International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) –A Review Ratul Dey1, Himadri Nath Saha2 1
University of Engineering & Management, Jaipur, Rajasthan – 303807, India 2
Institute of Engineering & Management, Y-12 Electronic Complex Sector-V, Saltlake Kolkata:- 700091
Keywords: Ad-hoc Network, Routing, Security, Attacks, MANET.
like packet forwarding, routing, and network management, in ad-hoc networks those functions are carried out by all available nodes. This is very difficult for the core of the security problems specific to ad-hoc networks. As opposed to dedicated nodes of a classical network, the nodes of an ad hoc network cannot be trusted for the correct execution of critical network functions. In wireless network there is a high demand for security. [3,4] The malleable behavior our wireless routing protocol wireless routing network focused of attack of malicious agent. The remaining paper is organized as follows. Section 2 describes different routing protocol for MANET. Section 3 describes vulnerabilities on routing protocol Section 4 defines different secure routing protocols and finally conclusion.
1. INTRODUCTION
2. DIFFERENT ROUTING PROTOCOL FOR MANET
A mobile ad-hoc network (MANET) consist of a set of mobile hosts that carry out basic networking functions like packet forwarding, routing etc. without the help of an established infrastructure. Nodes of an ad-hoc network rely on one to another in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. Security in MANET is an essential component for basic network functions like packet forwarding and routing [1,2].
In MANET there are different types of routing protocols for routing the packets. Each routing has own rule to packet transfer method. In mobile ad-hoc network in different circumstances different protocol are use, like (1) Proactive Protocol (2) Reactive protocol (3) Hybrid protocol
Abstract:
Mobile Ad-hoc network (MANET) is a self configuring, multi hop wireless network. Security in mobile ADHOC network is a big challenge because there is no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from inside the network and also from the outside. This article surveys classifies the secure routing protocol in MANET, and also discussing presently proposed method of mitigating those attack. In the routing protocol of the MANET while forwarding data packets to other nodes, some intermediate node extract useful information packets and can’t forward the packet to the next node. Some node may modify the content of packets during the data transmission session. So that any one node can manipulate the original data.
MANET Routing Protocol
Proactive Protocol
Reactive protocol
Hybrid protocol
Fig. 2: MANET Routing Protocols
Fig. 1 Mobile ad-hoc network Network operations can be easily threatened if communications are not embedded into basic network functions at the early stages of their design. Routing network using dedicated nodes to support basic functions
Volume 5, Issue 1, January – February 2016
2.1 Proactive Protocol In this routing protocol [4,5] network have unique routing table for send the data packets and want to establish connection to other nodes in the network. This protocol one type of demand-based operation which utilize network order to energy and bandwidth more efficiently. Pattern on a demand basis rather than maintaining routing between all nodes at all time. This is the flip-side of Page 74
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856 demand-based operation. In cases where the additional latency which demand-based operations may be unacceptable, if there are adequate bandwidth and energy resources, proactive operations may be desirable in these situations. [6,7,8]There are different type of proactive protocol like, Destination-Sequenced Distance-Vector (DSDV), Fisheye State Routing (FSR), Source Tree Adaptive Routing (STAR), Optimized Link-State Routing (OLSR), Cluster head gateway switch routing (CGSR), Wireless routing protocol (WRP), Global state routing (GSR). 2.2 Reactive protocol Reactive protocol searches for the route in an on-demand manner and set the link in order to send out and accept the packet from a source node to destination node. [4, 7] Route discovery process is used in on demand routing by flooding the route request (RREQ) packets throughout the network. 2.3 Hybrid protocol It is a one special type protocol that separates the network into several zones, which makes a hierarchical protocol as the protocol ZHLS (zone-based hierarchical link state). [9,10] This protocol which effectively combines the best features of proactive and reactive routing protocol Hybrid routing protocol is based on GPS (Global positioning system), which allows each node to identify its physical position before mapping an area with table to identify it to which it belongs. Reactive protocols obtain the necessary route when it is required, by using route discovery process. In proactive protocols, nodes periodically exchange information to maintain up-to-date routing information. Hybrid routing protocols combine basic properties of both approaches [11,12]. There are different type of Hybrid protocol like, Zone routing protocol (ZRP), Zone-based hierarchical link state routing protocol.
dropping all data packets passing through it as like matter and energy disappear from the path in a black hole. If the attacking node is a connected node of two networks then it totally separated as the two networks. 3.1.2 Cooperative black hole attack This attack is similar to Black-Hole attack, but more than one malicious node tries to disrupt the network at the same time. It is one of the most critical attack and can totally disrupt the operation of an Ad Hoc network[16]. Mostly the only solution becomes finding alternating route to the destination, if at all exists. 3.1.3 Grey-hole attack It too drops data packets, but node’s malicious activity is limited to certain conditions or trigger. Two most common type of behavior [17]. 3.1.3.1 Node dependent attack drops data packets destined towards a certain victim node or coming from certain node, [18] while for other nodes it behaves normally by routing data packets to the destination nodes correctly. 3.1.3.2 Time dependent attack [19] drops data packets based on some predetermined/trigger time while behaving normally during the other instances. 3.1.4 Jellyfish attack In this attack instead of blindly dropping the data packets, it delays them before finally delivering them. It manipulate the order of packets according to they are received and sends it in random order [17,19]. This disrupts the normal flow control mechanism used by nodes for reliable transmission. Jellyfish attack can result in significant end to end delay so there degrading QoS. 3.2 Control Traffic Attack
3. VULNERABILITIES ON ROUTING PROTOCOL Presently there are a wide variety of routing protocols, but these protocols are not secured and face many attacks [13,14], which gives rise to the vulnerability in the network and might highly affect the efficiency of the system. In mobile ad-hoc network any node can affect by the different type of attacks. Mainly in MANET there are two type of attack 1) Data traffic attack. 2) Control traffic attack. In data traffic attack data packets are affected like, Black hole attack, Cooperative Black hole attack, Greyhole attack, Jellyfish attack etc. In control traffic attack control packets are affected, like Worm-hole attack, Hello flood attack, Bogus registration attack, Rushing attack, Sybil attack and Blackmail attack etc. 3.1 Data Traffic Attack: 3.1.1 Black hole attack: In this attack a malicious node acts like a Black hole, [15]
Volume 5, Issue 1, January – February 2016
3.2.1 Wormhole attack If link become the lowest path to the destination then these malicious node always chosen, while sending path to the direction. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality [20]. In the wormhole attack, an attacker records data packet at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack is a serious threat in many ad hoc network routing protocols. The wormhole attack can done by a single node and it connect more than one node as a worm hole link. 3.2.2 Hello flood attack In this attack every node sent their packets towards this node hopping to the better route destination. Node broadcast a single high power transmitter to all it’s Page 75
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856 neighbor [21]. Then attacker node not generate any traffic, so the basis of performance node take the packet and perform as selective replay attack. 3.2.3 Bogus registration In bogus registration attack, attacker distinguish it self as a node and generate wrong information to the neighbor [21,22]. When packet transmitted then disturb the neighbor nodes. 3.2.4 Rushing attack In this mobile ad-hoc network each node before transmitting data first set the path source to destination. Sender node broadcast route request and neighbor node route reply with proper routing information, and again new selected node doing same method [22]. Rushing attack quickly forward with a broadcast massage to the neighbor so, when actual request come neighbor node just discard the request, due to previous request accept. 3.2.5 Sybil attack Sybil attack shows the fake multiple identities, show multiple node in the networks [23]. So one single node can assume as the multiple nodes and can hamper multiple nodes at a time. 3.2.6 Blackmail attack In the blackmail attack attacker nodes accused an innocent node as harmful node [24]. When the routing table try to identify perfect node according to the vote then if attacker node in sufficient number of those MANET it can give the wrong information according to the path.
4. DIFFERENT SECURE ROUTING PROTOCOLS For the secure routing protocol first need proper authentication need to digital signature of each and every authenticated nodes [25,26]. It also need to mutable information of the control packets. It also often complemented with the use of one-way hash functions. Identify wormhole and the tunnel [27,28]. These routing schemes provide authentication services which guard against modification and replaying of routing control messages and uses different cryptographic primitives for providing secure routing. 4.1 Basic Routing Protocols This protocol maintained by the originating node hashing the messages and signing the resulted message digest, which is verified by the recipients of a route request, by computing the hash of a message using the agreed upon hash function [29,30]. The advantage is that the protocol can combat external attacks by checking for the authenticity. The advantage of this protocol is that it extends the ICMP router discovery packet format to include the MAC and IP address of the sender, and
Volume 5, Issue 1, January – February 2016
authentication information that can be used to verify the broadcast beacon [31,32]. But the disadvantage of it is that it requires nodes to have shared secret keys for generating message authentication codes which are used to authenticate the routing control messages and the scheme is based on the assumption that the nodes in the network mutually trust each other and it employs public key cryptography for providing the security services. 4.2 Trust based Routing Protocols Trust is a value that can calculated on the basis of nodes action when it needed. Trust used to prevent from various attacks like wormhole, black-hole, Dos, selfish attack etc. Trust can be implemented in various ways such as by reputation, from opinion of nodes etc. This routing security schemes which fall in this category assign quantitative values to the nodes in the network, based on observed behavior of the nodes in question. The trust values are then used as additional metrics for the routing protocols [33,34]. The advantage is that it is robust against individual attackers and capable of adjusting its scope between local and network wide topology discovery. It can also operate well in networks where the topology and membership is changing very frequently. 4.3 Incentive based Routing Protocols In ad hoc networks, devices have to cooperate. Autonomous devices tend to abstain from cooperation. Incentive schemes have been proposed as a means of fostering cooperation under these circumstances. In order to work effectively, incentive schemes need to be carefully tailored to the characteristics of the cooperation protocol they should support [16,35,36]. These routing schemes implemented using credits that are given to nodes that cooperate and forward packets. In turn network services such as routing is provided only to those nodes that have good credit. If a node at an unfavorable location
may not get enough packets to forward and thus may never be able to get credits to forward its own packets. 4.4 Detection and isolation based secure routing scheme This protocol can detects flooding, black hole, gray hole, wormhole and blackmail attacks. On detection the protocol takes immediate actions to blacklist these nodes from the network, thereby decreasing the number of malicious nodes in a network, hence improving the other QoS parameters [37,38]. This protocol detects and isolates misbehaving nodes in MANET. It is an enhancement of DSR routing and based on selection of selfish and unselfish nodes. The advantage is that the trust and routing calculation process is evaluated by experience, observation and behavior of other nodes, present in the network [39,40]. This protocol can effectively detect selfish nodes and isolate wormhole nodes that drop Page 76
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856 packets.
5. CONCLUSION From extensive studies on existing secure MANET routing protocols, it has been observed that these protocols do not adequately mitigate attacks by misbehaving nodes which not only modify packets but also selectively drop some or all the packets. These misbehaving nodes cause various network communication problems. These studies have finally motivated us to search for an alternative design towards more efficient, secure routing protocols for MANET to be used in adversarial environment.
REFERENCES [1] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields. “A Secure Routing Protocol for Ad Hoc Networks” in proc. of Network Protocols, 2002. Proceedings. 10th IEEE International Conference, November -2002, pp.78-87. [2] H. N. Saha, A. Chattopadhyay and D. Sarkar “Review on intelligent routing in MANET,” in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-6. [3] S. Banerjee, R. Nandi, R. Dey and H. N. Saha, “A review on different Intrusion Detection Systems for MANET and its vulnerabilities, ” in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7. [4] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, “A Review on MANET Routing Protocols and its Vulnerabilities,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),vol. 2, no. 6, pp. 252-262,November 2013. [5] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, “A Review on Attacks and Secure Routing Protocols in Manet, ”International Journal of Innovative Research and Review (JIRR) ,vol.1, no. 2, pp.12-36,December 2013. [6] J. Mandaland H. N. Saha, “Modified Ant Colony Based Routing Algorithm in MANET,” International Journal of Computer & Organization trends (IJCOT),vol..3, no.10, pp.473-477,November2013. [7] S. K. Deb,H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “Modified Dynamic On-Demand Routing Protocol, ”International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 3,no. 2, pp.139-144, March 2014. [8] W. Sarkar, H. N. Saha and A. Ghosh, “A Greedy Methodology to Solve Travelling Salesperson Problem Using Ant Colony Optimization” International Journal of Science and Research (IJSR), Vol. 3 No. 7, July 2014.
Volume 5, Issue 1, January – February 2016
[9] K. Roy and H. N. Saha, “Restricted Hoping Routing Protocol,” in proc. of International Conference on Computer Application (ICCA), December 2010, pp.281-290. [10] K. Chakraborty, A. Sengupta and H. N. Saha, “Energy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach, ”in proc. of International Conference on Computer Science and Information Technology (CCSIT),Springer, vol. 132, Part II, January 2011, pp.215-222. [11] H. N. Saha, D. Bhattacharyya, and P. K. Banerjee, “Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad hoc Network,” International Journal of foundations of computing and decision sciences (FCDS),De Grurter, Vol.40, No. 4, pp.267–298, December 2015. [12] H. N. Saha, R. Singh, D. Bhattacharyya and P. K. Banerjee, “Implementation Of Personal Area Network for Secure Routing in MANET by Using Low Cost Hardware,” Turkish Journal Of Electrical Engineering & Computer Sciences, pp.1-20, 2015. [13] H. N. Saha, D. Bhattacharyya and P. K. Banerjee," Fidelity Index Based On Demand (FBOD) Secure Routing In Mobile Ad hoc Network,” in proc. of International Conference on Parallel Distributed Computing Technologies and Applications(PDCTA),Springer,vol.203,Part-II, September 2011, pp.615-627. [14] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “Fidelity Based On-Demand Secure Routing (FBOD)in Mobile Ad-hoc Networks,” International Journal of Advanced Computer Science and Applications(IJACSA), Special No. on Wireless & Mobile Networks, SAI, pp.19– 25,August 2011. [15] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata,” in proc. of International Conference on Computer Science and Information Technology(CCSIT), Springer,vol.84,part-1, 2012, pp.203-213. [16] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “A Priority Based Protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks,” International Journal for Computer Science and Communication(IJCSC),vol. 1, no.2, pp.299-302, July 2010. [17] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, A. Bhattacharyya , A. Banerjee and D. Bose, “Study of Different Attacks in MANET with its Detection & Mitigation Schemes,” International Journal of Advanced Engineering Technology (IJAET),vol. 3,no. 1, pp.383-389, January 2012. [18] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “A Novel Energy Efficient and Administrator Based Secured Routing MANET,” International Journal of Network Security & Its Applications (IJNSA), vol.4, no.4, AIRCC, pp.73-92,July 2012. Page 77
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856 [19] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “A Novel Multi Point Relay Based Secure Routing in MANET,” International Journal of Network Security & Its Applications (IJNSA), AIRCC , vol. 4, no.6, November 2012, pp.133-144. [20] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “A Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks,” International Journal of Scientific and Engineering Research (IJSER),vol.2, no. 3, pp.101111, March 2011. [21] Arpit Bansal, Navjot Kaur, Sunil Khullar, Dr. R.P.S. Bedi. Performance Analysis of ZHLS-GF Routing Protocol for MANETs through simulations. In Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913. Vol. 5 Dec. 2011. [22] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks using Cellular Automata, ”International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC),vol. 3, no.2,AIRCC, pp.33-49, April 2012. [23] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “Semi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack,” International Journal of Computer Science and Emerging Technologies (IJCSET), vol. 1, no. 4, pp.439-436, December 2010. [24] L. Venkatraman and D. P. Agrawal, “An optimized inter-router authentication scheme for ad hoc networks,”in proc. of the Wireless, 2001, pp.129– 146. [25] D. Bose, A. Banerjee, A. Bhattacharyya, H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “An Efficient Approach to Secure Routing in MANET,” in proc. of Advances in Computing and Information Technology (ACITY), Springer,vol.176, July 2012,pp.765-776. [26] H. N. Saha, D. Bhattacharyya, A. K. Bandhyopadhyay and P. K. Banerjee, “Two-level Secure Re-Routing(TSR) in Mobile Ad Hoc Networks,” in proc. of Advances in Mobile Network, Communication and its Applications (MNCAPPS), IEEE xplore, August 2012, pp.119-122. [27] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “Secure Multipoint Relay Based Secure Routing in MANET,” in proc. Of International Conference on Computer Science, Engineering and Information Technology (CCSEIT), ACM Digital Library , October 2012,pp.63-68. [28] H. N. Saha, B. Banerjee, D. Bhattacharyya, D. Ghosh, R. Singh and S. Mukherjee, “Different Routing Protocols and Their Vulnerabilities and Their Measures,”in proc. of International Conference On Advances In Computer Science And Electronics Engineering (CSEE), Seek Digital Library, March 2014,pp.192-202.
Volume 5, Issue 1, January – February 2016
[29] J. Binkley, et al., “Authenticated ad hoc routing at the link layer for mobile systems,” Wireless Networks,vol.7, no2, pp.139–145, 2001. [30] S. Banerjee, A. Majumdar, H. N. Saha and R. Dey “Modified Ant Colony Optimization (ACO) based routing protocol for MANET,” in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7. [31] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, “Energy Efficient Administrator Based Secured Routing in MANET,” in proc. of International Conference on Computer Science, Engineering & Applications (ICCSEA),vol.167, May2012, pp. 659672. [32] H. N. Saha, R. Singh, D. Bhattacharyya and P. K. Banerjee, “An Administrator and Fidelity Based Secure Routing Protocol in MANET," Journal of Computing and Information Technology (CIT), Accepted. [33] A. Banerjee, D. Bose, A. Bhattacharyya, H. N. Saha and D. Bhattacharyya. “Administrator and Trust Based Secure Routing in MANET,” in proc. of Advances in Mobile Network, Communication and its Applications (MNCAPPS),IEEE Xplore, August 2012,pp.39-45. [34] P. Papadimitratos and Z. J. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks,” in proc. of IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press 27–31, January 2003, pp.379-383. [35] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, "A Novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network,” International Journal of Wireless & Mobile Networks (IJWMN),vol. 3, no. 5,AIRCC, pp.249-264, October 2011. [36] D. Choudhury, D. Kar, K. R. Biswas and H. N. Saha, “Energy efficient routing in mobile ad-hoc networks , ” in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7. [37]H. N. Saha, K. Hazra, I. Mondal, M. Chakraborty and S. Sarkar, “A Review on Intelligence Secure Routing Protocols in the Mobile Ad-hoc Networks,” International Journal of Advanced Multidisciplinary Research(IJAMR),vol.1,no. 3, pp.01–13, December 2014. [38] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, “Minimized Overhead and Administrator Based Secure Routing Protocol,” International Journal of Computer Applications(IJCA),vol.25,no. 9, Foundation of Computer Science, pp.22-35, July 2011. [39] H. N. Saha, R. Singh and D. Bhattacharyya, "Hardware Implementation of Fidelity based OnDemand Routing Protocol in MANETs,” International Journal of Computer Network and Page 78
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email:
[email protected] Volume 5, Issue 1, January - February 2016 ISSN 2278-6856 Information Security (IJCNIS), MECS, vol.7,no.8, pp. 39-48, July 2015. [40] S. Buchegger and J. Y. Le-Boudec, “Performance analysis of the CONFIDANT protocol,” in proc. of the 3rd ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’2002), 2002, pp.226–236.
AUTHOR He completed B-Tech from West Bengal University of Technology, India on Computer Science Engineering and Technology from CSET and completed M.Tech form West Bengal University of Technology, India on Computer Science Engineering and Technology from Institute of Engg & Tech, Kolkata. His area of interests is Wireless sensor networks, Data Mining, Image Processing. Himadri Nath Saha has completed his Bachelor of Engineering from Jadavpur University and has received his Master of Engineering from Indian Institute of Engineering, Science and Technology. After completing his Master of Business Administration he has completed his PhD in Engineering from Jadavpur University.
Volume 5, Issue 1, January – February 2016
Page 79