Upload
kishan-patel
View
111
Download
0
Tags:
Embed Size (px)
Citation preview
Avoiding Packet Dropping Misbehavior in VANET Using Trust
Based Ant Colony Optimization
Prepared By:
Kishan N. Patel
CSE and IT Department
SVMIT, Bharuch
Kishan Patel M.E (I.T) En no - 130450723011 2
OUTLINES Introduction of VANET Security in VANET Security Trust Metaheuristic Approach Why Metaheuristic ? Ant Colony Optimization Literature Survey Problems Trust Based ACO Conclusion and Future work References
Kishan Patel M.E (I.T) En no - 130450723011 3
INTRODUCTION OF VANET
Vehicular ad hoc network (VANET) [1] uses cars as mobile nodes in a MANET to create a mobile network.
Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).
Fig 1. Vehicular Ad hoc network [1] Cars fall out of the signal range and drop out of the network, other cars can join, by connecting
vehicles to one another form a wireless network called “Vehicular Ad Hoc Network”.
Kishan Patel M.E (I.T) En no - 130450723011 4
SECURITY IN VANET
The nature of VANETs could lead to malicious attacks.o Predictable movement of nodes.
Adversaries could break the system.o Data sinkholes (black hole).o Gray hole
Security measures must be taken to avoid malicious attacks on the system
Kishan Patel M.E (I.T) En no - 130450723011 5
ADVANTAGES AND DISADVANTAGESAdvantages Public Safety Traveller Information Support Air pollution emission measurement and reduction.
Disadvantages Wasted band width Increasing network congestion
6
SECURITY The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).”
7
CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
ConfidentialityPreserving the confidentiality of information means preventing unauthorized parties from accessing the information or perhaps even being aware of the existence of the information. I.e., secrecy.
IntegrityMaintaining the integrity of information means that only authorized parties can manipulate the information and do so only in authorized ways.
AvailabilityResources are available if they are accessible by authorized parties on all appropriate occasions.
Kishan Patel M.E (I.T) En no - 130450723011 8
PACKET DROPPING ATTACK
Packet dropping attacks are widespread DoS attacks on Ad hoc networks.
Fig 3. Packet dropper behavior [3] Packet dropper AODV or Packet dropping attack is the AODV under malicious attack. As shown in Figure 4 behavior of the attacker M that drops the packets sent by source A
towards destination C.
9
WHAT IS TRUST?
Trust is a particular level of the subjective prob. with which an agent will perform a
particular action, before [we] can monitor such action and in a context in which it
affects [our] own action.
Trust is context-dependent, dynamic & non-monotonic.
Types of Trust
Interpersonal (agent & context specific)
Structural (system within which trust exists)
Dispositional (independent of agent & context)
10
TWO TYPES OF MODELS
Trust Management models
◦ Certificate-based
◦ Reputation-based (behavior observed directly or indirectly)
◦ Recommendations: trust information shared among peers
11
TRUST MANAGEMENT APPROACHES
Individual Initiative
Each agent is responsible for his own fate. Global Trust
Each peer in the system has a unique global trust value that other peers can access. Federated Trust
Management of trust-related activities across multiple and heterogeneous security domains and autonomous systems.
Deals with strategies for managing inter-domain behaviors
Kishan Patel M.E (I.T) En no - 130450723011 12
METAHEURISTIC APPROACH Heuristic [2] means to find or to discover by trial and error. And meta means higher
level and metaheuristics generally perform better than simple heuristics.
There are two techniques:
1. Online metaheuristic approach
2.Offline metaheuristic approach.
The main difference between them is the moment when they are applied for solving
problem.
Metaheuristic Algorithms
1) Ant colony optimization (ACO)
2) Tabu search (TS)
3) Variable neighborhood search (VNS).
Kishan Patel M.E (I.T) En no - 130450723011 13
WHY METAHEURISTIC REQUIRED ? Metaheuristics [2] are used for solving the security and routing problems in ad hoc
networks.
Security problem in the network may be due to selfish and malicious node.
Metaheuristic approach can be used for overcoming the problem.
For route optimization e.g selecting the shortest and quality route from source to
destination.
Kishan Patel M.E (I.T) En no - 130450723011 14
ANT COLONY OPTIMIZATION The inspiring source of ACO [3] is the foraging behavior of real ants. This behavior enables ants to find shortest paths between food sources and their nest. While walking from food sources to the nest and vice versa, ants deposit a substance
called pheromone on the ground.
Fig 2. Ant Mechanism [3] Once an ant has built a solution, it can retrace the same path backward and update the
pheromone trails of the used component .
Kishan Patel M.E (I.T) En no - 130450723011 15
LITERATURE SURVEY
Kishan Patel M.E (I.T) En no - 130450723011 16
Title Mechanism / Algorithm Purpose Methodology
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks.[4]
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm
To avoid trust value propagation. To minimize the number of messages been exchanged. To find the best route for delivery.
Trust value of each node is directly aped to the route and no need to propagate the trust values like other trusted protocols.
Trust Based QOS Protocol(TBQP) using Metaheuristic Genetic Algorithm for Optimizing and Securing MANET. [5]
Trust Based QOS Protocol (TBQP) Using Meta-heuristic Genetic Algorithm.
To provide QOS by selecting the fittest shortest route among the number of routes to provide optimization. Acquaintance And Authentication of packets for routing in network.
Intriguing a trust based packet delivering scheme for detecting and isolating the malignant nodes using the routing layer information. A trust weigh is maintained and a node is remunerated by decreasing or increasing the trust weigh value. If the trust weigh falls below a trust threshold, node is marked as malicious node.
Performance analysis of optimized Trust AODV using ant Algorithms. [6]
Ant colony optimization To sustain security against the dos attacks.
At agents can move freely to find destination it will update positive pheromone to the routing table. The pheromone is deposited if node is trusted.
Table 1. Survey of various Metaheuristics
Kishan Patel M.E (I.T) En no - 130450723011 17
Title Mechanism / Algorithm Purpose Methodology
Ant Colony and Load Balancing Optimizations for AODV Routing Protocol. [7]
Multi-Route AODV Ant routing (MRAA)Load balancing( LBMRAA)
To reducethe routing overhead, buffer overflow, end-to-end delay andincrease the performance
Data packets are balancedover discovered paths and energy consumption is distributed across many nodes through network.
Secure Ant-Based Routing Protocol for Wireless Sensor Network. [8]
Secure Ant-Based Routing Protocol(SARP)
To provide Route security in network.
It uses two paths for data forwarding to overcome the problem of node failure and to increase the efficiency of overall network.
MANET link Performance using Ant Colony Optimization and Particle Swarm OptimizationAlgorithms. [9]
Ant colony optimization and Particle swarm optimization.
Finds the best solution over the particle’s position and velocity with the cost and minimum. End-to-end delay.
Ant Colony Optimization(ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network and PSO finds the best solution over the particle’s position and velocity with the objective of cost and minimum End-to-end delay.
AntTrust: A Novel Ant Routing Protocol forWireless Ad-hoc Network Based on Trust Between Nodes. [10]
Ant Trust Routing Protocol To increase the security of route. And malicious manipulationsof data packets.
AntTrust is located precisely in the context of the security of routing. It also facilitates malicious manipulations of data packets.
[11] [12] [13] [14] ….
Kishan Patel M.E (I.T) En no - 130450723011 18
PROBLEMS IN NETWORK
Due to the openness in network topology and absence of a centralized administration in management, they are vulnerable to various attacks from malicious nodes.
The networks work well only if the nodes are trusty and behave cooperatively. Some other problem are:
1) Difficult to evaluate trustworthiness of nodes
2) Security of data transmission
3) Fails to remove malicious nodes during route discovery process and therefore doesn´t succeed to transfer all data packets.
Main Objective of Proposed System :
1) To enhance the security
2) To address the packet dropping misbehavior
3) Distinguish malicious nodes
Kishan Patel M.E (I.T) En no - 130450723011 19
AUXILIARY EXAMPLE
Kishan Patel M.E (I.T) En no - 130450723011 20
ATTACKER MODEL
FD
CB
H
K
A
Sourcenode
DestinationNode
Malicious node
RREQRREQ
RREQ
RREQ
RREQ
RREQ
RREP
RREP
RREP
RREQ RREQ
RREP RREP
C Malicious node
A Source node
K Destination nodePacket Dropping attack model
RREP
RREP
Kishan Patel M.E (I.T) En no - 130450723011 21
TACO-TRUST BASED ANT COLONY OPTIMIZATION
T.V= Trust valueP.V= Pheromone ValueN.T= Neighbor Table
Kishan Patel M.E (I.T) En no - 130450723011 22
[1] Wang, Yu, and Fan Li. "Vehicular ad hoc networks." Guide to wireless ad hoc networks. Springer London, 2009. 503-525.
[2] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.
[3] Kishan Patel, Rutvij Jhaveri, “Isolating Packet Dropping Misbehavior in VANET using Ant Colony Optimization”, International Journal of Computer Applications (IJCA-2015), June 20 2015.
[4] Bahaa-Eldin, Ayman M. "TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks." In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 151-184. Springer Berlin Heidelberg, 2014.
[5] Zafar, Sherin, and M. K. Soni. "Trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET." InOptimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on, pp. 173-177. IEEE, 2014.
REFERENCES
Kishan Patel M.E (I.T) En no - 130450723011 23
[6] Simaremare, Harris, Abdelhafid Abouaissa, Riri Fitri Sari, and Pascal Lorenz. "Performance analysis of optimized trust AODV using ant algorithm." InCommunications (ICC), 2014 IEEE International Conference on, pp. 1843-1848. IEEE, 2014.
[7] Ahmed M. Abd Elmoniem, et al. "Ant Colony and Load Balancing Optimizations for AODV Routing Protocol.
[8] Alrajeh, Nabil Ali, Mohamad Souheil Alabed, and Mohamed Shaaban Elwahiby. "Secure ant-based routing protocol for wireless sensor network." International Journal of Distributed Sensor Networks 2013 (2013).
[9] Nancharaiah, B., and B. Chandra Mohan. "MANET link performance using ant colony optimization and particle swarm optimization algorithms." InCommunications and Signal Processing (ICCSP), 2013 International Conference on, pp. 767-770. IEEE, 2013.
[10] Melchor, Carlos Aguilar, Boussad Ait Salem, Philippe Gaborit, and Karim Tamine. "AntTrust: A novel ant routing protocol for wireless ad-hoc network based on trust between nodes." In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1052-1059. IEEE, 2008.
Kishan Patel M.E (I.T) En no - 130450723011 24
[11] Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques." InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.
[12] Sreelaja, N. K., and G. A. Vijayalakshmi Pai. "Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks." Applied Soft Computing 19 (2014): 68-79.
[13] Sahoo, Rashmi Ranjan, Rameswar Panda, Dhiren Kumar Behera, and Mrinal Kanti Naskar. "A trust based clustering with Ant Colony Routing in VANET." InComputing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-8. IEEE, 2012.
[14] Kaur, Harmandeep, and Ramanjit Singh. "A NOVEL APPROACH TO PREVENT BLACK HOLE ATTACK IN WIRELESS SENSOR NETWORK."
[15] Zhou, Mingxing, and Jing Liu. "A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks." Physical A: Statistical Mechanics and its Applications 410 (2014): 131-143.
[16] Lo, Chi-Chun, Chun-Chieh Huang, and Wen-Tian Liang. "Mitigating Routing Misbehavior Using Ant-Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks." IJCSNS 10, no. 5 (2010): 46.
Kishan Patel M.E (I.T) En no - 130450723011 25
THANK YOU