Documente Academic
Documente Profesional
Documente Cultură
Overview
Objective Abstract Introduction Problem definition Literature survey Comparison Proposed System Applications Limitations Future Work Conclusion References
Objective
The main purpose of this paper is to establish secure routing in
Abstract
Friend based Ad hoc routing uses Challenges to establish security is an algorithm to provide secure routing in ad hoc mobile networks. The scheme proposed has been drawn from a network of friends in real life scenarios. The algorithm is divided into
four stages, viz. Challenge Your Neighbour, Rate Friends, Share Friends and Route
through Friends. One of the major advantages of this scheme is that the nodes do not need to promiscuously listen to the traffic passing through their neighbours. The information about the malicious nodes is gathered effectively by using Challenges, which reduces the overhead on networks.
Introduction
Mobile Ad Hoc Network (MANET)
Challenges in MANETs
Attacks in MANETs
MANET
Type of wireless ad hoc networks
Self-configuring infrastructure
less network of mobile devices connected by wireless links
Typical MANET
Challenges in MANETs
Easier to Tap Limited Capacity Dynamic Nature
Susceptible to Attacks
Attacks in MANETs
Passive attacks
Active attacks
Intruder/attacker can affect the communication by modifying the data, misleading the nodes in the network.
Integrity
Non repudiation Authorization
Problem Definition
MANETs are vulnerable to attacks because of their structure
less property.
Due to this dynamic topology they are prone to active and
passive attacks.
Prevention against these attacks, enabling secure routing is a
Literature Survey
DMR
Security enhancement through multiple path transmission in ad hoc networks
by T.Haniotakis, S. Tragoudas, and C. Kalapodas
TMR
Security in mobile ad-hoc networks using soft encryption and trust based multipath routing by P. Narula, S. K. Dhurandher, S. Misra, and I. Woungang
MTMR
Multi-path and message trust-based secure routing in ad hoc networks
by S. K. Dhurandher and V. Mehra
Comparison
Parameter for comparison Routing Message Disjoint Multipath Routing Multipath Message broken into 4 parts No check Trust based Multipath Routing Multipath Message broken into 4 parts No check Message Trust based Multipath Routing Depends on the trust of the message Depends on the trust of the message(not always broken) Cyclic Redundancy Check used
Checking employed
Encryption/Decryption
Reliability Route selection
XOR
Non trust used Route selection is difficult, as disjoint paths may not be always found Not available Non-promiscuous mode
XOR
Trust based Takes more time in route selection as it is trust based Not available Promiscuous mode
Proposed System
FACES algorithm
o
Challenge Your Neighbor Rate Friends Share Friends Route Through Friends
periodic
-
on Demand
Stages
2 ways to reach C
A initiates challenge & encrypts with pub key of C (pub key of A) B forwards it to C, C decrypts, respond to challenge &encrypt with
pub key of A
C Computes c^d mod n and sends the result to the two paths. A receives result from 2 routes, compares & if same, add B to FL(A)
B challenges C Through E
Contd
Contd
Rate friends
Rated on scale of 0 to 10 Three classes of ratings for each node in FL
request message within the network also sends the no: of data packets
Source node Evaluates route reply messages from
Contd..
If packets are dropped/no acknowledgement from destination,
that packets loss occurred at which all nodes, decreases rating of those nodes
Application
Military communication devices or police communication
devices.
Bank communications across secure networks.
Limitations
Packet delivery ratio is less for less number of nodes. Multiple path discovery for friend rating is time consuming.
Future work
Comparison of FACES protocol with Aradine, ARAN can be
Conclusion
Challenge based authentication helps to isolate malicious nodes
with ease.
Continuous rating of friends helps secure ad hoc mobile
References
[1] Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, and Pravina Dhurandher,FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems, ieee systems journal, vol. 5, no. 2, june 2011. [2] D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems. Pacific Grove, CA: Brooks/Cole, Thomson, 2002. [3] T.Haniotakis, S. Tragoudas, and C. Kalapodas, Security enhancement through multiple path transmission in ad hoc networks, in 2004 IEEE Int. Conf. Communications, Jun. 2004, vol. 7, pp. 41874191. [4] P. Narula, S. K. Dhurandher, S. Misra, and I. Woungang, Security in mobile ad-hoc networks using soft encryption and trust basedmultipath routing, Sci. Direct Comput. Commun., vol. 31, pp. 760769, 2008. [5] S. K. Dhurandher and V. Mehra, Multi-path and message trust-based secure routing in ad hoc networks, in Proc. Int. Conf. Advances in Computing, Control and Telecommunication Technologies (ACT 2009), Trivandrum, India, Dec. 2829, 2009, pp. 189194.