TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
Akshayappt
1. Enhanced Adaptive Acknowledgement[EAACK] -
A Secure Intrusion Detection Sysytem for MANETs
Akshaya Arunan
Guided By: Mrs Vrinda
Assistant Proffessor
MKALEIT041
February 12, 2015
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
2. OUTLINE
1 OBJECTIVE
2 INTRODUCTION
Mobile Ad Hoc Networks(MANET)[3]
Attacks
3 LITERATURE SURVEY
4 PROPOSED SYSTEM
5 SCHEME DECRIPTION
6 CONCLUSION
7 REFERENCE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
3. OBJECTIVE
EAACK demonstrates higher malicious behavior detection rates in certain
circumstances while does not greatly affect the network performances.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
4. INTRODUCTION
Most used networks - Wireless Local Area Network (WLAN).
A set of mobile nodes are connected to a fixed wired backbone.
Short range
Risky
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
5. Mobile Ad Hoc Networks[3]
Self-configuring.
Infrastructure-less network - without wires.
Each device is free to move independently in any direction
Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to
communicate with roadside equipment.
Disadvantage - More vulnerable to attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
9. WATCHDOG[4]
Aim: To improve throughput of network with the presence of malicious
nodes.
Consists of two parts:
Watchdog
Pathrater
Detection - Promiscuously listens to its next hops transmission.
If overhears that its next node failed - increases its failure counter.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
10. Watchdog Limitations
Three problems of Watchdog scheme, namely:
Receiver collision
Limited transmission power
False misbehavior
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
11. Figure : RECIEVER COLLISION: Both node B and node X are trying to send
packet 2 to node c at the same time
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
12. Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission
power so that the packet transmission can be overheard by node A but too weak
to reach node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
13. Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour
report even though node B forwarded the packet to node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
14. TWOACK[5]
Aim: To resolve the receiver collision and limited transmission power
problems of Watchdog
TWOACK detects misbehaving links by
Acknowledging every data packets.
From the source to the destination.
Upon retrieval of a packet
Sends back an acknowledgement packet
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
15. Figure : TWOACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
16. AACK[7]
Similar to TWOACK, AACK is an acknowledgement based network layer
scheme.
ACK (identical to TWOACK) + End-to-End acknowledgement scheme
called ACK.
Reduces network overhead.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
17. PROPOSED SYSTEM - EAACK[1]
Steps:
LOCAL INTEGRATION
GLOBAL INTEGRATION
HOME AGENT
CLASSIFIER
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
18. Description
LOCAL INTEGRATION: Self system and finds out the local anomaly
attacks.
GLOBAL INTEGRATION: Finds the intrusion result for entire network.
HOME AGENT: Gathers information about its system from application
layer to routing layer.
CLASSIFIER: The Home Agent calls the classifier construction to find out
the attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
19. Figure : PROPOSED SYSTEM ARCHITECTURE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
20. SCHEME DESCRIPTION
EAACK consists of three major parts, namely:
Acknowledge (ACK)
Secure-Acknowledge (S-ACK)
Misbehaviour Report Authentication (MRA)
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
21. Figure : FLOW CHART OF EAACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
22. CONCLUSION
A comparative study of Secure Intrusion Detection Systems (SIDS) for
discovering malicious nodes and attacks on MANETs is presented.
Prevention mechanisms alone are not adequate to manage the secure
networks.
Thus, detection should be focused as another part before an attacker can
damage the structure of the system.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
23. REFERENCE
[1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System
for MANETs” - International Journal of Latest Trends and Technology in
Engineering, 2013.
[2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network
Security” - Springer, 2012.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
24. [3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc
Wireless Networks” - Mobile Computing, Kluwer Academic Publishers,
1996.
[4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving
Nodes in MANETs” - The 12th International Conference on Information
Integration and Web-based Applications Services, 2010.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
25. [5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged
Acknowledgements in MANETs” - The 25th International Conference on
Advanced Information Networking and Applications, 2011.
[6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a
Distributed Wireless Sensor Network”- IEEE Transactions on
Instrumentation and Measurement, 2008.
[7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for
Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and
Wireless Conference, 2003.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
26. THANK YOU.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19