0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
20 visualizzazioni5 pagine
Security and efficiency are the basic requirement
of any user in any network.We are also presenting the work on
efficiency problem in wireless distributed network.Min-Max
based intelligent approach is presented here.
The presented work is based on nearest neighbour analysis
based on certain parameters like throughput,packet delay and
the data loss.
These parameters will be analyzed under the Min-Max
algorithm.Once the load factor will be identified,the next work
is to generate the path over these congestion free free nodes.It
is a host based approach that will convert each node as an
intelligent node that can perform the decesion regarding
congestion.
We are using Min-Max algorithm with priority based
approach and we will get the solution with in the polynomial
time.The approach will be independent to the protocoal as
well as to the topology.
Titolo originale
A Min-Max based approach for reliable routing in
congested network
Security and efficiency are the basic requirement
of any user in any network.We are also presenting the work on
efficiency problem in wireless distributed network.Min-Max
based intelligent approach is presented here.
The presented work is based on nearest neighbour analysis
based on certain parameters like throughput,packet delay and
the data loss.
These parameters will be analyzed under the Min-Max
algorithm.Once the load factor will be identified,the next work
is to generate the path over these congestion free free nodes.It
is a host based approach that will convert each node as an
intelligent node that can perform the decesion regarding
congestion.
We are using Min-Max algorithm with priority based
approach and we will get the solution with in the polynomial
time.The approach will be independent to the protocoal as
well as to the topology.
Security and efficiency are the basic requirement
of any user in any network.We are also presenting the work on
efficiency problem in wireless distributed network.Min-Max
based intelligent approach is presented here.
The presented work is based on nearest neighbour analysis
based on certain parameters like throughput,packet delay and
the data loss.
These parameters will be analyzed under the Min-Max
algorithm.Once the load factor will be identified,the next work
is to generate the path over these congestion free free nodes.It
is a host based approach that will convert each node as an
intelligent node that can perform the decesion regarding
congestion.
We are using Min-Max algorithm with priority based
approach and we will get the solution with in the polynomial
time.The approach will be independent to the protocoal as
well as to the topology.
A Min-Max based approach for reliable routing in congested network Ekta #1 , Gopal Sharma *2
# M.Tech Student( CSE) JCD College of Engineering, Affiliated to Guru Jambheshwar University,Hisar,India * Assistant Professor( CSE) JCD College of Engineering,Affiliated to Guru Jambheshwar University,Hisar,India
Abstract Security and efficiency are the basic requirement of any user in any network.We are also presenting the work on efficiency problem in wireless distributed network.Min-Max based intelligent approach is presented here. The presented work is based on nearest neighbour analysis based on certain parameters like throughput,packet delay and the data loss. These parameters will be analyzed under the Min-Max algorithm.Once the load factor will be identified,the next work is to generate the path over these congestion free free nodes.It is a host based approach that will convert each node as an intelligent node that can perform the decesion regarding congestion. We are using Min-Max algorithm with priority based approach and we will get the solution with in the polynomial time.The approach will be independent to the protocoal as well as to the topology.
Keywords AODV,Attacks,DOS,MANET,UDP,TCP
I. INTRODUCTION Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. Security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of network. The availability of network services, confidentiality and integrity of the data can be achieved by assuring that security issues have been met. MANETs often suffer fromsecurity attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithms and no clear defense mechanism. The MANETs work without a centralized administration where the nodes communicate with each other on the basis of mutual trust. This characteristic makes MANETs more vulnerable to be exploited by an attacker inside the network. MANETs must have a secure way for transmission and communication and this is a quite challenging and vital issue as there is increasing threats of attack on the Mobile Networks. Security is the cry of the day. In order to provide secure communication and transmission, the engineers must understand different types of attacks and their effects on the MANETs. Wormhole attack, Black hole attack, Denial of Service (DoS), are kind of attacks that a MANET can suffer from. A MANET is more open to these kinds of attacks because communication is based on mutual trust between the nodes, there is no central point for network management, no authorization facility, vigorously changing topology and limited resources.
Fig.1 MANET environment
II. DIFFERENT TYPES OF ATTACKS
Layer Attacks Solution Application Layer Repudiation, data corruption Detecting and preventing virus, worms, malicious codes and application abuses by use of International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9September 2013
Firewalls. Transport Layer Session hijacking, SYN Flooding Authentication and securing end-to-end or point-to-point communication use of public cryptography Network Layer Routing protocol attacks (e.g. DSR, AODV),Wormhole, blackhole, Byzantine, flooding Protecting the ad hoc routing and forwarding protocols Data Link Layer Traffic analysis, monitoring, disruption MAC(801.11), WEP weakness etc. Protecting the wireless MAC protocol and providing link layer security support. Physical Layer Eavesdropping, Jamming, Interceptions. Preventing signal jamming denial- of-service attacks by using Spread Spectrum Mechanism.
III. HOW THE SCHEME WORK
IV.Methodology of Min-Max approach { 1. Define a Network with n nodes called Node1,Node2.Noden. 2. Define m Source Nodes called Src1,Src2.Srcm 3. Define Destination Nodes relative to source node Dst1,Dst2.Dstm 4. Perform Communication over the network between each pair of source and destination Start Design the network along with network area and the topology Define the constraints in terms of transmitting, receiving and forwarding Define the source and destination node Perform the authentication request to neighbor nodes to verify node reliability Send the communication parameters as reply
Performthe Min Max based analysis to identify attack over the node Performthe communication over safe End International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9September 2013
Src1..Dst1,Src2..Dst2..Srcm.. Dstm. 5. Define the Thresholding parmaters for loss, delay and transmission rate. 6. For i=1 to n
7. { 8. For j=1 to n 9. { 10. If(Neighbor(Node(i),Node(j))=True) 11. { 12. Performthe analysis on Node(j) under three main parmaters called LossRate, CommunicationRate and Delay 13. If(LossRate(Node(j))<LOSSTHRESHO LD AND DelayRate(Node(j))<DELAYTRHESH OLD AND TransmissionRate(Node(j))>RATETH RESHOLD) 14. { 15. Set Node(j) Priority to High 16. } 17. Else if(LossRate(Node(j))<LOSSTHRESHO LD AND DelayRate(Node(j))<DELAYTRHESH OLD) 18. { 19. Set Node(j) Priority to Medium 20. } 21. Else if (LossRate(Node(j))<LOSSTHRESHOL D ) 22. { 23. Set Node(j) priority to Low 24. } 25. If Node(j) priority is High, set it as next HOP and perform communication on that node 26. If No Node is of high priority, then analyze the throughput on each neighbor and if throughput >threshold, increase the priority and repeat the process 27. If All nodes are of Low priority then find the node with highest throughput and set it as current node. 28. } 29. } IV.Simulation Results For proof of our methodology we used NS-2.29 simulator to analyze the performance of proposed scheme.For our simulation we used network layer protocoal AODV. For transportation of important packets transportation layer protocoal TCP is used.Some non important communication are developed with UDP.Our simulation is based on parameters that is present in the following simulation parameters table.
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9September 2013
A. Simulation environment: In our simulation a node starts at random position,waits for the pause time,and then moves to other position.The simulation time is of 100 seconds.
B.Traffic Scanerio: In our simulation result the total participating nodes are 36. Node 20 is the source node and the communication is performed over the network to transfer large amount of data over the network. Node 24 is here defined as the receiver node on which heavy load is given and the distribution of the load will be done fromhere.
C.Simulation Parameters: Parameters Values Number of Nodes 36 Protocol AODV Simulation Time 100 Sec Packet Size 512 MAC protocol 802.11
D.Simulation Screen Capture:
E.PerformanceResult:
The above graph demonstrate the no. of packets lost over the network.Here XAxis represents the simulation time and the y axis represents the number of packets transmitted over the network.The result shows that the presented work has improved the network throughput using Min-Max algorithm.
The figure is showing the comparison graph to represent the number of packets lost over the network.The algorithmic approach is implemented and the route reconfiguration is done, after that no more data lost is there.
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9September 2013
The figure is showing the comparison graph to represent the number of packets lost over the network. After applying the algorithmic approach is implemented and the route reconfiguration is done, after that no more data lost is there.
V. CONCLUSION AND FUTURE SCOPE Indeed no one can deny the pivotal role of MANETs in society despite of prevailing vulnerability of such network.The proposed work is about the prevention of DOS attack. The Analysis on these all parameters is performed to identify the critical node as well as the safe node. On each node, the Min Max is implemented to identify the safe path. The process is repeated on each node till the destination is not achieved. The systemis providing better throughput and less packet loss over the network. The systemis implemented in a wireless network with AODV protocol. In this systema neighbor node analysis is performed under different parameters to provide the network security in case of DOS attack.There is very scope for the future work.Performance is done using DOS attack,clustered approach,AODV protocoal,active attacks.Some other approaches can be used for better performance.Also robusteness of the proposed scheme can also be increased.
ACKNOWLEDGMENT We would like to express our gratitude to all who gave their support to complete this paper. We express our gratitude to JCD college for providing us labs to complete our work and all the faculty members who supported us.
REFERENCES
[1] L. Buttyan and J . Hubaux, Stimulating cooperation in selforganizing mobile ad hoc networks, ACM/Kluwer MobileNetworks and Applications (MONET) 8 (2003). [2] M. Baker, E. Fratkin, D. Guitierrez, T. Li, Y. Liu and V.Vijayaraghavan, Participation incentives for adhoc networks, http://www.stanford.edu/~yl31/adhoc (2001). [3] Y.C. Hu, A. Perrig, and D.B. J ohnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, Proceedings of ACM WiSe 2003, San Diego, CA, Sep. 2003. [4] E.M. Royer and C.E. Perkins, Multicast Operation of the Ad Hoc On-Demand Distance Vector Routing Protocol, Proceed- ings of MobiCom99, Seattle, WA, Aug. 1999, pp. 207-218. [5] J . G. J etcheva and D.B. J ohnson, AdaptiveDemand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Net [6] M.S. Corson, J.P. Maker and J.H. Cernicione, Internet- based Mobile Ad hoc Networking, IEEE Internet Computing, pages 63- 70, J uly- August 1999. [7] A Mishra and K.M Nadkarni, security in wireless Ad hoc network, in Book. The Hand book of Ad Hoc Wireless Networks(chapter 30), CRC press LLC, 2003. [8] Y. Haung and W. Lee, A Cooperative Intrusion Detection system for Ad hoc Networks, in Proceedings of the1st ACM Workshop on security of Ad hoc and sensor Networks, Fairfax, Virgining 2003, pages 135-147. [9] I. Aad, J.-P. Hubaux, and E. W. Knightly, Denial of Service Resiliencein Ad Hoc Networks, in Proceedings of the 10 th
Annual International Conference on MobileComputing and Networking. Philadelphia, PA, USA: ACM Press, Sep. 2004, [10] M. Al-Shurman, S.-M. Yoo, and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, in Proceedings of the 42 nd Annual ACM Southeast Regional Conference. Huntsville, AL, USA: ACM Press, Apr. 2004, pp. 9697. [11] S. Marti, T. J . Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, in Proceedings of the 6th Annual International Conference on Mobilecomputing and Networking. Boston, MA, [12] B. Awerbuch, D. Holmer, C. NitaRotaru and Herbert Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security 2002, Pages 21-30, September 2002 [13] Y. Hu, A. Perrig, and D. B. J ohnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Proceedings of the ACM Workshop on Wireless Security 2003, Pages 30-40, September 2003 [14] Axel Krings," Neighborhood Monitoring in Ad Hoc Networks", CSIIRW 10, April 21-23, 2010, Oak Ridge, Tennessee, USA ACM 978-1-4503-0017-9 [15] Ying Li," Component-Based Track Inspection Using Machine- Vision Technology", ICMR11, April 17-20, 2011, Trento, Italy ACM 978-1-4503-0336-1/11/04 [16] Bogdan Carbunar," J ANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks", WiSe04, October 1, 2004, Philadelphia, Pennsylvania, USA. ACM 1- 58113-925-X/04/0010 [17] J ohann Schlamp," How to Prevent AS Hijacking Attacks", CoNEXT Student12, December 10, 2012, Nice, France. ACM 978-1-4503-1779-5/12/12