention preservation using group signature for resisting suspicious system. The study uses multiple parameters of probabil- node to take part in routing process. Dhurandharet al. [5] ity to find the level of authenticity of the mobile nodes have implemented a scheme for incorporating robust secu- present within the network. The proposed study is essen- rity while routing among the networks of friendly nodes. tially meant for adopting a communication strategy based Study towards optimal secrecy was carried out by Liang on the environmental condition. Section 1.1 discusses et al. [13] towards ensuring enhanced throughput in com- about the existing literatures where different techniques munication process. Xu et al. [29] have presented a tech- are discussed for secure routing protocols in MANET fol- nique that performs execution of trust from kernel level. lowed by discussion of research problems in Section 1.2 Shen and Zhao [25] have also emphasized on incorporat- and proposed solution in Section 1.3. Section 2 discusses ing a technique to maintain anonymity towards positional about algorithm implementation followed by discussion information during the routing process in MANET. of result analysis in Section 3. Finally, the conclusive re- Hence, it can be seen that there are various techniques marks are provided in Section 4. that has been evolved since last decade for securing the routing process in MANET. All the techniques play differ- 2 Background ent level of roles to address security problems as well as all of them are implemented towards routing security itself. This section presents the brief highlights of the existing Each one of the protocol has its own advantages in form research-based approaches towards securing the commu- of security strength. The next section briefly discusses nication in MANET. Cao et al. [3] have presented a frame- about the problems explored from the existing system. work that evaluates the capacity of the secrecy along with the delay factor in MANET using empirical-based ap- proach. Anand et al. [2] introduced a scheme that in- 3 Research Problem vestigates the misbehavior of the node using dynamic ap- proach of partially retaining the malicious information. The significant research problems are: Existing solutions

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us