A novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc network

We proposed the TAM mechanisms to check preceding node through authenticating hopby-hop all route control packets with three steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity. A new protocol named TAMAN, is improved from AODV protocol which can prevent almost of network attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding and Whirlwind attacks. Simulation results confirm that TAMAN has successful HM wormhole attacks detection ratio above 99% (the mistaken rate below 1.0%) for all mobility scenarios at 30m/s maximum speed and 1hop minimum tunnel length, and successful detection rate to 100% for immobile scenario. In addtion, TAMAN can detect and prevent the malicious nodes joining the network by using the fake key with successful detection ratio of 100% for all scenarios based on the number of UDP connections. Moreover, TAMAN packet delivery ratio is outperformed SAODV and ARAN for all simulation scenarios under normal and blackhole attacks. However, because of using TAM for security goal, TAMAN has lower performance in terms of packet delivery ratio, end-to-end delay and routing load, compared to AODV in normal scenarios. In the future, we will improve TAMAN by adding a provider the DC for all nodes automatically through the DCP and DCACK packets. And using large key based on TLS library [23], to improve TAMAN security performance.

pdf22 trang | Chia sẻ: huongthu9 | Lượt xem: 367 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu A novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc network, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and Wormhole attacks in participation mode (PM). In addition, the digital certificates authentication mechanisms allow to detect and prevent the malicious nodes joining the network with the fake keys. Especially, the actual neighbors authentication mechanisms detect the wormhole attacks in HM mode. We make a new improved protocol called TAMAN by integrating TAM into AODV protocol which can prevent all types of current attacks as described in Table 1. The remainder of this article is structured as follows: Section 2 shows research works published related to detection and prevention of the routing protocol attacks; Section 3 shows the mechanism to manage digital certificates and algorithm authenticates preceding node when a node receives the control route packets; Section 4 shows the analysis results and comparing on related works and our approach; Finally, conclusions and future works. A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 359 2. RELATED WORKS Some research works published related to detection routing protocol attacks in Mobile Ad hoc Network. The first, for Blackhole detection case, authors [22] described the Intrusion Detection System (IDS) has ability to recognize Backhole attack in DSR routing protocol. The IDS is set in node in order to perform the so-called ABM (Anti-Blackhole Mechanism) function, which is mainly used to estimate a suspicious value of a node according to the abnormal difference between the routing messages transmitted from the node. When a sus- picious value exceeds a threshold, an IDS nearby will broadcast a block message, informing all nodes on the network, asking them to cooperatively isolate the malicious node. The sec- ond, to detect and isolate Grayhole attacks, authors [25] proposed to use aggregate signature algorithm to produce evidence on forwarded packets and to trace malicious nodes by using these evidence. In addition, authors [10] presented a new robust wormhole detection algo- rithm based on Traversal Time and Hop Count Analysis (TTHCA) for the AODV routing protocol. TTHCA provides wormhole detection performance with low mistake rates, without incurring either significant computational or network cost. However, the TTHCA detection ability to malicious nodes is restricted because the round-trip time of packet is influenced in the mobile topology at high speed. Furthermore, authors [16] proposed VRTM for security and a new improved routing protocol named DWAODV by integrating VRTM into AODV protocol. VRTM use the distance and HC metrics to detect wormhole attacks, thus VRTM has proven the effective with low measurement mistakes in the high mobility network topol- ogy under attacks. The simulation results show that VRTM detects successfully over 99% of invalid routes, and small dependence on tunnel length. However, important problem for the VRTM algorithm is to ensure the integrity and accuracy of the control packet. It is feasible that a PM mode wormhole node can deliberately give fake information concerning for GPS and Path length fields. Finally, authors [27] presented flooding attack prevention (FAP) schema that it can prevent the Flooding Attacks with little overhead. When the malicious nodes broadcast very great route request packets, the neighbor nodes of the ma- licious observe a high rate of route request and then they lower the corresponding priority according to the rate of incoming queries. In addition, not serviced low priority queries are eventually discarded. When the malicious nodes send many attacking DATA packets to the victim node, the normal node may cut off the path and does not set up a path to malicious node. Another approach to increase security level for routing protocols based on mechanisms of authentication, integrity, and non-repudiation based on digital signature (DS) or one-way hash. The first, SAODV [13] is improved from AODV by Zapata to prevent impersonation at- tacks by changing hop-count (HC) and sequence number (SN) values of route control packets. However, SAODV only supports an end-to-end authentication mechanism, an intermediate nodes can’t certify packet coming from a preceding node. Hence, malicious nodes can easily join a path and launch various malicious attacks [26]. Moreover, because SAODV does not have a public key management mechanism, malicious nodes can easily join a route by using fake keys. The second, Sanzgiri also recommended ARAN [20] protocol. Differently from SAODV, route discovery packet RDP in ARAN is signed and certified at all nodes. ARAN has supplemented the testing member node mechanism, thus, malicious nodes can not pass over security by using fake keys. Structure of RDP and REP of ARAN is not available with HC to identify routing cost; this means ARAN is unable to recognize transmission expenses 360 LUONG THAI NGOC, VO THANH TU to the destination. Accordingly, ARAN protocol does not guarantee a shortest route, but offers a quickest path which is chosen by the RDP that reaches the destination node first. Both of SAODV and ARAN are failed by Wormhole attacks in hide mode. Causing mali- cious nodes are hidden from normal nodes in HM mode, when receiving packets and simply forwards them to each other without processing packet, thus, packets information is not changed after it is forwarded by malicious nodes [7, 14]. In addition, authors [12] proposed SEAR based on the ideal of AODV which use a one-way hash function to build up a hash set of value attached with each node and is used to certify route discovery packages. In SEAR, Identification of each node is encoded with SN and HC values; hence, it prevents iterative route attacks. Finally, authors [14] presented a secure efficient ad-hoc on demand rout- ing protocol (SEAODV) for MANETs networks. It uses HEAP authentication scheme with symmetric cryptography and one-way hash function for protection of route control packets. By simulation, SEAODV has better security with less overhead than other existing secure AODV protocols, such as SAODV, ARAN and SEAR. 3. TRUST AUTHENTICATION MECHANISMS FOR MANET (TAMAN) This section describes the trust authentication mechanisms and steps to authenticate the preceding nodes. In addition, upgrading AODV protocol to TAMAN security protocol will be presented in this section. Set of symbols in Table 2 are applied for the presentation. Table 2. Description of symbols Variable Descriptions DCNδ Digital Certificate of node Nδ Nδ Node labeled δ De(v, k) Decryption v value using key k (described in Figure 13(b)) En(v, k) Encryption v value using key k (described in Figure 13(a)) GPSNδ Nδ location using Global Positioning System H(v) v is hashed by hash function H IPNδ Address of node Nδ RNδ Radio range of node Nδ kNδ+, kNδ - Keys of node Nδ 3.1. Trust Authentication Mechanisms (TAM) TAM supports a mobile node which authenticate a preceding node through checking the received route control packets (RREQ or RREP) including digital certificates, actual neighbors and packet integrity authentications, as description in Figure 1. A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 361 P r e c e d in g n o d e (N j ) In te r m e d ia te n o d e (N i ) Begin Sends/ Forwards RREQ or RREP packet Valid DC? Yes No End Attack detection Impersonation attack types: - BH, SH, GH, FD, WW - PM Wormhole attacks Actual neighbors? Packet integrity? Attack detection HM Wormhole attacks Drops the packet Return False Yes No Attack detection Using the fake keys No Yes Accepts RREQ/ RREP Return True Figure 1. Trust Authentication Mechanisms, BH: Blackhole, SH: Sinkhole, GH: Grayhole, WH: Wormhole, FD: Flooding and WW: Whirlwind 3.1.1. Digital certificates authentication The proposed solution also assumes that for a node to participate in the route discovery process it has to be certified and its certificate can be verified by any other node with the proposed procedure. Thus, it prevents malicious nodes that joined the route by giving intentional fake information, such as: Blackhole, Sinkhole, Grayhole, Flooding, Whirlwind, and PM Wormhole attacks. We use a reliable node named NCA to manage and provide the Digital Certificates for all nodes. In this article, DC is installed for all nodes manually, providing the DC for all nodes automatically through the DCP and DCACK packets will be described and evaluated in the future research. a) Digital certificates. Digital certificate is used to certify the identities of nodes in MANET, it is provided for node automatically from certificate authorities (CA) before nodes collabo- rate to the discovery route process. TAM uses digital certificates based on X.509 template as description in Figure 2. 1. Version 2. Serial Number 3. Signature Algorithm 4. Issuer Name 5. Validity Period 6. Subject Name 7. Public Key (PK) 8. Certificate Signature (CS) Figure 2. DC structure based on X.509 Certificate [15] 362 LUONG THAI NGOC, VO THANH TU Where, (1) Version of the certificate; (2) The unique serial number that is assigned by the issuing CA; (3) The public key cryptography and algorithms that are used by the CA to sign the certificate; (4) The name of the issuing CA; (5) The certificate’s start and expiration dates; (6) The name of the subject of the certificate; (7) The public key of the subject of the certificate; (8) The CA’s digital signature, which is created as the last step in generating the certificate by encrypting the hash value of all X.509 certificates attributes with CA private keys CS ← En(H(DC.AllF ields\{CS}), kNCA−). (1) b) Digital certificate management. We setup a reliable node named NCA acting as certificate authorities to manage and provide DC for all member nodes. In NCA exists a Digital Certificate Database (DCDB) of all nodes with the structure as description in Table 3. Each record in DCDB consists of: Address of node (Nodes), OK field controlling the node certificated with DC, all other fields to store DC’s information. Where, all attributes (except OK field) are updated directly by administrators to ensure that only “friendly” nodes are provided with DC. Table 3. Digital certificates databases Node OK Ver Ser Num Sig Alg Iss Nam Val Per S Nam P Key Cer Sig IPN1 yes 1 001 SHA1, RSA IPNCA T1, T2 IPN1 kN1+ CSN1 IPN2 no 1 002 SHA1, RSA IPNCA T1, T2 IPN2 kN2+ CSN2 IPN3 yes 1 003 SHA1, RSA IPNCA T1, T2 IPN3 kN3+ CSN3 IPN4 yes 1 004 SHA1, RSA IPNCA T1, T2 IPN4 kN4+ CSN4 ... ... IPNn no 1 00n SHA1, RSA IPNCA T1, T2 IPNn kNn+ CSNn c) Digital certificate authentication algorithm. Algorithm 1 shows steps to authenticate DC of the packet RREQ (or RREP) when Ni node receiving the packet from preceding node Nj . Node Ni decrypts the certificate signature field value of packet RREQ (or RREP) using the public key (kNCA+) of certificate authorities NCA. If the value after decryption is coincident with the hash value of all DC fields excepted CS field then DC is valid. On the contrary, DC is invalid. Algorithm 1 Algorithm to check DC Input: RREQ or RREP packet; Output: True if DC is valid; Else return False 1: function Boolean IsValidDC(Packet P) 2: Begin 3: val1 ← De(P.DC.CS, kNCA+); 4: val2 ← H(P.DC.AllF ields\{CS}); 5: Return (val1 == val2); 6: End A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 363 3.1.2. Actual neighbors authentication The wormhole attacks characteristic under HM mode is that malicious nodes are hidden from normal nodes, when receiving packets and simply forwards them to each other node without processing packet, thus, they never appear in routing tables of neighbors [10]. See in Figure 3(b), a wormhole node (M) under HM mode, M will forward the RREQ (or RREP) packet to N2 without changing data of packet when it receives the packet from N1. Hence, N2 can’t detect the malicious node M if it uses the digital certificates authentication mechanisms. Using this authenticate method, an intermediate node which can detect and prevent the wormhole attacks under hide mode. Definition 1. Two nodes (Ni and Nj) are actual neighbors if they are under their trans- mission radius. Hence, d(Ni, Nj) ≤ min(RNi, RNj), where, RNδ is maximum transmission radius of δ node, d(Ni, Nj) is Euclidean distance between Ni and Nj nodes, according to (2), triple (xNδ , yNδ , zNδ) is Nδ node location in coordinate system for a three-dimensional space. (as described in article [16]) d(Ni, Nj) = √ (xNi − xNj )2 + (yNi − yNj )2 + (zNi − zNj )2. (2) Example 1. In Figure 3(a), both of N1 and N2 nodes are actual neighbors because of the distance between N1 and N2 nodes less than (or equal to) minimum transmission radius of two nodes. In Figure 3(b), a wormhole node (M) under HM mode, M will forward the RREQ (or RREP) packet to N2 without changing data of packet when it receives the packet from N1. Due to distance between N1 and N2 nodes larger than minimum transmission radius, they are not the actual neighbors, N2 detects that there is a HM wormhole node appeared on discovered route. N1 RN1 d(N1, N2) N2 RN2 Distance (d) R (a) Normal N1 RN1 d(N1, N2) M N2 RN2 Distance (d) R Malicious node (b) Wormhole node using HM mode Figure 3. Actual neighbor nodes Actual neighbors algorithm. Algorithm 2 describes authenticating an actual neighbor when Ni receives P packet from a preceding node Nj . In order to calculate the distance between two nodes, Nj saves the its location and radio range information into GPS and R fields of the packet P before sending (or forwarding). In MANET, node location can’t be installed manually due to all random mobility nodes. Our idea is using a GPS information to define node location automatically, as described in authors [11, 16]. Notice that the actual neighbors 364 LUONG THAI NGOC, VO THANH TU authentication mechanism can be mistaken in mobility network topology at high speeds, will show in Section 4.1. by simulation results. Algorithm 2 Algorithm to check actual neighbors Input: P packet; Output: True if source node is actual neighbors; Else return False 1: function Boolean IsActualNeighbor(Packet P ) 2: Begin 3: GPS g = getGPS(); //Ni location 4: double d = Distance(P.GPS, g); 5: Return (d 6 min(P.R,RNi)); 6: End 3.1.3. Packet integrity authentication A malicious node can pass digital certificates and actual neighbors authentications mech- anisms if it uses a fake RREQ (or RREP) packet with suitable GPS value, a valid digital certificate of another node and a fake private key (k-) to encrypt the packet. To detect a malicious node used the fake private key, our solution is testing the received packet, if the packets is not integrity then the preceding node ’s private key is not fit to DC’s public key. Thus, node (Ni) detects and prevents a malicious node joining to the discovered route by deliberately giving a fake key. This authentication scheme is described as follows: Source node NS hashes all fields needed protection of control route packets RREQ (or RREP) using H function. Continu- ously, it encrypts the hashed value using its private key as (3) and saves into field named CV of the packets before sending this packet P.CV ← En(H(P.AllF ields\{CV }), kNs−). (3) When receiving the packet RREQ (or RREP) from preceding node Nj , intermediate node Ni uses the Nj ’s public key (DCNj .PK) to decrypt the VC field value and saves to val1 variable. All fields needed protection of the received packets are hashed by H function. If value hash equal the variable val1 value then packets is integrity; Else, packet is not integrity due to the fact that there exits a field needed protection of P packet is changed, see in Algorithm 3. Algorithm 3 Algorithm to check the packet integrity Input: RREQ or RREP packet; DCNS .PK is the NS ’s public key Output: True if RREQ (or RREP) packet is integrity; else return False 1: function Boolean IsPacketIntegrity(Packet P; Public Key DCNS .PK) 2: Begin 3: val1 ← De(P.V C,DCNS .PK); 4: val2 ← H(P.AllF ields\{V C}); 5: Return (val1 == val2); 6: End A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 365 3.2. Improved TAMAN routing protocol An algorithm has been designed based on reactive routing protocols accepted as standards for routing in MANETs such as AODV. The AODV uses the route exploration mechanism if it is necessary. If source node NS has not a route to destination node ND then source node starts route discovery process by broadcasting the route request (RREQ) packet. AODV protocol belongs to routing group basing on distance vector, the routing cost is therefore calculated basing on nodes from source NS to destination ND, this is HC value in RREQ request packet and RREP reply packet, HC value increases 1 when packet is routed by nodes. Destination node sends unicast the reply route (RREP) packet to reply a route when it receives RREQ packet, or the intermediate nodes can reply RREP if there exists any “fresh” enough route to destination in routing table (RT). Each node remains SN value to determine “fresh” of recently explored route. Basing on HC value and destination sequence number (DSN), source node NS updates new route that newly explored route is “fresh” enough and cheapest to destination. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Type JRGDU Reserved Hop Count| | | ID Broadcast Destination IP Address Destination Sequence Number Source IP Address Source Sequence Number Location (GPS) Radio range (R) Digital Certification (DC) Checking Value (CV) RREQ (a) SeRQ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Type |RA| Reserved | Hop Count|Pre Sz Destination IP Address Destination Sequence Number Source IP Address Life time Location (GPS) Radio range (R) Digital Certification (DC) Checking Value (CV) RREP (b) SeRP Figure 4. The structures of control packets of TAMAN The TAMAN protocol which is proposed by integration of TAM into AODV protocol includes the two phases: Broadcasting route request packet and unicasting route reply packet. We use the route control packets as in AODV and modify them to satisfy our requirements. For example, the SeRQ packet is used for route discovery and the SeRP packet is used for route reply. While most fields stay as they were in AODV, in addition, we define four new fields (4NF) named GPS, R, DC, and CV showed in Figures 4(a) and 4(b). The GPS and R fields are used to authenticate actual neighbors, DC field is used to authenticate the digital certificate, and CV field to check the packet integrity as described in section 3.1.3. 3.2.1. Broadcasting SeRQ phase TAMAN protocol discovers a new route by broadcasting SeRQ packet, is improved from algorithm broadcasting RREQ packet of AODV, the detail as follows. a) Generating SeRQ packet. If source node (NS) has not a route to destination node, it starts route discovery process by broadcasting the SeRQ packet to its all neighbors as description in (4). Where RREQ∗ is the original RREQ packet, its values are initialized as AODV protocol and 4NF fields to store source node information including: SeRQ.GPS = GPSNS ; SeRQ.R = 250m; SeRQ.DC = DCNS ; SeRQ.CV = En(H(SeRQ.AllF ields\{CV }), kNS−); 366 LUONG THAI NGOC, VO THANH TU NSbroadcasts : SeRQ← {RREQ∗ + 4NF}. (4) b) Receiving and processing the SeRQ packet. Figure 5(a) shows the algorithm for receiving and processing the SeRQ packet. When an intermediate or destination node (Ni) receives a SeRQ packet from a preceding node (Nj), Ni drops the packet if it has not the DC. Else, if Ni had received the SeRQ packet (using source address and broadcast id) then drops SeRQ and The end; Else, Ni inserts triple source address and broadcast id information into its Cache; Continuously, Ni uses TAM to check Nj with digital certificate, actual neighbors and packet integrity authentications using the SeRQ’s information as follows: • If DC is invalid by calling IsValidDC(SeRQ) function Then preceding node is mali- cious node under impersonation attack types, such as: Blackhole, Sinkhole, Grayhole, Flooding, Whirlwind, and PM Wormhole attacks; Ni drops the SeRQ packet; and The End; • If SeRQ packet is not sent from an actual neighbor node by calling IsActualNeigh- bor(SeRQ) function Then Ni drops the SeRQ packet due to preceding node is wormhole node using HM mode; and The End; • If SeRQ packet is not integrity by calling IsPacketIntegrity(SeRQ, SeRQ.DC.PK) func- tion Then Nj is malicious node which used the fake keys to attack; and The End; If all the conditions are satisfied, preceding node is normal, Ni sets up a reverse path to the source (or updates exiting route if new route has better cost than old route) us- ing the previous hop of the SeRQ as the next hop on the reverse path. In addition, if there is a valid route available for the destination or current node is the destination, Ni unicasts a SeRP back to the source via the reverse path; otherwise, it updates 4NF of the SeRQ packet using its information before rebroadcasting the SeRQ packet to all neigh- bors, including: SeRQ.GPS = GPSNi ;SeRQ.R = 250m;SeRQ.DC = DCNi ;SeRQ.CV = En(H(SeRQ.AllF ields\{CV }), kNi−); 3.2.2. Unicasting SeRP phase TAMAN uses the route reply algorithm which is improved from route reply algorithm of AODV protocol, the detail as follows: a) Generating SeRP packet. A node generates a SeRP packet if it is either the des- tination (ND) or an intermediate (Ni) which has “fresh” route to the destination as de- scription in (5). Where RREP ∗ is the original RREP packet, its values are initialized as AODV protocol and 4NF fields to store destination (or intermediate) node informa- tion including: SeRP.GPS = GPSND ;SeRP.R = 250m;SeRP.DC = DCND ;SeRP.CV = En(H(SeRP.AllF ields\{CV }), kND−); ND(or Ni)unicasts : SeRP ← {RREP ∗ + 4NF}. (5) b) Processing and forwarding SeRP packet. Figure 5(b) shows the process for processing and forwarding the SeRP packet. When an intermediate or source node (Ni) receives a SeRP A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 367 Begin The end Source node (NS) In te r m e d ia te / d e st in a ti o n n o d e (N i ) Creates a SeRQ packet; Sets GPS, R, DC and CV values; Broadcasts SeRQ; Uses TAM to check SeRQ: Digital certificates, actual neighbors and packet integrity Broadcasts SeRQ Dispose(SeRQ) yes no Preceding node is normal Adds a reverse route to source or updates if better than existing route Updates: GPS, R, DC, and CVDestination fresh route to Has a no Generate and Send SeRP packet yes no I’m destination yes (a) Processing SeRQ packet Begin The end Destination node (ND) In te r m e d ia te / so u r c e n o d e (N i ) Creates a SeRP packet; Sets GPS, R, DC and CV values; Unicasts SeRP; Uses TAM to check SeRP: Digital certificates, actual neighbors and packet integrity Forwards SeRP Dispose(SeRP) yes no Preceding node is normal Adds a route to destination or updates if better than existing route Updates: GPS, R, DC and CVin its RT entry to source Finds an foundnot found Sends data packets from queue no I’m source yes (b) Processing SeRP packet Figure 5. Improved route discovery algorithm of TAMAN packet from a preceding node (Nj), Ni drops the packet if it has not the DC, else, Ni uses TAM to checkNj with digital certificate, actual neighbors and packet integrity authentications using the SeRP’s information as follows: • If DC is invalid by using IsValidDC(SeRP) function Then preceding node is mali- cious node under impersonation attack types, such as: Blackhole, Sinkhole, Grayhole, Flooding, Whirlwind, and PM Wormhole attacks; Ni drops the SeRP packet; and The End; • If SeRP packet is not sent from a actual neighbor node by calling IsActualNeigh- bor(SeRP) function Then Ni drops the SeRP packet due to preceding node is wormhole node using HM mode; and The End; • If SeRP packet is’nt integrity by calling IsPacketIntegrity(SeRP, SeRP.DC.PK) func- tion Then Nj is malicious node which used the fake keys to attack; and The End; If all the conditions are satisfied, preceding node is normal, Ni sets up a path to the 368 LUONG THAI NGOC, VO THANH TU destination (or updates existing route if new route has better cost than old route) using the previous hop of the RREP as the next hop on the path. In addition, if current node is the source node then it just simply accepts the SeRP packet to add a new route, discovering a new route is successful, Ni sends data packets from queue; otherwise, it updates 4NF of the SeRP packet using its information before continuously forwarding the SeRP packet to source via next hop of entry found in RT, including: SeRP.GPS = GPSNi ;SeRP.R = 250m;SeRP.DC = DCNi ;SeRP.CV = En(H(SeRP.AllF ields\{CV }), kNi−); 3.3. Features and security performance analysis A comparison of the various features and security mechanisms was carried out and the results are presented in Tables 4 and 5. 3.3.1. Features analysis We compare features of the TAMAN and related works, a comparison summary is pro- vided in Table 4. Both of ARAN and TAMAN protocols support hop-by-hop authentica- tion mechanism, SAODV uses end-to-end authentication mechanism. TAMAN has preced- ing node authentication with its DC unlike ARAN that it uses DS, SAODV authenticate source node with DS. SAODV uses hash function to prevent the decrement of the hop count field value while TAMAN using packet intergrity authentication mechanism. TAMAN and SAODV protocols use HC as the parameter to determine routing cost, but ARAN does not support HC field. TAMAN and SAODV protocols support a route reply at intermediate nodes except for ARAN (See in [7], Table 2). Moreover, TAMAN protocol has a “friendly” nodes management mechanism by providing DC based on X509 using reliable node NCA. TAMAN protocol has packet intergrity authentication mechanism while both of SAODV and ARAN only can be protection mutable fields. Specially, TAMAN supports an actual neighbors authentication mechanism to detect hide mode wormhole attacks. Table 4. The features of TAMAN and related works Features Protocols SAODV ARAN TAMAN End to end authentication • • Hop by hop authentication • • Source address authentication with DS • Preceding node authentication with DS • Preceding node authentication with its DC • HC is used to define metrics route • • Intermediate nodes reply the route • • Supports public key management • • Mutable fields protection with DS • • Packet integrity protection with DS • Actual neighbors authentication using GPS • A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 369 3.3.2. Security performance analysis The security performance of TAMAN protocol is compared with older protocols, a com- parison summary is provided in Table 5. Table 5. Comparison between TAMAN and related works Prevention Protocols SAODV ARAN TAMAN Blackhole/ Sinkhole attacks • • • Grayhole attacks • • • Flooding attacks • • • Whirlwind attacks • • • Wormhole attacks: - Hidden Mode (HM) • - Participation Mode (PM) • • • Using the fake keys • • a) Detection and prevention of impersonation attacks. To attack AODV routing protocol under Blackhole/ Sinkhole, Grayhole and Whirlwind types, a malicious node uses the vul- nerabilities of the route reply packets of the routing protocol to advertise itself as having the shortest path to the destination node. When the malicious node receives an RREQ packet, it immediately sends a fake route reply packet (FRREP) giving a route to destination over itself. In Figure 6(a), source node (N1) discovers a new route to destination node (N5) by broadcasting RREQ packet and receiving RREP packet from N5. The result is that source node discovers a best route to N5 on direction {N1 → N2 → N3 → N4 → N5}. However, if there exists a malicious node M in the network, source node discovers a new route to destination through malicious node M due to M pretends that it has the best route to N5 by replying FRREP packet. TAMAN can detect and prevent all of impersonation attacks by checking the route reply packet, this is described in Figure 6(b). When a malicious node M sends a fake SeRP packet to node N3, this latter rejects the packet since the DC of M is not valid. Hence, source N1 will not establish a route through M and data packets don’t send to malicious node. N1 Source N2 N3 N4 N5 Destination M RREQ RREP FRREP (a) AODV N1 Source N2 N3 N4 N5 Destination M SeRQ SeRP FSeRP (b) TAMAN Figure 6. Description of impersonation attacks detection b) Detection and prevention of flooding attacks. Flooding attack [27] is one of the main challenges in the security of MANET. It is implemented by overwhelmingly sending control route packets from malicious nodes to unavailable destinations. The result is a broadcasting 370 LUONG THAI NGOC, VO THANH TU storm of packets and increasing communication overhead, which reduce the responsiveness at each node because of its unnecessary processing. Figure 7(a), RREQ flooding attacks effect all nodes by broadcasting request route packets. TAMAN can detect and prevent this attack form by checking the route request packet, this is described in Figure 7(b). When a malicious node M sends a fake SeRQ packet to its all neighbors named N1, N3 and N5, this latter rejects the packet since the DC of M is not valid. N1 N2 N3 N4 N5M RREQ RREQ RREQ RREQ RREQ (a) AODV N1 N2 N3 N4 N5M SeRQ SeRQ SeRQ (b) TAMAN Figure 7. Description of flooding attacks detection c) Detection and prevention of wormhole attacks. For purpose of attack, the attackers use the two malicious nodes connected with each other by a tunnel that is aimed at eavesdropping or damaging the data packet. In Figure 8(a), source node N1 requests the route to destination N5 by broadcasting RREQ via 2 routes {N1 → N2 → N3 → N4 → N5} and {N1 → M1 → M2 → N5}. Source node accepts the second route which has two malicious nodes M1 and M2 because it has the low routing cost. Wormhole attacks use two modes of attacks, such as HM and PM modes [10]. A malicious node under PM mode processes SeRQ and SeRP packets as other normal nodes. Thus, a normal node can detect an abnormal preceding node if it is a PM wormhole node by using the DC authentication mechanism. Source Destination N1 N2 N3 N4 N5 M1 M2 RREQ RREP Tunnel (a) AODV Source Destination N1 N2 N3 N4 N5 M1 M2 SeRQ SeRP Tunnel (b) TAMAN Figure 8. Description of wormhole detection See in Figure 8(b), when a malicious node M2 sends a SeRQ packet to node N5, this latter rejects the packet since the DC of M2 is not valid. For HM mode wormhole attacks case, malicious nodes are hidden from normal nodes, when receive packets and simply forwards them to each other without processing packet. In ARAN, each intermediate node replaces the signature of the preceding node with its own signature. A malicious node can see this weakness and forwards the route control packets without replacing the signature similarly A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 371 to HM womhole attack type. Thus, ARAN can fail to detect this attack type because the signature appears to be a valid signature [12]. However, TAMAN can detect and prevent malicious nodes by using actual neighbors authentication. In Figure 8(b), when a malicious node M2 sends a SeRQ packet to node N5, this latter rejects the packet since distance between N1 and N5 is larger than transmission range R. d) Detection and prevention of using fake keys. Malicious nodes try collaborate to the dis- covered route by deliberately giving fake information concerning through fake control route packets. They can pass digital certificates and actual neighbors authentications mechanisms if it uses a fake RREQ (or RREP) packet using suitable GPS value, a valid digital certifi- cate of other normal node and a fake private key (k-) to encrypt the packet before sending. However, TAMAN can detect a malicious node used the fake private key based on packet integrity authentication mechanism due to malicious node ’s private key is not fit to DC’s public key. Moreover, a malicious node can not join to the discovered route by deliberately giving fake public key (k+) due to the public key is a part of the digital certificates. 4. EVALUATE THE RESULT OF SIMULATION We evaluate the performance of TAMAN and related protocols using NS2 version 2.35 [1, 6]. The simulation area was a rectangular region with a size of 2000 × 2000 m2, which was chosen to ensure that there existed multiple hops within the network as Figure 9. Figure 9. Network topology for simulation, 20UDP connections We use a 802.11 MAC layer, there are 100 normal mobile nodes used for simulation in network topology, maximum total of 40 pairs of communicating nodes with the source nodes in blue and destination nodes in red. The first data source is started at second of 0, the following data source is 5 seconds apart from each node. Each source sending out constant bit rate (CBR) traffic with packet sizes of 512bytes at a rate of 2 packets per second. FIFO queue type, 1000 seconds for simulation times, the maximum radio range of node (R) is 250m, the detail of basic simulation parameters are listed in the following Table 6. 372 LUONG THAI NGOC, VO THANH TU Table 6. Simulation parameters Parameters Setting Simulation area 2000 × 2000 (m2) Simulation times 1000 (s) Normal nodes 100 (node) Transmission range 250 (m) Transport protocol UDP Traffic type CBR Data rate 2 packets per second Packet size 512 bytes Queue type FIFO (DropTail) Routing protocols AODV, SAODV, ARAN and TAMAN Hash function (H) SHA1 We evaluate detection performance and compare related protocols, using some metrics: Hide mode wormhole attacks detection performance, detection performance of malicious nodes using fake key, packet delivery ratio, end-to-end delay, and routing load, using (6), (7), and (8) equations: • Packet delivery ratio (PDR) is calculated by formula (6). The ratio of the received packets by the destination nodes to the packets sent by the source node PDR = ∑n i=1DATA recieved i∑m j=1DATA sent j ∗ 100%. (6) • End-to-end delay (ETE) is calculated by formula (7). This is the average delay between the sending of the data packet by the CBR source and its receipt at the corresponding CBR receiver ETE = ∑n i=1 T i DATA n . (7) • Routing load (RL) is calculated by formula (8). This is the ratio of overhead control packets sent (or forwarded) to successfully delivered data packet RL = ∑m j=1 PACKET overhead j∑n i=1DATA recieved i . (8) 4.1. Malicious nodes detection performances The first, we evaluate wormhole detection performance under HM mode for proposed TAM, based on two metrics tunnel length and mobility speed. There are 16 scenarios for simulation, each scenario uses 10UDP connections, 100 normal mobile nodes and 2 mali- cious nodes, all nodes move randomly with maximum speeds (MS) are 0, 10, 20 and 30m/s (0m/s ∼ immobility) in random way point [28] model, two malicious nodes behavior is eaves- dropping, are stayed at the center position with hops tunnel length (TL) is 1, 2, 3, and 4 hops (250m/1hop). Because wormhole nodes under HM mode, malicious nodes are hidden from normal nodes, when receiving packets and simply forward them to each other without A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 373 processing packet, thus, they can’t be detected by DC and packet integrity authentications. Using the actual neighbors authentication, normal node can detect the SeRQ (or SeRP) packet is forwarded by HM wormhole nodes. However, the weakness of the actual neigh- bors authentication is it uses location based on GPS information, thus, this method can be mistaken in mobility network topology at high speeds. Simulation results in Figure 10(a) show that TAM has the successful detection ratio above 99% (the mistaken rate below 1.0%) of hide mode wormhole nodes for all mobility scenarios with 30m/s maximum speeds and 1hop minimum tunnel length, this ratio is 100% for all used immobile scenarios based tunnel length. 99 99.2 99.4 99.6 99.8 100 1 2 3 4 Ma lic iou s N od e D ete cti on R ati o (% ) Tennel Length (hops) MS=0m/s MS=10m/s MS=20m/s MS=30m/s (a) Hide mode wormhole detection 99 99.2 99.4 99.6 99.8 100 200 400 600 800 1000 Fa ke K ey D ete cti on R ati o (% ) Simulation Times (sec) NC=10UDP NC=20UDP NC=30UDP NC=40UDP (b) Fake key detection ratio Figure 10. Detection performance of malicious nodes The second, we use 4 scenarios for simulation to evaluate detection performance of ma- licious node using fake key based on the number of UDP connections. Each scenario has 100 normal mobile nodes and 1 malicious node staying at the center position for simulation. All of normal nodes move randomly with maximum speeds 30m/s. Traffic conditions range from light to heavy and are represented by the number of UDP network connections (NCs) between source- destination node pairs from 10 for light traffic to 40 for heavy traffic. Other parameters remain the same as described in Table 6. Simulation results in Figure 10(b) show that TAM has successful detection ratio of 100% of malicious nodes using fake key for all scenarios. 4.2. Comparision of TAMAN and related works under Blackhole attacks Continuously, we evaluate blackhole attacks detection performance of proposed TAMAN and related works. Each scenario has 100 normal mobile nodes and 1 malicious node. The intruder stays at the center position and starts to attack at 500s, other parameters remain the same as described in Table 6. In the blackhole attack, a malicious node exploits the routing protocol to advertise itself as having the shortest path to the node whose data packets it wants to intercept. In AODV case, a malicious node replies to source node by fake RREP (FRREP) packet with the best route to destination. By doing that, the blackhole node successfully gains traffic flow from source transfer to destination. As a result, the sources node sends all of data packets to the attack node which can drop the packets. In security protocols case, malicious node uses fake keys to sign FRREP packet before it replies to source node. 374 LUONG THAI NGOC, VO THANH TU 10 20 30 40 50 60 70 80 200 400 600 800 1000 Pa ck et De liv er y R ati o ( %) Simulation Times (sec) AODV SAODV ARAN TAMAN (a) Packet delivery ratio 0 0.5 1 1.5 2 200 400 600 800 1000 En d-t o-E nd D ela y (s ec) Simulation Times (sec) AODV SAODV ARAN TAMAN (b) End-to-End delay 10 12 14 16 18 20 22 24 200 400 600 800 1000 Ro uti ng Lo ad (p kt) Simulation Times (sec) AODV SAODV ARAN TAMAN (c) Routing load Figure 11. Performance of TAMAN and related works under blackhole attacks The main purpose for blackhole attack is to destroy data packets, reduce packet deliv- ery ratio. Figure 11(a) shows that packet delivery ratio of AODV and SAODV go down significantly under blackhole attacks. After 1000s for simulation with 10UDP connections, the AODV packet delivery ratio is 35.54% and SAODV is 34.33%. ARAN packet delivery ratio in attacks state is 59.59% and TAMAN is 64.52% due to both of them can detect and prevent the blackhole attacks efficiently. It is then clear that the TAMAN packet delivery ratio is improved significantly and has better packet delivery ratio compared to SAODV and ARAN. Figure 11(b) shows that all security protocols have end-to-end delay higher than AODV because they used RSA public key encryption and hash function SHA1 for security goal. After 1000s for simulation, end-to-end delay of TAMAN is 1.541s, SAODV is 1.931s, ARAN is 1.235s and AODV is 0.927s. Figure 11(c) shows that TAMAN routing load is 18.93pkt, SAODV is 22.33pkt, ARAN is 19.25pkt and AODV is 20.73pkt. Thus, the end-to- end delay increases and the routing load decreases in our scheme as compared to the scenario under the blackhole attack. 4.3. Comparision of TAMAN and related works in normal scenarios Finally, we evaluate the harm of proposed security solutions to the original protocol performance in normal network topology. A security mechanism that integrates into the original routing protocols will affect the performance of the routing protocol (based on PDR A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 375 main parameter) of the original protocol. Thus, a good solution also minimizes the impact on the original protocol. We use 4 scenarios for simulation with 10UDP connections, 100 normal nodes, all of nodes move randomly with maximum speeds 30m/s, other parameters remain the same as described in Table 6. 40 45 50 55 60 65 70 75 80 200 400 600 800 1000 Pa ck et De liv er y R ati o ( %) Simulation Times (sec) AODV SAODV ARAN TAMAN (a) Packet delivery ratio 0 0.5 1 1.5 2 200 400 600 800 1000 En d-t o-E nd D ela y (s ec) Simulation Times (sec) AODV SAODV ARAN TAMAN (b) End-to-End delay 10 12 14 16 18 20 200 400 600 800 1000 Ro uti ng Lo ad (p kt) Simulation Times (sec) AODV SAODV ARAN TAMAN (c) Routing load Figure 12. Performance of TAMAN and related works using normal scenario The simulation results in normal network topology in Figure 12 show that all security solutions harmed the original protocol performance. Packet delivery ratio is reduced, average end-to-end delay and routing load are increased. After 1000s for simulation, Figure 12(a) shows that packet delvery ratio of TAMAN is 65.03% (reduced 6.01%), SAODV is 62.91% (reduced 8.13%) and ARAN is 60.22% (reduced 10.82%) when compared to AODV. Figure 12(b) shows that en-to-end delay of TAMAN is 1.394s (increased 0.467s), SAODV is 1.81s (increased 0.883s) and ARAN is 1.188s (increased 0.261s) when compared to AODV. Figure 12(c) shows that routing load of TAMAN is 18.58pkt (increased 1.6pkt), SAODV is 17.17pkt (increased 0.19pkt) and ARAN is 18.81pkt (increased 1.83pkt) when compared to AODV. The simulation results in Figure 11(a) and Figure 12(a) confirm that TAMAN outperformed SAODV and ARAN for high mobility speed simulation scenarios under normal and blackhole attacks. 376 LUONG THAI NGOC, VO THANH TU 5. CONCLUSIONS We proposed the TAM mechanisms to check preceding node through authenticating hop- by-hop all route control packets with three steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity. A new protocol named TAMAN, is improved from AODV protocol which can prevent almost of network attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding and Whirlwind attacks. Simulation results confirm that TAMAN has successful HM wormhole attacks detection ratio above 99% (the mistaken rate below 1.0%) for all mo- bility scenarios at 30m/s maximum speed and 1hop minimum tunnel length, and successful detection rate to 100% for immobile scenario. In addtion, TAMAN can detect and prevent the malicious nodes joining the network by using the fake key with successful detection ratio of 100% for all scenarios based on the number of UDP connections. Moreover, TAMAN packet delivery ratio is outperformed SAODV and ARAN for all simulation scenarios under normal and blackhole attacks. However, because of using TAM for security goal, TAMAN has lower performance in terms of packet delivery ratio, end-to-end delay and routing load, compared to AODV in normal scenarios. In the future, we will improve TAMAN by adding a provider the DC for all nodes automatically through the DCP and DCACK packets. And using large key based on TLS library [23], to improve TAMAN security performance. APPENDIX OUPUT: X2X3X4........................................................................Xn−1Xn Encryption (val) = X1 ← b is changed to Hexadecimal b ← aemodN (or b ← admodN) INPUT: msg = Message a ← D6 is changed to Decimal val = SHA1(msg) = D6 62 39 0E 19 9C E3 A5 DF 14 4F B4 4D BD 33 85 1B 53 4D 04 (a) Encryption OUPUT: INPUT: msg = X1X2X3X4.........................................................................Xn−1Xn Decryption (msg) = D6 ← b is changed to Hexadecimal b ← admodN (or b ← aemodN) a ← X1 is changed to Decimal 62 39 0E 19 9C E3 A5 DF 14 4F B4 4D BD 33 85 1B 53 4D 04 (b) Decryption Figure 13. Encryption and decryption algorithms using a key (e, d,N) A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS 377 REFERENCES [1] DARPA. The network simulator NS2. [Online]. Available: [2] W. Diffie and M. E. Hellman, “New directions in cryptography,” in IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644 – 654. [3] A. Eiman and M. Biswanath, “A survey on routing algorithms for wireless Ad-hoc and mesh networks,” Computer Networks, vol. 56, no. 2, pp. 940 – 965, 2012. [4] S. Gurung and S. Chauhan, “A novel approach for mitigating gray hole attack in MANET,” Wireless Networks, vol. 24, no. 2, pp. 565 – 579, 2018. [5] C. Imrich, C. Marco, and J. Jennifer, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13 – 64, 2003. [6] T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. Springer, 2009. [7] V. M. Jan, W. Ian, and K. S. Winston, “Security threats and solutions in MANETs: A case study using AODV and SAODV,” Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1249 – 1259, 2012. [8] D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks. Boston, MA: Springer US, 1996, pp. 153–181. [9] P. Jones. US secure hash algorithm 1 (SHA1). [Online]. Available: https://tools.ietf.org/html/ rfc3174 [10] J. Karlsson, L. S. Dooley, and G. Pulkkis, “A new MANET wormhole detection algorithm based on traversal time and hop count analysis,” Sensors, vol. 11, no. 12, pp. 11 122 – 11 140, 2011. [11] S. Khurana and N. Gupta, “End-to-end protocol to secure ad hoc networks against wormhole attacks,” Security and Communication Networks, vol. 4, no. 9, pp. 994 – 1002, 2011. [12] Q. Li, M. Y. Zhao, J. Walker, Y. C. Hu, A. Perrig, and W. Trappe, “SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks,” Security And Communication Networks, vol. 2, no. 4, pp. 325 – 340, 2009. [13] G. Z. Manel, “Secure Ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106 – 107, 2002. [14] M. Misagh, M. Ali, and M. S. Seyad, “SEAODV: Secure efficient AODV routing protocol for MANETs networks,” Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS ’09). ACM, New York, NY, USA, pp. 940 – 944. [15] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “X.509 internet public key infrastructure online certificate status protocol - OCSP,” in RFC 2560 (Proposed Standard), 1999. [16] L. T. Ngoc and V. T. Tu, “A solution to detect and prevent wormhole attacks in mobile Ad hoc network,” Journal of Computer Science and Cybernetics, vol. 33, no. 1, pp. 34 – 49, 2017. [17] ——, “Whirlwind: A new method to attack routing protocol in mobile Ad hoc network,” Inter- national Journal of Network Security, vol. 19, no. 5, pp. 832 – 838, 2017. 378 LUONG THAI NGOC, VO THANH TU [18] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999, pp. 90 – 100. [19] R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “security in wireless Ad-hoc networks - a survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014. [20] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for Ad hoc Networks,” in 10th IEEE International Conference on Network Protocols, 2002. [21] L. Snchez-Casadoa, G. Maci-Fernndeza, P. Garca-Teodoroa, and N. Aschenbruckb, “Identifi- cation of contamination zones for Sinkhole detection in MANETs,” Journal of Network and Computer Applications, vol. 54, pp. 62 – 77, 2015. [22] M. Y. Su, “Prevention of selective Black hole attacks on mobile Ad hoc networks through intru- sion detection systems,” Computer Communications, vol. 34, no. 1, pp. 107 – 117, 2011. [23] TLS-Library. RSA source code. [Online]. Available: https://tls.mbed.org/rsa-source-code [24] V. T. Tu and L. T. Ngoc, “SMA2AODV: Routing protocol reduces the harm of flooding attacks in Mobile Ad hoc Network,” Journal of Communications, vol. 12, no. 7, pp. 371 – 378, 2017. [25] G. Xiaopeng and C. Wei, “A novel gray hole attack detection scheme for mobile Ad-hoc net- works,” IFIP International Conference on Network and Parallel Computing Workshops, pp. 209 – 214, 2007. [26] Z. Yan, H. Honglin, and F. Masayuki, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. CRC Press, 2006. [27] P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting flooding attacks in ad hoc networks,” Interna- tional Conference on Information Technology: Coding and Computing (ITCC05), vol. 2, no. 2, pp. 657 – 662, 2005. [28] J. Yoon, M. Liu, and B. Noble, “Random waypoint considered harmful,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), vol. 2, 2003, pp. 1312 – 1321. Received on September 25, 2017 Revised on March 26, 2018

Các file đính kèm theo tài liệu này:

  • pdfa_novel_algorithm_based_on_trust_authentication_mechanisms_t.pdf