A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS TO DETECT AND PREVENT MALICIOUS NODES IN MOBILE AD HOC NETWORK

Luong Thai Ngoc, Vo Thanh Tu
Author affiliations

Authors

  • Luong Thai Ngoc Dong Thap University
  • Vo Thanh Tu Hue University

DOI:

https://doi.org/10.15625/1813-9663/33/4/10759

Keywords:

AODV, MANET, TAM, TAMAN, network security, trust authentication mechanisms.

Abstract

Ad hoc On-demand Distance Vector (AODV) routing protocol is one of the most popular reactive protocol used for Mobile Ad hoc Network, is target of many attack types. Some research works published related to improve of AODV based on digital signature, typical as SAODV and ARAN. However, they have some weakness, malicious can pass over security wall of SAODV by using fake keys, both of SAODV and ARAN can't detect wormhole nodes in hide mode. In additions, detection solutions based on characteristics of attack types have proposed, they only bring about efficiency for each independent type of attack and malicious nodes can join to the discovered route by deliberately giving fake information concerning. This article proposes a trust authentication mechanisms (TAM) using public-key cryptograms RSA and digital certificates (DC) based on X509 standard. TAM allows a mobile node authenticates preceding nodes by checking control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. Analysis results confirm that TAM can detect and prevent almost current routing protocol attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and participation mode Wormhole attacks. Specially, the simulation results in NS2 show that TAM can detect and prevent successful to 100\% malicious nodes using fake keys for all scenarios based on the number of UDP connections, 100% hide mode wormhole nodes for immobility scenarios and above 99% (the mistaken rate below 1.0%) for all mobility scenarios with 30m/s of maximum speeds and 1hop minimum tunnel length.

Metrics

Metrics Loading ...

References

DARPA. The Network Simulator NS2. [Online]. Available: http://www.isi.edu/nsnam/ns/

W. Diffie and M. E. Hellman, “New Directions in Cryptography,” in IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644 – 654.

A. Eiman and M. Biswanath, “A survey on routing algorithms for Wireless Ad-Hoc and Mesh Networks,” Computer Networks, vol. 56, no. 2, pp. 940 – 965, 2012.

S. Gurung and S. Chauhan, “A novel approach for mitigating gray hole attack in MANET,” Wireless Networks, vol. 24, no. 2, pp. 565 – 579, 2018.

C. Imrich, C. Marco, and J. Jennifer, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13 – 64, 2003.

T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. Springer, 2009.

V. M. Jan, W. Ian, and K. S. Winston, “Security threats and solutions in MANETs: A case study using AODV and SAODV,” Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1249 – 1259, 2012.

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks. Boston, MA: Springer US, 1996, pp. 153–181.

P. Jones. US secure hash algorithm 1 (SHA1). [Online]. Available: https://tools.ietf.org/html/rfc3174

J. Karlsson, L. S. Dooley, and G. Pulkkis, “A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis,” Sensors, vol. 11, no. 12, pp. 11 122 – 11 140, 2011.

S. Khurana and N. Gupta, “End-to-end protocol to secure ad hoc networks against wormhole attacks,” Security and Communication Networks, vol. 4, no. 9, pp. 994 – 1002, 2011.

Q. Li, M. Y. Zhao, J. Walker, Y. C. Hu, A. Perrig, and W. Trappe, “SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks,” Security And Communication Networks, vol. 2, no. 4, pp. 325 – 340, 2009.

G. Z. Manel, “Secure Ad Hoc On-demand Distance Vector Routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106 – 107, 2002.

M. Misagh, M. Ali, and M. S. Seyad, “SEAODV: Secure efficient AODV routing protocol for MANETs networks,” Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS ’09). ACM, New York, NY, USA, pp. 940 – 944.

M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP,” in RFC 2560 (Proposed Standard), 1999.

L. T. Ngoc and V. T. Tu, “A solution to detect and prevent wormhole attacks in Mobile Ad hoc Network,” Journal of Computer Science and Cybernetics, vol. 33, no. 1, pp. 34 – 49, 2017.

——, “Whirlwind: A new method to attack Routing Protocol in Mobile Ad hoc Network,” International Journal of Network Security, vol. 19, no. 5, pp. 832 – 838, 2017.

C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999, pp. 90 – 100.

R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “Security in Wireless Ad-hoc Networks - A survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014.

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for Ad hoc Networks,” in 10th IEEE International Conference on Network Protocols, 2002.

L. Snchez-Casadoa, G. Maci-Fernndeza, P. Garca-Teodoroa, and N. Aschenbruckb, “Identification of contamination zones for Sinkhole detection in MANETs,” Journal of Network and Computer Applications, vol. 54, pp. 62 – 77, 2015.

M. Y. Su, “Prevention of selective Black hole attacks on Mobile Ad hoc Networks through Intrusion Detection Systems,” Computer Communications, vol. 34, no. 1, pp. 107 – 117, 2011.

TLS-Library. RSA source code. [Online]. Available: https://tls.mbed.org/rsa-source-code

V. T. Tu and L. T. Ngoc, “SMA 2AODV: Routing Protocol Reduces the Harm of Flooding Attacks in Mobile Ad Hoc Network,” Journal of Communications, vol. 12, no. 7, pp. 371 – 378, 2017.

G. Xiaopeng and C. Wei, “A novel Gray hole attack detection scheme for Mobile Ad-hoc Networks,” IFIP International Conference on Network and Parallel Computing Workshops, pp. 209 – 214, 2007.

Z. Yan, H. Honglin, and F. Masayuki, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. CRC Press, 2006.

P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting flooding attacks in ad hoc networks,” International Conference on Information Technology: Coding and Computing (ITCC05), vol. 2, no. 2, pp. 657 – 662, 2005.

J. Yoon, M. Liu, and B. Noble, “Random waypoint considered harmful,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), vol. 2, 2003, pp. 1312 – 1321.

Downloads

Published

11-05-2018

How to Cite

[1]
L. T. Ngoc and V. T. Tu, “A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS TO DETECT AND PREVENT MALICIOUS NODES IN MOBILE AD HOC NETWORK”, JCC, vol. 33, no. 4, p. 357–378, May 2018.

Issue

Section

Articles

Most read articles by the same author(s)