04-05-2011, 11:02 AM
A Novel method for Detection and Elimination of Modification Attack and TTL attack in NTP based routing algorithm
Abstract:
An ad-hoc network is a multi-hop wireless network whereall nodes cooperatively maintain network connectivity without acentralized infrastructure. If these nodes change their positionsdynamically, it is called a mobile ad-hoc network (MANET). Sincethe network topology changes frequently, efficient adaptive routingprotocols such as AODV, DSR, and NTP are used. As the networkis wireless, security becomes the major issue in Mobile Ad hocNetworks. Some of the attacks such as modification, fabrication,impersonation and denial of service attacks are due to misbehaviorof malicious nodes, which disrupts the transmission. To avoid suchattacks some of cryptographic algorithms and key managementschemes are used. There are some existing security protocols suchas ARAN, SAODV and SEAD etc and will be compared with theproposed algorithm. In this paper, new key management scheme isimplemented in NTP protocol, since Node Transition Probability(NTP) based algorithm provides maximum utilization of bandwidthduring heavy traffic with less overhead. NTP determines stableroutes using received power, but the packet delivery cannot beguaranteed since it is a non secured protocol. The proposal detectsthe modification, impersonation attacks and TTL attacks and,avoids the effects of malicious node and determines appropriatemeasures to discard such malicious nodes in dynamic condition.
Keywords: malicious, modification attack, NTP, security,cryptography
I. INTRODUCTION
Wireless communication enables information transferamong a network of disconnected, and often mobile, users.Popular wireless networks such as mobile phone networksand wireless LANs are traditionally infrastructure-based, i.e.base stations, access points and servers are deployed beforethe network can be used. In contrast, ad hoc networks aredynamically formed amongst a group of wireless users andrequire no existing infrastructure or pre-configuration.Mobile nodes within each other's radio range, communicatedirectly via wireless links, while those that are far apart relyon other nodes to relay messages as routers. A mobile ad-hocnetwork can also be used to provide crisis managementservices applications, such as in disaster recovery, where theentire communication infrastructure is destroyed andresorting communication quickly is crucial. Ad hoc networkscan also plays a role in tele-geoprocessing applications(combination of geographical information system and globalpositioning system), tele medicine, military operations etc.
A. SECURITY CONSIDERATION IN AD HOCNETWORK
In general, any wireless networks are highly vulnerable tosecurity attacks and dealing with this is one of the mainchallenges of developers of these networks today. The mainreasons for this difficulty are;shared broadcast radio channelinsecure operating environmentlack of central authoritylack of association among nodeslimited availability of resources andphysical vulnerabilitySeveral popular ad hoc routing protocols are addressed tomany different types of attacks, such as modification,impersonation, and fabrication etc. [5-6]. In addition,several attacks are possible like Data packets can bedropped, replayed, or redirected.Generally, when considering the security of a network, inthis paper, it is examined under the headings such asavailability, confidentiality, authentication, integrity andnon-repudiation.
Availability refers to the fact that the network must remainoperational at all times despite denial of service attacks (Inthis paper the keys that are generated are not handled byany central authority, instead the source itself acts as thecentral authority and hence keys are available wheneverrequired. The source will generate the keys initially forwhichever node acts as the destination and source.
Confidentiality ensures that certain information is neverdisclosed to certain users. Authentication is the ability of anode to identify the node with which it is communicating (Inthis paper the problem of impersonation attack can beovercome by the new method of key generation SNTP.Thus, this authentication method provides solution foranother attack such as “Impersonation attack” therebyauthenticating the source and the destination.
Integrity guarantees that a message is never corruptedwhen transferred (The modification of data is overcome bythe MDE method discussed in the paper section 2.2 therebyovercoming the problem of modification attack.
Non-repudiation states that the sender of the messagecannot deny having sent it
Download full report
http://ieeexplore.ieeeiel5/5406659/54158...er=5415901