i-manager's Journal on Mobile Applications and Technologies |
View PDF |
||||
Volume :2 | No :4 | Issue :-2016 | Pages :19-25 |
Mobile Adhoc Networks have become a part and parcel of technology advancements due to its extraordinary technique. Open communication feature make it prone for various security threats. Subsequently, there are many security threats like DDOS, Wormhole, Black hole etc., which not only affect the network performance but also responsible for the leakage of sensitivity of information. Jelly-Fish attack is one of the routing disruption attack which lies in the series of wormhole and black hole attack at network layer. It attempts to compromise the network packet and store them for a period of time. It may try to introduce delay or partial capturing of packets during communication. Due to big impact of jellyfish attack, it has gained a big name in recently and most wide area for researchers. Jellyfish Attack exploits the end-to-end communication and creates congestion in transmission protocols. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to information leakage. Security in mobile networks is a challenging task. The complete study observes that the security threats not only capture the packets but also degrades the network performance. To overcome vulnerability problems, this work considers jellyfish attack as the study target and will derive a mechanism to identify and prevent mobile networks from security threats.
Mobile Ad-hoc Network is a novel kind of wireless networks which is a collection of mobile nodes having infrastructure-less technology. Every mobile node has individual transmitter, receiver, processor and battery with self-configurable technology. Wireless communication link is used for connection establishment and communication purpose. An ad-hoc network doesn't use centralized controller like cellular network and establishes network without using third party device. Here, every mobile node is capable to work as transmitter, receiver and router for route discovery. Mobility gives a wide scale to mobile nodes to join or leave the network as they wish. Any node can change their network of position whenever they want. Due to limited transmission range and transmitter capability, intermediate nodes or multi-hops are required for information transmission to reach at another node. Here, every node is willing to forward packets to other node [1].
A better understanding of such ad-hoc network can be explained by considering a network of 5 nodes named as A, B, C, D and E. All are mobile nodes and can have limited transmission range. Suppose Node A wants to send a packet to E, it is necessary to involve other mobile nodes to establish a proper communication. Here, D will be an intermediate node to forward the packet to E. A will be the source node and E will be known as the destination node. A complete scenario is shown in Figure 1, which explains that the topological instability requires a set of policy to discover routes and transfer packet from one node to others. Figure 2 illustrates the classification of routing protocols.
The complete work observed that the mobile ad-hoc network is a very useful kind of wireless network and it has many advantages that can be explained as follows,
The nodes involved in a MANET should co-operate with each other and are conversed among themselves and each mobile node acts as a relay as needed, to the implementation of specific functions such as routing and security.
When source wants to forward packet to destination, it is communicated through intermediate nodes.
In MANET, every mobile node is an independent node, which could function as both a host and a router.
Volatile methodology gives freedom to deploy an arbitrary shape node and node movement with variable speeds. Network topology may change with time of requirement but, performance will not be affected.
In maximum cases, the nodes in MANET are mobile with less CPU capability, low power storage and limited memory size.
It uses wireless communication technology based on shared bandwidth concept to establish the communication.
Absence of central authority may give the distributed load balancing and communication sharing.
Kaur and Rani [2] explored that the ad-hoc network is one of the leading solutions to establish temporar y communication. Mobile ad-hoc networks are vulnerable, due to open nature and advancements of security threats. They observed various security threats in this paper and enlisted that jellyfish is the one of the most saviour security threats for various autonomous systems or ad-hoc networks. Shared bandwidth and intermediate node forwarding gives an opportunity to store packet for a period of time at attacker node. There are various attacks those affects the performance of network, but jelly-fish attempts to create kiosk between end-to-end communication and use TTL threshold to naturally drop packets.
Kaur and Sandhu [3] explored the study about AODV, OLSR and TORA routing protocols. The performance of network is also observed through OPNET 14.0 simulator. It is evaluated on the basis of data dropped due to buffer overflow or retry threshold exceeded or overload on bandwidth.
Sharma [4] et al. enlisted that the ad-hoc networks suffer with lot of challenges or limitations which gives a big impact on the performance of communication. Some of them are very serious like in resource capabilities due to infrastructure-less topology and small size of mobile nodes. Subsequently, absence of centralized authority require an intermediate node to forward packets which also increases the resource consumption for every node. The author also investigated that, this drawback may be an opportunity for jellyfish attack and the attacker can get benefit of vulnerabilities of routing protocols and hold the packets or drop as per the attacking strategy. Here, they give a brief introduction of all jelly-fish techniques and methodology for completion.
Marti et al. [5] addressed that the wired networks are the most secure solution for communication due to unicast communication and temper proof links. But, due to infrastructure requirement and unavailability for mobility, they may become useless for certain applications. Attacks may be classified as routing disruption of resource draining attacks. Jellyfish is the combination of routing disruption and resource draining method that not only tries to exploit the vulnerabilities of routing protocols but also degrade the hardware performance. They observed that the jelly-fish is one of the variant of DDOS attacks, which may behave as a black hole attack.
The complete study concluded that the Jellyfish have three ways for implementation which can be enlisted as Jellyfish Reorder Attack, Jellyfish Periodic Dropping Attack and Jellyfish Delay Variance Attack [6]. The attacker node reorder the packets, reduces the high-quality put of destination to a sure level and increases the average Endto- End Delay. They consider ZRP routing protocols and implement the proposed solution with NS-2 simulator.
Routing protocols identify how routers communicate with each other, disseminating in sequence that enables them to decide on routes between any two nodes on a computer network. Routing algorithms settled on the specific choice of route. Each router has a priori information only of networks attached to it straight. A routing etiquette shares this information first amongst immediate neighbors, and then right through the network. This way, routers gain acquaintance of the topology of the set-up [6].
There is a classification of routing protocols that are implemented in Wireless Sensor Network for secure routing.
AODV is a reactive routing protocol designed for ad hoc wireless networks. In AODV, routes to connect two nodes are obtained only when it is required i.e. on-demand. AODV routing algorithm is especially suited for dynamic self-configured networks like MANET. AODV provides loop free routes along with route management for broken links. The bandwidth requirement of mobile nodes in AODV is comparatively less than other protocols as AODV does not require periodic route advertisements [7].
AODV uses symmetric links between communicating nodes. Nodes which are communicating or intermediate nodes on active route only maintain routing information. Nodes which do lie on active path need not maintain routing information and does not exchange routing table periodically. Furthermore, the routes are discovered and maintained between two nodes only when they need to communicate or if they are acting as the intermediate node supporting in communication.
The AODV algorithm's primary objectives are as follows [8,9],
For route discover y, AODV uses the broadcast mechanism [4]. Instead of using source routing, the routing strategy used in AODV is to establish route entries dynamically at intermediate nodes. This kind of routing serves the network with large number of nodes by saving overhead required by source routes in each data packet.
There are three types of control messages in AODV, which are discussed below,
Route discovery mechanism is one of the major operations of this routing protocol, where route discovery happened at the beginning of the process. Here, Source node broadcasts RREQ packet and every intermediate node attempts to discover the ultimate destination. When it reaches to ultimate destination, the destination node generates the RREP message and unicast the reply from the same route. Here, in case of link failure or communication gap, it generates the route maintenance control packets. Route Error RERR messages are sent to inform about the error status of the current route broken. AODV uses the sequence numbers to ensure loop freedom.
Jellyfish is one of the variant of DoS attacks known as Denial of Service attack applied for resource draining. It is a passive kind of attack which produces delay in transmission and reception. Jelly-Fish attack disturbs the network for both TCP and UDP protocols to degrade the network performance. This attack is same as the black hole attack or wormhole attack but the dissimilarity is, it affects the network by bringing in delay. This attack can be classified into three grouping, which is planned below [10,11],
It is based on recorder concept and possible by exploring the vulnerabilities of TCP. It records the packets and diverts the transmission.
It timely drop packets by compromising the nodes. This kind of periodic dropping can be possible through relay node.
In this type of attack, the malicious node randomly delays packet without changing the order of the packets.
The study of AODV routing protocols, challenges in MANET and vulnerabilities observations of routing protocols concluded that the wireless networks may get unsuccessful due to security weakness of routing protocols. Challenges in ad-hoc network are the major constraint for any development into the existing system. A little overhead may give a huge impact on network performance and lead to a reason for network collapse [8].
Furthermore, security is the one of the most important requirements nowadays, whereas breaching on security policy may harm a lot on network performance. The study of existing work and proposed solutions concluded that the security threats are the most danger activity applied through attacker either to compromise the network or to collapse the network. Jelly-fish is one of the severe security threat which not only compromise the network but also collapse the communication by draining the network.
The AODV routing protocol is a popular reactive routing protocol in wireless networks. AODV is the successor of AODV routing protocol developed with an aim to enhance the performance of ad-hoc network. AODV routing protocol has been designed for better performance of the network and not for security of the node. The major concern with such routing protocols is to retrieve best performance with minimum resource overhead. At the time of protocol designing, security was not the priority concern, but nowadays it is the most essential challenge.
The complete work generates a need to develop a solution which should integrate with routing protocols to reduce routing protocols vulnerabilities and avoid jelly-fish attack.
The performance of the proposed solution will be done under three situations which are listed below,
All the scenarios will be implemented and simulated with Qualnet 5.2 simulator and observed on basis of throughput, packet delivery ratio, and End-to-End delay.
In short, following steps have been taken to detect and prevent Jelly Fish attack.
A Qualnet 5.2 simulator has been used to simulate and evaluate the performance of the proposed solution. Qualnet is a licensed simulation tool developed by scalable networks. It gives a GUI based drag and drop environment for easy construction of network and simulation of the proposed solution. Five different scenarios have been constructed and simulated for three different conditions: Normal, attack and preventive approach. All these scenarios are simulated on basis of stationary and mobile condition of mobile nodes [12,13] .
The complete work has been simulated into three steps,
Step 1: Mobile Ad-hoc Networks simulation with standard AODV routing protocol.
Step 2: Implementation of JellyFish attack with MANETs.
Step 3: Detection & Prevention of Jelly-Fish Attack in MANET with AODV routing during malicious node.
All the above steps are implemented for 5, 10, 15, 20 & 25 node scenarios with stationary and mobile nodes.
The comparative study of the proposed solution has been represented in graph form. Figure 3 gives Packet Received Analysis, Figure 4 for Throughput Analysis, Figure 5 for Average End to End Delay of the stationary nodes subsequently, Figures 6,7,8 gives same study for the mobile nodes.
This research paper investigates the importance of adhoc networks and also finds the impact of jelly-fish attack. It gives the brief details of jellyfish attack and its various classifications. The complete study observes that, jellyfish is one of severe security threats, which introduces delay during transmission. Thus the problems have been observed and a methodology has been proposed to overcome it.