South Asian Journal of Engineering and Technology Vol.7, No.1 (2018) 52–62

ISSN No: 2454-9614

DETECTION OF MALICIOUS NODE TO REDUCE PACKET LOSS USING FGA IN MANETS

R.Praveenkumar, S.Revathy, T.Sowmiya, P.Vishnupriya

Builders Engineering College,Tiruppur,Tamilnadu,India.

E-mail:

Received: 9/12/2017, Revised: 23/2/2018 and Accepted: 2/4/2018

Abstract

In this paper we present a scheme able to determine malicious node, using network parameters. The contribution of this paper includes fine grained analysis (FGA).We study the malicious node and reduces packet losses in MANETs. The most existing MANETs consider packet loss. To detect truly malicious node and analyses innocent nodes .There may be several reasons for packet losses, such as interference, queue overflow, node mobility. Our proposed model achieves in false positive rate and increase in the rate of detection. Many of these approach that to be identifying the reason of packet losses can react accordingly. Wireless ad hoc networks have gained much importance due to its simplicity and low cost of deployment. The decentralized management of this network makes it susceptible to various attacks. Packet dropping is one of the major security issues. Mobile ad hoc networks are a kind of ad hoc wireless networks in which nodes are mobile. This paper presents packet dropping, packet dropping attack detection techniques, MANET and packet dropping in MANET. The paper concludes with the necessity of motivating a malicious node in case of malicious packet dropping in wireless ad hoc networks. Using these protocols such as DSR and AODV. . In general, routing protocols for MANETs designed for predict the correct path to deliver the packets. These trust based security mechanisms for MANETs to further evaluate its effectiveness. The advantages of the proposed scheme with simulation conducted in a mobile ad-hoc network.

Index Terms-MANETs; Malicious Node; Fine Grained Analysis; DSR; AODV; MAC Layer; Packets; network security; node misbehaviour.

Keywords: Carry Select Adder, Ripple Carry Adder, Multiplexer and Full adder.

I.INTRODUCTION:

Mobile ad hoc networks (MANETs) are used for the infrastructure less network. MANET is a type of ad hoc network that can change locations and configure itself on the fly. The delivery of packets through the multiport intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). This kind of data redundancy due to the spatial correlation between wireless observations inspires the techniques for in-network data aggregation and mining. Packet losses in a mobile ad hoc network represent an indicator of possible attacks to the network. Malicious nodes are to modify data before or during and after the data transmission in the network. There are several attacks are too added for the node mobility. In trust-based schemes, each node within the network manages an independent

Route table to compute and store the trust values of other nodes. Trust is an important but complex concept in social science. Trust helps people to make decisions in unpredictable circumstances by reducing the uncertainty. Many distributed systems can be unpredictable and uncertain when the entities try to collaborate with each other. Because of the great number of possible threats in the varying applications that can be deployed through a distributed system, applying trust in such systems can be quite complex. Research on trust management schemes, which manage trust and decide policies, has emerged as a challenging issue. Trust management schemes aim to improve collaboration between the entities in a distributed system by predicting future behaviors of peers based on their previous behaviors. A trust management scheme typically does this using the following steps.

A.PROBLEM STATEMENT

Detecting the malicious node and reduces the packet losses is an important component of any comprehensive security solution. When to avoiding the false positive rate, before isolating malicious node. In a closed MANET, all mobile nodes cooperate with each other toward a common goal, such as emergency search/rescue or military and law enforcement operations. This leads to many false positives by which legitimate nodes are declared malicious and to low detection rates for malicious nodes. The reason for such shortcomings is that those trust-based security schemes assume that packet losses only arise because of malicious activities by misbehaving nodes. The node moving problem and discuss the performance degradation caused by the misbehaving nodes in MANETs. First, each node observes and stores the neighbouring nodes’ behaviors. Second, each node collects and stores the warnings or reports from other nodes about its neighbouring nodes. Third, each node calculates the trust based on the behavior information collected and stored for each neighbouring node. Last, based on the trust and the policies that use the trust, each node decides the best node or group of nodes with which to collaborate. In some systems, trust management schemes allow trust redemption in order to allow a node to regain the trust of its neighbours. Thus, there exists a possibility that unintentional temporary errors might occur. When a node performs a bad behavior (BB), like a dropped packet, it could be considered malicious even if the behavior was temporary and unintentional. When the trust management scheme isolates the node from the network based on the security policies, the node may not be used again even after it returns to normal behavior. This is a waste of the system resources, thus it would reduce the system efficiency. By allowing a redemption scheme, the system may avoid a faulty detection, that is, the erroneous identification of a node as malicious. A redemption scheme provides further opportunities to these nodes by recovering the trust based on subsequent good behaviors or based on time elapsing. However, packet losses in MANETs may arise due to other adverse events, such as wireless link transmission errors, mobility, and congestion. A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust.

B. OUR CONTRIBUTION

Our FGA scheme uses several different parameters such as MAC layer information, queue information, and rate of link changes to profile the links between nodes as well as the nodes’ neighbourhoods. The routing tables on dynamic routers are updated automatically based on the exchange of routing information with other routers. The system is capable enough to find out the next node for delivery of the packet to destination. If we will send the packet on the congestion then the possibility of packet loss is increased so firstly the router will compute the traffic density and then decide whether to send the packet or not. Our system reduces the possibility of packet loss. All network functions such as routing, multi-hop packet delivery and mobility management have to be performed by the member nodes themselves, either individually or collectively. Misbehaving nodes come into existence in a network due to several reasons:(a) Mobile hosts lack adequate physical protection(due to the open communication medium), making them prone to be captured and compromised; (b) Usually mobile hosts are resource constrained computing devices. MANETs lack a centralized monitoring and management point, making it a challenging task to detect such misbehaving nodes effectively. Non-cooperative actions of misbehaviour are usually termed as selfishness, which is notably different from malicious behavior. Selfish nodes use the network for their own communication, but simply refuse to cooperate in forwarding packets for other nodes in order to save battery power. A selfish node would thus utilize the benefits provided by the resources of other nodes, but will not make available its own resources to help others. Malicious nodes injected by adversaries, on the other hand, will actively spend battery power to cause harm to the entire network. A mobile ad-hoc network (MANET) is a collection of mobile nodes interconnected by the means of wireless links, forming an arbitrary, dynamic and ad-hoc network.

II.RELATED WORK

The security problem and the misbehavior problem of wireless networks including MANETs have been studied by many researchers; various techniques have been proposed to prevent selfishness in MANETs. A node may perhaps disguise as another node and send forged routing information masqueraded as some other normal node. Moreover, a malicious node might gain unconstitutional access to resource and perceptive information and even provide fake orders or status information to other nodes.

End-to-EndAcknowledgementSchemes
There are several schemes that use end-to-end acknowledgments (ACKs) to detect routing misbehaviour or malicious nodes in wireless networks. In the TCP protocol, end-to-end acknowledgment is
employed. Such acknowledgments are sent by the end receiver to notify the sender about the reception of data
packets up to some locations of the continuous data stream. The Selective Acknowledgment (SACK) technique is used to acknowledge out-of-order data blocks. The 2ACK technique differs from the ACK and the
SACK schemes in the TCP protocol in the following manner: The 2ACK scheme tries to detect those misbehaving nodes which have agreed to forward data packets for the source node but refuse to do so when data packets arrive. TCP, on the other hand, uses ACK and SACK to measure the usefulness of the current route and to take appropriate action. For example, congestion control is based on the reception of the ACK and the SACK packets. In order to identify malicious routers that draw traffic toward themselves but fail to correctly forward the traffic, proposed the secure trace route protocol. The normal trace route protocol allows the sender to simply send packets with increasing Time-To Live (TTL) values and wait for a warning message from the router at which time the packet’s TTL value expires. The secure trace route protocol authenticates the trace route packets and disguises them as regular data packets. In proposed an On-Demand Secure Routing Protocol to adaptively probe faulty links on the route being used. Similarly to the secure trace route scheme, binary search is initiated on faulty routes. Asymptotically, probes are needed to identify a faulty link on a faulty n-hop route. This technique only works with static misbehaviors and needs to disguise the probing messages as regular routing control packets. Once a link is identified as faulty, the link weight is increased so that future link selections will avoid this link.

III. DETAILS OF THE PROPOSED SCHEME

Wireless ad hoc networks are one of the categories of wireless networks which operate without the support of any fixed infrastructure. In this network nodes not only acts as hosts but also as routers which forwards data packets. Due to its self-organizing behavior ad hoc networks are mainly used in military applications, emergency operations and disaster recoveries. Packet loss is a serious issue in wireless ad hoc networks. There are several classifications for packet dropping and packet dropping detection techniques. To identify the malicious node to reduce packet loss using network parameters and to determine whether the packet losses due to mobility node or queue overflow in MANET’s. Fine grained program split large number of small task. A fine grained transaction is one applied on smaller set, may be a single row. While in fine grained we can transform individual element on the dataset. Any node under attack in ad hoc networks exhibits an anomalous behavior is called the malicious node. The node which modifies data before, during or after transmission is known as malicious node. If malicious nodes are present in a MANET they may attempt to reduce the network connectivity. To implement our FGA scheme on top of other routing protocols, such as AODV and DSR and several of the existing trust based security mechanisms for MANETs to further evaluate its effectiveness. MANET trust-based schemes need to be extended with approaches able to perform a correct diagnosis of packet losses, considering run-time network conditions to detect truly misbehaving nodes.

IV.PACKET DROPPING

  1. Legitimate Packet Dropping:

Legitimate packet dropping in which no compromised nodes are there may occur due to network congestion, channel conditions and resource constraints.

1) Network Congestion: Congestion is one of the crucial factor which leads to packet loss. Scalability is possible in ad hoc wireless networks due to the movement of nodes which is also a cause for congestion.

2) Channel Conditions: Interference, free path loss, presence of noise on the channel is certain channel conditions. These factors lead to packet dropping or bit error in the signal which is transmitted.

3) Resource Constraints: Energy is one of the resource constraints that have to be considered with great importance. The nodes having limited energy save their energy by not forwarding packets. This selfish behavior of the nodes leads to packet drop.

B. Stealthy Packet Dropping:

Stealthy packet dropping launch attacks that are harmful as brute force attacks. It minimizes the cost and the visibility of the attacker. Stealthy packet dropping attack types are

• Power Control

The next hop is excluded by controlling the transmission. In the route there will be a compromised node with the capability to control power. In mobile ad hoc networks, power consumption of mobile nodes is a decisive state. If there is a misbehaving node with sample power supply, it can send lots of packets to assail other nodes. Once these mobile nodes receive these packets, they may have to relay these packets or record route entries. Thus result in the power consumption of mobile hosts by these attacking packets.

• Misrouting

Packets are forwarded to the next hop which is wrong. In the route there will be a compromised node in misrouting.

Colluding collision

Collision occurs at the next hop by the transmission of packets simultaneously. There will be a compromised node and an external attacker near to this compromised node (next hop) in the route.

Identity Delegation

The colluding partner near to the sender is given the responsibility for relay. There will be a compromised node and an external attacker near to the compromised node in the route. These attacks cannot be detected by Baseline Local Monitoring (BLM), instead stealthy packet dropping attacks can be mitigated by a protocol called SADEC. In SADEC a local monitoring will be done in the nodes by maintaining additional routing path information and the responsibility to check each neighbor.

C. Malicious Packet Dropping:

Packet dropping due to malicious nodes which takes part in the route during data transmission is termed as malicious packet dropping. These nodes behave as trusted nodes and exploit the vulnerabilities of the routing protocols which lead to high damage in the network. An intermediate node which is malicious can even suspend the communication or generate wrong information between the source and the destination 1) Malicious Packet Dropping in AODV: In Ad hoc On Demand Distance Vector (AODV) Routing Protocol the source broadcasts the RREQ (Route Request) message and the destination on receiving the message sends a RREP (Route Reply) message back to its neighbor after updating the sequence number of the source. An intermediate node can even send back a RREP without relaying to the destination if there exists a route to the destination through this intermediate node. A node which is malicious can cause packet drop by not rebroadcasting RREQ and sends RREP by claiming it has the shortest path to the destination. Then the source sends the packet to this malicious node itself which in turn leads to packet dropping.

V. PACKET DROPPING ATTACK DETECTION TECHNIQUS

  1. Watch Dog Technique:

Each node can act as a watch dog detection agent which saves the copy of packets into the buffer before forwarding which leads to the monitoring of packet relay from one node to another.

An Illustration of Watch Dog Technique S is the source node and D is the destination node. S sends packet to node A. When A sends packet to node B, A saves the copy of packets in the watch dog buffer for monitoring. When B sends packet to node C, A can also get the copy of packets since it is in the transmission range of node B. Thus A can check whether B has forwarded all the packets to C with the copy of packets it has received and those in the watch dog buffer. This technique is applicable in environments which have knowledge about neighbors in two hops metric.

  1. Side Channel Monitoring:

Sub-set of neighbors for each node which lies in the route between the source and the destination are selected in order to monitor the behaviors during message forwarding. The information about the misbehaving nodes is obtained by the source through an alarm channel. Alarm channel is formed of both primary channel which consists of nodes and secondary channel which consists of sub- set of neighbors for monitoring.

  1. Monitoring Agent Technique:

The packets sent by neighboring nodes are captured within a transmission range. The information about the neighbors in one hop is collected by all the nodes. Average packet dropping rate, average number of packets transmitted, total number of packets transmitted and packet drop rate at a node which is particular are the information collected by the nodes.

D.TwoAck:

In these technique nodes sends acknowledgment two hop backwards. If a node does not receive TWOACK packet then the link to next node is considered as misbehaving and it will be eliminated from the next route onwards.