Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

Embed Size (px)

Citation preview

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    1/6

    CS

    CInternational Journal of Computer Networks and Communications Security

    VOL.1, NO.6, NOVEMBER 2013, 210215

    Available online at: www.ijcncs.orgISSN 2308-9830

    Mitigating the effect of malicious node in Mobile Ad Hoc

    Networks using Trust based Explicit No Technique

    Dr. M.Hassan Islam1, Misbah Zareen

    2

    1, 2 Center of Advance Studies in Engineering, Department of Computer Engineering, U.E.T Taxila Pakistan

    E-mail: [email protected], [email protected]

    ABSTRACT

    Mobile Ad Hoc Networks (MANETS) are vulnerable to malicious node attacks because they spoil the

    integrity of network by consuming network resources, dropping packets and false routing. Routing

    misbehavior can be avoided by following trusted path for data transmission. Existing Trust based

    mechanisms for secure routing increase overhead and complexity w.r.t processing and architecture. We

    compare multiple trust based secure routing techniques. The primary focus of this paper is to present an ad-

    on technique named Explicit No with reduced complexity, for evaluating trust worthiness of a

    neighboring node. This scheme helps in mitigating the effect of malicious nodes by correct identification.

    Results are presented through simulation in NS2.

    Keywords:MANETS, Trust, Malicious nodes, AODV, Network Simulator (NS2), Security.

    1 INTRODUCTIONIn MANETS, the core concept is informationsharing, dissemination and collaboration among

    routing devices [7]. Node cooperation is mandatory

    for proper functioning of MANETS and this can be

    compromised by black sheep. To mitigate the effect

    of malicious misbehavior of nodes, we introduce a

    trust based secure routing scheme that helps in

    evaluation of node trustworthiness using a special

    packet called Explicit No. We have studied the

    existing ad on techniques and have compared their

    performance with our proposed algorithm. Results

    show that Explicit No technique is convergent,

    less complex with simple design and more reliable

    for calculating the trust value of neighboring nodes.

    2 TRUST MANAGEMENT SCHEMES2.1 Confident

    It is a reputation based dynamic and weighted

    transitive trust management system based on DSR

    protocol. Trust in this mechanism is established

    through direct and indirect observations [2].

    2.1.1 ArchitectureCONFIDANT consists of four major compon-

    ents:

    Monitor: Observes behavior of neighboring

    nodes by observing transmission and identifies

    misbehavior.

    Reputation Manager: This component maintains

    a table that has rating for nodes which is updated as

    per nodes own experience and reported experience.

    Path Manager: It deals with path re-ranking, path

    deletion, action on malicious node request and

    action on request for a route containing malicious

    node.

    Trust Manager: It deals with trust table

    management, trust level calculations, alarms

    generated by nodes on observation of a maliciousactivity.

    2.1.2 DescriptionWhen a malicious activity is observed by any

    node, this suspicious event is detected by monitor

    and Reputation System is called in turn. Reputation

    System checks the significance of the event and

    number of occurrences of events and update rating

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    2/6

    211

    Dr. M. Islam and M.Zareen / International Journal of Computer Networks and Communications Security, 1 (6), November 2013

    of nodes accordingly. In case of intolerable rating,

    Path Manager is called for deletion of all routes

    entries containing this malicious node and an Alarm

    is send to Monitor. Monitor passes this alarm to

    Trust manager and it evaluates trust of the node due

    to which the alarm has been generated. If the source

    of the alarm is trusted one, the alarm table is

    updated. In case, the source of alarm is malicious,

    the Reputation System is called which again

    evaluate the alarm [8].

    2.1.3 Performance Analysis Throughput increases because of decrease

    in number of drop packets.

    Overhead due to Alarms increases if the

    numberof malicious node increases.

    Malicious behavior is an exception andfalse praise attack is not possible because of sharing

    negative information.

    A malicious node when see negative

    information about itself can change its strategy and

    node of good reputation may stop sharing negative

    information because of the fear of revenge.

    Malicious node that is excluded from the

    network may reenter the network after timeout.

    CONFIDANT treats faulty and malicious

    node in same way.

    This scheme not only detects the

    misbehaving nodes but also refrain malicious nodes

    from getting benefits from other cooperating nodes.

    2.2 Watchdog PathraterWatchdog Pathrater is a dynamic trust manage-

    ment scheme which is an extension of DSR

    protocol.

    2.2.1 ArchitectureWatchdog Pathrater consists of two

    components:Watchdog: In promiscuous mode, it

    listens and monitors that the next node forward

    packets.

    Pathrater: Pathrater is used to delete the

    misbehaving nodes, to create new paths, avoid

    usage of misbehaving nodes and select a reliable

    path for data delivery.

    2.2.2 DescriptionWD runs on every node in the network and all

    nodes in the network are in promiscuous mode i.e.

    they can hear the transmission from other nodes.

    When a node forwards a packet to neighboring

    node, WD monitors this forwarding. If neighbor

    node does not forward the packet to next node or

    fails to do so, it is detected as a mischievous node

    and gets reported to Pathrater. WD maintains a

    buffer for storing recently sent packets [1]. The

    buffer packet is then matched with the overheard

    packet. If the packet is matched then no failure is

    detected and the buffered packet is removed.

    However, if a mismatch is detected or the packet is

    not overheard within timeout then failure is

    incremented for the node and when the failure

    exceeds the threshold then the node is marked as

    misbehaving. The source of the packet is informed

    about this misbehaving node

    2.2.3 Performance Analysis More than one node in collusion can

    circumvent the WD. For example, a node Bforwards a packet to node C but node B does not

    informs A if C drops the packet.

    WD does not know regarding the collision

    occurs at the receiver of the packet. This collision

    can either be by chance or due to malicious act of

    the node.

    Malicious node can drop fewer packets

    that can be lower than the threshold of the WD

    2.3 CoreCORE is a dynamic reputation based distributed

    scheme based on DSR protocol [5] and enforcesnode cooperation based on Collaborative monitor-

    ing technique [3].

    2.3.1 ArchitectureCORE has three major components:

    Network Entity: The Network entity corresponds

    to a mobile node. Entity that request the execution

    of a particular function is called a Requester and

    entity that executes that particular requested

    function is called a Provider.

    Reputation Table: The Reputation Table has

    entries for nodes that correspond to Subjective

    Reputation, Unique Identifier for the network

    entity, Collection of Indirect Reputation and

    Reputation value evaluated for each function.

    Watchdog Mechanism: The WD mechanism

    detects the misbehaving network entities, examines

    the correct execution of the requested function and

    updates the reputation value accordingly.

    2.3.2 DescriptionIn CORE nodes operate in promiscuous mode

    and are required to contribute in network activities

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    3/6

    212

    Dr. M. Islam and M.Zareen / International Journal of Computer Networks and Communications Security, 1 (6), November 2013

    in order to remain trusted and to maintain their

    reputation. If the node does not participate in

    network activates or remain idle for a specific time

    then its reputation degrades. If a provider does not

    cooperate in network activities then it leads to

    exclusion. Requestor requires the provider for

    execution of a particular function activates WD for

    the corresponding function and waits for outcome

    from WD. Reputation value for provider is updated

    accordingly as per outcome of WD scenarios when

    no misbehavior is detected, misbehavior is detected

    and a request by misbehaving entity is made.

    2.3.3 Performance Analysis CORE handles misbehaving nodes, DOS

    attacks and propagation of fake/negative informat-

    ion.

    Only positive information is shared withother nodes.

    There is no fear of revenge by sharing

    positive information instead of negative

    information.

    CORE uses functional reputation. A

    network work entity is considered for execution of

    a particular function if its reputation value is above

    a certain threshold else it is ignored.

    CORE does not exclude malicious node

    from network if the node is well reputed in a

    function.

    CORE is generic mechanism that can be

    integrated with network and application layer

    functions.

    3 FINDINGS1. CONFIDANT, Watchdog Pathrater and

    CORE have complex architectures. Every

    node in MANETS should have the respective

    components in order to avail the benefits of

    corresponding techniques.

    2. Processing overhead increases because ofcomplicated architecture.

    3. Node energy keep on wasting whilemonitoring the immoral behavior of network

    entities.

    4. More computation power is required bydevices for trust computation of neighboring

    nodes [4].

    5. All these schemes are divergent i.e.Takeforwarding behavior of source node to

    evaluate the trust of neighboring node.

    In the realm of above findings we have proposed

    Explicit No scheme that address all aforementioned

    concerns with reduced complexity, efficient

    processing and energy saving.

    4 CPROPOSED SCHEME EXPLICIT NOMalicious nodes always have intensions for

    grabbing network resources by dropping packets,

    causing DOS attacks and by sending packets to

    wrong destination [6]. In Explicit No technique,

    node itself informs the source node about its

    unavailability by sending intimation through an

    EXPLICIT NO packet. We have implemented thisad-on on AODV protocol.

    4.1 DescriptionIn AODV, broadcasted RREQ packet is received

    by all neighboring nodes. If any neighboring node

    is not available for some reason like link broken,

    low battery or congestion then it will send an

    Explicit No packet to originating node with a flag

    raise for unavailability and estimated time for

    which the node is not available. On receiving the

    Explicit No packet, source node marks the entry as

    idle against the respective node till the time of

    unavailability. It Source node then increments thetrust value of respective node that sends Explicit

    No reply. This is because, that node is behaving fair

    enough as it itself informs about its inadequacy.

    Malicious node will never send back Explicit No

    as it is always interested in receiving packets for

    devastating network operations. Source node will

    select any other alternate route for transmitting data

    to destination.

    Fig.1. Explicit No scenario

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    4/6

    213

    Dr. M. Islam and M.Zareen / International Journal of Computer Networks and Communications Security, 1 (6), November 2013

    Fig.2. Explicit No algorithm

    5 SIMULATIONTable 1: Configuration Parameters

    Method Value

    Simulator NS-2.35

    Network Area 1500 *500

    Channel Type WirelessChannel

    Propagation Model TwoRayGround

    Radio Range 3.65E-10

    Duration 5sec

    MAC Layer 802.11

    Max packet in ifq 50

    Number of nodes 50

    Routing Protocol AODV

    Antenna Model Omni Directional

    Transmission Range 0.2818

    Traffic Source UDP/CBR

    Fig.3. Simulation Topology for MANETS with 50 nodes

    Fig.4. Delay increases in start as there is overhead in

    transmitting through alternate route.

    Fig.5. Packet loss is less when transmission takes place

    through a trusted node.

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    5/6

    214

    Dr. M. Islam and M.Zareen / International Journal of Computer Networks and Communications Security, 1 (6), November 2013

    Fig.6. Throughput increases as trusted node forwardsmaximum packets

    Table 2: Comparison of Trust Management Schemes for Secure Routing

    6 COMPARATIVE ANALYSIS

    Fig. 7. Comparative Analysis of AODV and AODV withExplicit NO

    Table 3: Throughput, PD Ratio and Number ofDropped packets for AODV and AODV with Explicit NO

    Fig. 8. Comparison of number of routing packets forAODV and AODV with Explicit NO

    7 OBSERVATIONS AND RESULTS1. Explicit No scheme has less simple

    architecture. No complex components

    are required in architecture.

    2. Nodes need not to be engaged inmonitoring the misbehavior of malicious

    nodes hence node energy is conserved.

  • 8/12/2019 Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique

    6/6

    215

    Dr. M. Islam and M.Zareen / International Journal of Computer Networks and Communications Security, 1 (6), November 2013

    3. Trustworthiness for node sendingExplicit No increases with more

    reliability.

    4. Computation overhead reduces inproportion to the Explicit No packets

    received.

    5. Bandwidth is utilized efficiently becauseno bandwidth will be consumed on the

    route that has unavailable node.

    6. Explicit No is convergent technique as itconverges towards source node.

    Neighboring node themselves give

    intimation of being unavailable.

    7. Node availability decreases though thenode is trustworthy enough but as it is

    not available for specific period of time

    hence its overall credibility will be

    reduced.

    8. Overall network availability gets reducedand is directly proportion to the number

    of nodes sending Explicit No packets for

    specified time interval.

    9. Due to congestion, delay, long hopsthroughput can vary depending on the

    status of the selected alternate route.

    8 CONCLUSIONTrust Management in MANET is an existing field

    of research as trust is a multidimensional concept.

    There is no standard protocol or technique for

    calculating the Trust on network entities in

    MANET. In MANET trust based decisions are

    challenging tasks due to constraints in the form of

    dynamicity that include varying topology, node

    mobility, channel conditions along with resource

    constraints of memory, battery and processing

    power and bandwidth.Our proposed scheme Explicit No is robust w.r.t

    architecture, helps to evaluate trust with less

    complexity and saves power in terms of sensing

    malicious activities and misbehaving network

    entities. However, it offers overhead in terms of

    network and node availability.

    Most of the schemes are based on AODV and

    DSR protocols and Trust Management for secure

    routing is in its incubation phase. Interoperability

    among different trust management systems need to

    be addressed. Gathering information from remote

    nodes other than neighboring nodes can improve

    trust evaluation. Robust schemes need to be

    developed for motivating nodes to share trust

    values honestly.

    9 REFERENCES[1] S.Marti, T. Guiuli, K. Lai and M. Baker,

    Mitigating Routing Misbehavior in Mobile

    Ad Hoc Networks, Proc. 6th Annual

    ACM/IEEE Mobile Computing and

    Networking, Boston, MA, Aug.2000, pp.255-

    265

    [2] S. buchegger and J. Y. Le Boudec,Performance Analysis of the CONFIDANT

    Protocol: Cooperation Of Nodes-Fairness In

    Dynamic Ad-hoc Networks, Proc. 3rdIEEE/ACM Symposium on Mobile Ad Hoc

    Networking and Computing, Lausanne, CH, 9-11 June 2002, pp.226-236

    [3] P. Michiardi and R. Molva, CORE: ACollaborative Reputation Mechanism to

    Enforce Node Cooperation in Mobile Ad Hoc

    Networks, The 6th IFIP Conf. on Security

    Communications, and Multimedia, Porotoz,

    Slovenia, 2002.

    [4] K. Govindan and P. Mohapatra, TrustComputations and Trust Dynamics in Mobile

    Adhoc Networks: A Survey, IEEE

    Communications Surveys and Tutorials, 2012,

    pp.279-298

    [5] D.B.Jhonson and D.A.Maltz, Dynamic SourceRouting in Ad Hoc Wireless Networks,Mobile Computing, Kluwer Academic

    Publishers, vol.353, pp. 153-181, 1996

    [6] Y. Hu and A. Perrig, A Survey of SecureWireless Ad Hoc Routing, IEEE Security and

    Privacy, vol.2, no. 3, pp. 28-39, May 2004

    [7] Jin-Hee Cho, Anathram Swami, Ing-Ray Chen,A Survey on Trust Management for Mobile

    Ad Hoc Networks, IEEE Communications

    Survey & Tutorials, vol. 13, No. 4, Fourth

    Quarter 2011

    [8] Patroklos G. Argyroudis and DonalOMahony,Secure Routing for Mobile Adhoc Networks,IEEE Communications Surveys, vol.7, No. 4