175

Page 1

Poster Paper Proc. of Int. Conf. on Advances in Computer Engineering 2011

Security Attacks and Solutions in MANET Preeti Sachan1, and Pabitra Mohan Khilar2 1

National Institute of Technology Rourkela, India Email: preetischn@gmail.com 2 National Institute of Technology Rourkela, India Email: pmkhilar@nitrkl.ac.in Abstract—Mobile ad hoc network is a collection of mobile hosts connected by wireless links. Absence of centralized infrastructure such as base station or access point, highly dynamic topology, distributed cooperation, resource constrained nodes and bandwidth constrained wireless links are certain unique characteristics of ad hoc networks that make them highly vulnerable to security attacks compared to wired networks or conventional wireless networks (infrastructure based). In this paper we discuss different types of security attacks that can be launched easily in MANET and related solutions proposed by researchers for ensuring network security. We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) and compare the performance of protocol with existing AODV protocol in the presence of black hole attack using network simulator tool (NS2).

Authentication, Integrity and Non-repudiation [3], [4]. In ad hoc network routing protocols, confidentiality is not required as routing messages need to be processed by intermediate nodes before forwarding in the network. Moreover nonrepudiation is also not critical services [5]. The rest of this paper is organized as follows: We provide an overview on security attacks against MANET and some solutions proposed by researchers. We implement secure AODV (SAODV) protocol using NS2 simulator tool and evaluate the simulation results. Finally we conclude the paper. II. SECURITY ATTACKS Many researchers have surveyed on malicious attacks and their countermeasures in mobile ad hoc networks [6]- [8]. An overview of attacks according to the protocol layers has been presented in [9], [10]. The security attacks in MANET can be classified into two categories: passive attacks and active attacks. Passive attacks include eavesdropping, monitoring and traffic analysis. An adversary snoops the data exchanged in the network without modifying it. Since passive attack does not affect the normal operation of data so it is very difficult to detect but passive attack can be easily prevented by using encryption algorithms. An active attack disrupts the normal functioning of system by modifying or dropping the control or data packets. It is mainly two types: external attacks and internal attacks. External attacks are performed by nodes that are not member of network. Internal attacks are from compromised or hijacked nodes and very difficult to prevent. Internal attacks include jamming, sleep deprivation, modification, impersonation or spoofing, fabrication and denial of service attack. The attackers either attempt to disrupt the normal routing function or consume the resources such as battery power and bandwidth. Internal attacks such as blackhole, grayhole, wormhole, flooding and routing attack are most common attacks that can be easily carried out by the adversaries in MANET. Wormhole attack is a type of routing disruption attack [11]. An attacker receives packets at one location and tunnels them to another location of network. The tunnel between two colluding attackers is known as a wormhole attack. An adversary may perform this type of attack to prevent the discovery of routes by disrupting the propagation of routing control messages. Black hole and gray hole attacks are kind of fabrication attack. In black hole attack, a malicious node advertises itself as having fresh and valid rout to the destination node by sending false route request message. In AODV routing protocol [12], an attacker performs blackhole attack by assigning small hop count and very high sequence number to the route reply message. . In this way an attacker can attract all data traffic and misuse or

Index Terms— Mobile ad hoc network, Security attacks, SAODV, Black hole.

I. INTRODUCTION Nowadays, the MANET has been an important research area due to its infrastructure less, self configuration and self maintenance characteristics [1]. Application domains include military operations, emergency and rescue operations, wireless mesh and sensor networks, collaborative and distributed computing [2]. Routing protocol, security, medium access scheme, energy management, quality of service, self organization, protocol multicasting and scalability are major challenges that need to be considered when an ad hoc wireless system is designed. A number of routing protocol for MANET has been proposed over the past years. Routing protocols exchange routing information such as hop count, sequence number, signal strength, geographical information etc. and establish an efficient and feasible route to a destination node using this information. The major issues involved in designing a routing protocol for ad hoc wireless network are nodes mobility, bandwidth constrained wireless channel, resource constrained nodes, error prone shared broadcast wireless channel, hidden and exposed terminal problems. Apart from these, secured communication is very important in applications like military environments. MANET is highly exposed to security attacks in comparison to traditional wired networks. Lack of central authority, insecure operational environment, shared broadcast channel, limited bandwidth and limited resource availability, lack of association among nodes and physical vulnerability of nodes are some unique characteristics of ad hoc networks that causes difficulty in designing of secured routing protocol. The five major goals that need to be addressed in order to prevent malicious attack are: Availability, Confidentiality, Š 2011 ACEEE DOI: 02.ACE.2011.02.175

172


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.