other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forw
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 265- 269
International Journal of Research in Information Technology (IJRIT) www.ijrit.com
ISSN 2001-5569
Controlling Data Drop using Hybrid Track method in MANET R Vijayakumar#1, M Sangeetha*2 #
*
Research scholar, Department of Computer Science and Engineering, Muthayammal Engineering College, Namakkal Assistant Professor, Department of Computer Science and Engineering, Muthayammal Engineering College, Namakkal 1
2
[email protected] [email protected]
Abstract- MANET is a self configuring network that formed automatically by a collection of mobile nodes. There is no need of any fixed infrastructure or centralized management. Watchdog and EAACK is the techniques that can be used to identify the misbehavior of intermediate nodes in MANETs. But these existing techniques contain the main issue called data dropping. So we proposed a new method called Hybrid track method that controls and solves the data dropping problem. Keywords- Mobile Ad Hoc Network, Watchdog, EAACK, Digital Signature, AODV.
1.
INTRODUCTION
MANET Stands for "Mobile Ad Hoc Network” and it is one type of ad-hoc network that can change the locations and configure itself. MANETs are mobile devices; they can use different wireless connections to connect in different types of networks. Host of the networks are moved frequently, and the topology is also change randomly. No need of any cellular infrastructure. All nodes in wireless links are transfer data using single hop or multihop networks.
R Vijayakumar, IJRIT
265
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 265- 269
Fig 1: Mobile Ad hoc Networks (MANETs) Data must be routed using any one of this network via intermediate nodes. Recently, the introduction of new technologies such as the IEEE 802.11, Bluetooth and HyperLAN are helping to commercial MANET deployments outside of the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET [1]. Advantages of MANET - MANETs does not need any backbone infrastructure support. - Easy to develop and maintain. - Very useful when infrastructure is absent and destroyed. 2.
EXISTING SYSTEM In this section, we mainly illustrate two existing techniques called, Watchdog and EAACK.
2.1. Watchdog The Watchdog is basically point-to-point acknowledgement scheme. Watchdog used to increase the throughput of the network. This contains the failure counter and pathrater. These two parts are very important to handle misbehavior nodes. Sender can send data packet to destination means destination wants to send back acknowledgement to source node. Source node cannot get acknowledgement within certain period of time it will reported as misbehaving and increase the failure counter. Next the pathrater can find another route by using reliable data [2]. Watchdog cannot detect misbehavior nodes in the following situation: Receiver collision, Limited transmission power, false misbehavior report, and Partial dropping. 2.2. EAACK The MANET uses the EAACK [3] technique for handling three of the previous four failures of watchdog. And also provide high performance of the network. This uses four schemes to handle the failures. The schemes are summaries below. ACK ACK is essentially an End-to-End Acknowledgement scheme rather than watchdog. So the intermediate nodes cannot get other packets from any other nodes at the same time. So receiver collision cannot be occurs. In ACK, the source node first sends out data packet to destination node. If destination is successfully receives packet, it required to send back an Acknowledgement to source node. Within the certain period of time, if source node receives Acknowledgement means transmission is successful. Otherwise source node will connected to S-ACK to detect misbehavior nodes in the route. Secure-ACK In Secure-ACK (S-ACK) scheme, at a time either data packet or acknowledgement packet only will be send, so limited transmission power will be managed. For every three successive nodes in the route, the third node is required to send an acknowledgement packet to first node. The first node doesn’t receive acknowledgement packet within predefined time period both second and third nodes are reported as malicious then it is switched to MRA scheme.
R Vijayakumar, IJRIT
266
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 265- 269
Misbehavior Report Authentication Source node is starts to find out alternative routes to destination i.e. third node and send the data packet. This third node is send back acknowledgement means; the second node is misbehavior otherwise third node conclude as misbehaving. This can also identify the false misbehavior report. Digital Signature Digital signature is important to ensure that all packets in EAACK are authenticated. In case any malicious attackers get the data packet, it is impossible to access them. This uses the Digital Signature Algorithm (DSA) [4] for encryption and decryption. 3.
PROBLEM STATEMENT
Fig 2: Data Dropping - Occurs due to CPU overloaded, Software fault, network error, low bandwidth, etc. In this section we see the discussion of the partial data dropping problem. Using DSA algorithm in Digital Signature causes two types of problems. There are, network overhead and packet dropping. The packet dropping is always the major threat to the security in MANETs. Since there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. 4.
PROPOSED SYSTEM
We proposed a new hybrid track method called Hybrid cryptosystems for handling the network overhead and data dropping. This method of cryptosystem can be works in the following steps. Step 1: Given a message M
R Vijayakumar, IJRIT
267
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 265- 269
Step 2: Choose a key K, at random Step 3: Encrypt K with the recipient’s public key Step 4: Encrypt M with K Step 5: Send to recipient
The hybrid track method can use the following encryption formula:
Encrypt (K, Apublic)
Encrypt (M, K)
This method is work as follows. First we find out the route based on AODV (Ad hoc On-demand Distance Vector routing protocol) protocol concept [5]. Source node send route request (RREQ) to destination and get route reply (RREP) from destination node. Then encrypt the data packet using hybrid cryptosystems [6] and send to the appropriate destination node. Finally get back the acknowledgement from that destination. Recipient decrypts first part of the message with his/her private key to learn K. This hybrid track method is used to reduce the network overhead and data dropping. This also having main advantages like, doesn’t require any shared secrets, and good for bulk encryption.
5.
CONCLUSION
The main issue of the MANETs is data dropping. This partial data dropping is can be managed by using hybrid track method and it uses the AODV protocol for fast response rather than DSR protocol. This Hybrid track method can only reduce the data dropping not fully avoided. In future, we research new and better algorithm for fully solves the data dropping problem.
6.
ACKNOWLEDGEMENT
I, Vijayakumar R (
[email protected]) acknowledged that this work has been done as a part of my thesis (project) work in M.E., CSE from Muthayammal Engineering College, Tamilnadu, India and it is supported by my guide Ms. M. Sangeetha, Asst. Prof, Muthayammal Engineering College, Tamilnadu, India. 7. REFERENCES [1] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks – 1, pp. 13–64, 2003. [2] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265. [3] Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami “EAACK—A Secure Intrusion-Detection System for MANETs,” Transactions on Industrial Electronics, vol.60, no.3 pp. 1089– 1098, 2013.
R Vijayakumar, IJRIT
268
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 265- 269
[4] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS). [5] Perkins CE and Royer EM, “Ad-hoc on-demand distance vector routing,” Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications, February 1999. [6] William Stallings, ―Cryptography and Network Securityǁ, Fourth Edition, June 3, 2010.
R Vijayakumar, IJRIT
269