Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract-Mobile adhoc network has security issues over a sending data at a constant rate. Different protocols are then
large number of years. To maintain security several evaluated based on the packet drop rate, the overhead
algorithms for authentication, authorization, integrity, non introduced by the routing protocol, and other measures.
repudiation and confidentiality are proposed by various
authors. In this paper security for MANET has been proposed
using RSA, AES and SHA512 algorithm. RSA has been used
As ad-hoc and sensor networks become a growing part of
for key generation, AES for symmetric encryption. Using AES our everyday life, they could become a threat if security is
both variable length and fixed length encryption schemes are not considered carefully before deployment. There are
compared. It is found that variable length encryption using several security goals in ad-hoc networks. The provision of
AES has been more efficient in terms of time as compared to authentication is a core requirement for secure and
fixed length encryption. trustworthy communication in ad-hoc networks, and it is the
focus of this work. Only if there is efficient authentication
Keywords: Integrity; Sha512; Message digest; Digital available in ad-hoc networks, secure protocols and
signature. applications can be designed. IT security is the enabler for
1. INTRODUCTION innovative applications, and provision of authentication is
Starting in the late 1950s, computer networks evolved from the enabler of security. The security issues for ad-hoc and
small isolated networks centered on a mainframe, to the sensor networks are different than the ones for fixed
now omnipresent Internet, connecting computers around the traditional networks such as local area networks (LANs)
globe. Until recently, computers were typically connected and wide area networks (WANs). Mobile ad hoc networks
to a wall socket using a wire, limiting the mobility of the are different from mobile wireless IP networks in that there
users. With the introduction of the 802.11 Wireless Local are no base stations, wireless switches, and infrastructure
Area Network (WLAN) standards in the 1990s, it is now services like naming, routing, certificate authorities, etc.
possible to make a wireless connection to an Access Point Because mobile nodes join and leave the network
(AP), which replaces the traditional Ethernet socket. These dynamically, sometimes even without a notice, and move
recent advances in wireless technologies and further dynamically, network topology and administrative domain
miniaturization of computer systems enable the next major membership can change rapidly. Thus it is important to
evolutionary step: Mobile Ad hoc Networks (MANETs). provide security services such as availability,
confidentiality, authentication [3, 4], access control,
A Mobile Ad Hoc Network (MANET) [1].Sometimes integrity, and non-repudiation.
called a mobile mesh network, is a self configuring network
of mobile devices connected by wireless links [2].Each
device in a MANET is free to move independently in any
direction, and will therefore change its links to other
devices frequently. Each must forward traffic unrelated to
its own use, and therefore be a router. The primary
challenge in building a MANET is equipping each device to
continuously maintain the information required to properly
route traffic.
www.ijcsit.com 1966
Anshul Jain et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (4) , 2016, 1966-1969
between source and destination, in order to provide the next proposed a novel communication protocol for MANET that
possible route immediately when the link fails during the can ensure communication privacy of the two
data transmission. Furthermore, it incorporates security communication parties and their end-to-end
attributes as parameters into Adhoc route discovery. communications. In the proposed protocol, the participants
are referred as the nodes and are organized into multiple
The proposed SBRP protocol involves three phases: MANETs. The nodes are further classified into normal
(1). Secured route discovery across the nodes. nodes and super nodes. A normal node is a network node
(2) Back up node setup. that can only communicate with the nodes in the local
(3). Route maintenance across the nodes. MANET. A super node can be a normal node that can also
provide message forward services to the other MANETs. It
Nadeem et al broaden their previously developed algorithm can also be a special node dedicated to providing message
AIDP and proposed a generalized intrusion detection and forwarding services to the other MANETs. Each MANET
prevention mechanism. They used a combination of should have many normal nodes and multiple super nodes.
anomaly based and knowledge-based intrusion detection. The proposed network protocol can be used for critical
This approach not only secures the MANET from a wide information distribution, infrastructure protection and
variety of routing attacks but also has the capability to secure file sharing. The security analysis demonstrates that
detect new unforeseen attacks. Simulation results of a case the proposed protocol is secure against various attacks. The
study show that our proposed mechanism can successfully theoretical analysis and simulation show that the proposed
detect a variety of attacks, including multiple simultaneous scheme is efficient and can ensure high message delivery
different attacks, and identify and isolate the intruders with ratio.
an affordable network overhead.
Mahmoud et al. analyzed one of the secure mobile ad hoc
Intrusion detection and prevention (IDP) provides a way to networks protocols, which is Authenticated routing for ad
protect nodes against routing attacks. There are two ID hoc networks (ARAN). Such protocol is classified as a
techniques: knowledge-based intrusion detection (KBID) secure reactive routing protocol, which is based on some
and anomaly-based intrusion detection (ABID). KBID has type of query-reply dialog. That means ARAN does not
a potentially low false detection rate but it can only detect attempt to continuously maintain the up-to date topology of
attacks whose signatures are in the database. On the other the network, but rather when there is a need, it invokes a
hand ABID not only provides early warnings of potential function to find a route to the destination. Authors present
intrusions but also can detect attempts to exploit new and detail study of the security attacks that the ARAN protocol
unforeseen vulnerabilities; however it is more prone to defends against, criticize how an authenticated selfish node
generate false positives than KBID. can disturb the network by dropping packets or by not
cooperating in the routing functionality and proposed a
Mamatha et al proposed a scheme to secure the data reputation-based scheme called Reputed- ARAN to detect
forwarding functionality in mobile ad hoc networks. The and defend against selfish nodes.
proposed approach takes advantage of the principle of flow
conservation in a network and used semantic mechanism. PROPOSED ALGORITHM
This states that all bytes/packets sent to a node and not
1. Main Algorithm
destined for that node, are expected to bypass the node.
{
The proposed algorithm aims at efficient data forwarding in
1. Configure mobile ad-hoc network for 50 nodes
MANETS and in that process monitors the misbehaving
using network simulator.
nodes or links, so that such nodes or links are avoided in
2. Form 2 clusters with each having 25 mobile
data forwarding. For this purpose there can be three
nodes.
functional modules- Sender module, Receiver module and
3. Form a certification authority (CA) which handles
Intermediate node modules. To develop the proposed
key generation and management for configured
system, a simple acknowledgement approach is used which
cluster of MANET.
has two way communications. Once the sender sends the
4. Generate keys for CA using RSA which will be
message it waits for the acknowledgement back from the
used for digital signature and encryption using
receiver, to indicate that the message sent has reached the
AES.
receiver. Also there are particular data frame formats which
5. Distribute key pairs to all mobile nodes in
specify the various fields in the data and acknowledgement
networks by CA.
frames.
6. For every message calculate message digest using
SHA512 and append it to message and apply
Jian Ren et al. first propose a novel unconditionally secure
digital signature.
source anonymous message authentication scheme
7. Encrypt message containing message digest and
(SAMAS) scheme that enables messages to be released
signature using private key of the sender.
without relying on any trusted third parties. While
providing source privacy, the proposed scheme can also }
provide message content authenticity. After that they
www.ijcsit.com 1967
Anshul Jain et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (4) , 2016, 1966-1969
2. Algorithm for node leave Graph 1: Comparison of encryption time for different
{ length plain text using AES
1. Key revocation of the node that had left network 280000000
by CA.
270000000 Variable length cipher
2. Inform all nodes in network so that they can
remove that nodes public key from their list.
Encryption time (nsec)
} 260000000
250000000
3. Algorithm for node join
{ 240000000
1. Generate key pair for new node by CA.
230000000
2. Public key distribution for new node in cluster it
joined. 220000000
}
210000000
EXPERIMENTAL SETUP AND RESULTS 200000000
In table shown below Table 1 shows results of variable
10 20 30 40 50 60 70 80 90 100
length encryption. While table 2 represents fixed length
encryption. Using AES algorithm. For key generation RSA Plain Text length (Bytes)
is used. Time taken for key generation for variable prime
numbers is shown below.
Table 1: Encryption for different length plain text using Graph 2: Comparison of encryption time for variable
AES (Variable length cipher) length plain text using AES
PLAIN TEXT ENCYPTED ENCRYPTION 168000000 Fixed length cipher
DECRYPTI
LENGTH(BYTES TEXT TIME
ON TIME 166000000
) LENGTH (NANOSEC)
Encryption time (nsec)
Table 2: Encryption for variable length plain text using AES (Fixed length cipher)
www.ijcsit.com 1968
Anshul Jain et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (4) , 2016, 1966-1969
www.ijcsit.com 1969