You are on page 1of 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856

UNMASKING OF PACKET DROP ATTACK IN MANET


P. Swetha1, Vinod Bhupathi2
1

Associate Professor, Department of CSE, JNTUH College of Engineering, Jagityal, Andhra Pradesh, India, 2 Department of IT, JNTUH College of Engineering, Jagityal, Andhra Pradesh, India,

Abstract: Mobile ad-hoc Network is a self-organized


spontaneous infrastructure less network which supports networking activities like routing and data transmission. The Data Packets are transferred from one mobile node to another mobile node. The mobile node has limited energy resources like battery power, limited bandwidth. Due to this the intermediate nodes may acts as a selfish node or malicious nodes which does not forwards packet instead drops them. In this paper, a mechanism for detection, mitigation of packet dropping attack is presented based up on the co-operative participation of nodes in a MANET. The rate at which packets are forwarded is compared to a network with malicious nodes and without malicious nodes.

such as evaes dropping, flooding attack, black hole attack, packet drop attack etc. This paper presents the solution to packet drop attack and improves the performance of the network. The paper is organized as follows, section II discusses related work on protocols that exists in Manets, section III about the packet drop attack , section IV about the mechanism to detect the packet drop attack, section V discusses simulation results and final section IV concludes the paper and future work.

2. SECURE ROUTING PROTOCOLS


There are multiple classes of routing protocols in MANET to achieve multi-hop routing between any two mobile nodes. We [1] briefly divide the routing protocols in MANETS into two classes.
Secure Routing Protocols

Keywords: Mobile ad-hoc networks malicious node, Packet Drop Attack

(MANETS),

1. INTRODUCTION
Mobile Ad-hoc Network is a collection of independent mobile nodes network which is created, operated and managed by the nodes themselves. Manet is an infrastructure less, self-organized and spontaneous network where the nodes help each other by passing data and control packets from one node to another node. Each mobile node has features like autonomous, limited battery power, dynamic topology etc. The mobile node transfers packet directly to another node or through some intermediate nodes. In order to exchange the packets, the nodes are inter-connected to each other using some protocols working at different layers (ex: Network layer, Transport layer). The medium of communication or channels may be unsecure and the transmitted data over the nodes can fall into malicious activity. Wireless networks are less secure compared to wired networks. They are created temporarily as per the requirement or application. Mobile nodes itself acts as router in Manet. Any node can join or leave network at any instant. Hence malicious nodes can be in the network without any detection. Packet dropping through that malicious node can be done. Protocols are used on all the layers to transfer data cooperatively. Some standard routing protocols and customized protocols are developed according to the requirement. The protocols are feasible to detect the malicious activities at routing level. The mobile nodes in the MANET are self-configuring and do not have a centralized system. They are easily deployable and most of the nodes are migrating. Due to this there exist some malicious nodes which cause different types of attacks Volume 2, Issue 6 November December 2013

Prevention Layer

Detection-Reaction Layer

Chart -1: Secure Routing Protocols Prevention Layer: Protocols that deploy cryptographic techniques to secure the routing usually remain static during the operation. They are classified as prevention layer protocols or standard protocols. - Static - Standard Protocols - Authenticated routing for Ad-hoc Networks Detection Reaction Layer: Protocols that deploy monitoring technique capture the dynamic events to enhance the protection of the basic operation. They are actually referred as detection reaction layer and use some customized protocols based on the situation. - Dynamic - Monitoring - Collaborative Trust based secure routing - Customized protocols Page 211

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856 3. PACKET DROP PROBLEM
The main assumption of the ad-hoc routing protocols is that all participating nodes do so in good faith and without maliciously disrupting the operation of packet forwarding. However, [2] the existence of malicious nodes cannot be disregarded in any system, especially in open networks like mobile ad-hoc networks

4. DETECTION OF PACKET DROP


We plan to use a customized packet drop protocol to forward the packets from one node to another node. The sender node initially checks to which node the packet should be forwarded. The node information of each node is known to another node. The sender node usually maintains the sequence number count when a packet is forwarded from one node to another. When a packet is forwarded from one node to another node a sequence number is added. The sender node usually tests the sample packet before forwarding the actual packet being sent.

. Chart -2: Packet Drop in Manet S Sender Node D Destination Node N - Intermediate Node The chart 1 explains an illustration for packet drop in manet. There are 9 nodes in which a Sender Node (S) packet to Destination node (D) using some intermediate nodes. But when the packet is forwarded from Sender, the next intermediate node usually forwards the packet to the next node. The node n3 which acts as a malicious node does not forward the packet to next node and drops the packets. So no node after n3 receives the packet. It is an unrealistic anticipation to find all the mobile nodes in an independent network like MANET. The consequence of not forwarding the packets or dropping the packets in a MANET leads to a serious problem. Therefore, the need to address the packet dropping event takes higher priority for the mobile ad-hoc networks. A packet may be dropped under various reasons, which in turn grouped into various categories. a. Unsteadiness [3] of the medium - A packet may be dropped due to confusion in the medium - A packet may be dropped due to broken link - A packet may be dropped due to heavy traffic in the media b. Genuineness [4] of the node - A packet may be dropped due to overflow of transmission queue - A packet may be dropped due to lack of energy resources. c. Selfishness of the node: - A packet may be dropped due to selfishness of a node to save its resources. d. Malicious [5] of the node: - A packet may be dropped due to malignant act of a malicious node. Volume 2, Issue 6 November December 2013

Chart -3: Work flow for Mitigation of Packet Drop P - Packet to be sent Bk1 - Bloom Key1 Bk2 - Bloom Key2 T1 - Time within the acknowledgement should be received C - Cipher text of original packet At first, the sender node calculates the Bloom key (Bk1), encrypts the packet and forwarded to next node. When a packet is forwarded from one node to another node, an acknowledgement should be received in a fixed time T1 and sequence number should be added at sender node. If the acknowledgement is not received in Time T1, the sender node checks for packet audit request. Then the trace file shows the node which drops the packet and the Bloom key (Bk2) is generated after the packet is received. The difference in both the bloom keys also detects the packet drop attack.

Page 212

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856
If the acknowledgement is received to sender in a fixed time T1, then there is no packet drop and there is a secured transmission of data in the network. Transmission Range Maximum Speed Application Traffic Packet Size Protocol Node Mobility Model 250m 0-22 m/s CBR [constant Bit Rate] 512 bytes Packet Drop 8 Pkts/s

5. SIMULATION SET UP AND NETWORK SCENARIO


NS2 simulator generates a TCL (Tool Command Language) file. On running a TCL file it results three more files, namely the first one is Terminal File which shows the status of the packet from which node the packet is forwarded and to which node the packet is delivered. The second file is NAM (Network Animator) file which is a visual display showing all the mobile nodes and how packets flow along the network. The third file is the Trace File which shows all the corresponding information regarding the network and data flow.

5.1 Simulation Results We simulated different Network scenarios having different number of mobile nodes. We observed the simulation results to get the various values like through put, false packer ratio (FPR) and Packet Delivery Ratio (PDLR). At first we calculate throughput in order to check the performance of the manet with a malicious node and without malicious nodes. The throughput can be calculated by using a trace file which is generated after running a TCL file. Throughput = Received size is the amount of data received from the neighboring node Start Time is the time at which the packet is forwarded from the corresponding node Stop Time is the time at which the packet is received to the node In this way we calculate the throughput for single and multiple malicious nodes using the Trace file. Table -2: Experiment Data with Different Scenarios FPR False Packet Ratio PDLR Packet Delivery Ratio

Chart 4: Work Flow for MITIGATION OF PACKET DROP IN ATTACK In this effort, we have tried to show the packet drop attacks in the wireless networks. To attain this we have replicated the wireless ad-hoc network setup which contains packet drop node using NS2 network simulator program. To create the packet drop node in a wireless adhoc network, we have employed our own protocol to test. Table -1: Simulation Parameters PARAMETER SPECIFICATION Simulation tools used Simulation Time Number of nodes NS2 Network Simulator NS 2.35 10s, 20s 10,20,40,60 The Table -2 shows the variation of throughput with one malicious node in a MANET with different malicious packets. We observe that the throughput value gets decreases corresponding to the number of malicious packets increases. The Table -2 shows the variation of throughput against the packet Delivery ratio (PDR) and False Packet ratio (FPR).

Volume 2, Issue 6 November December 2013

Page 213

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856 6. CONCLUSIONS
The comparison of two bloom keys detects the packet drop nodes and also shows the node at which the packet being dropped in the MANET. The change in the bloom key is due to packet drop by the nodes. We propose a simple yet effective scheme to identify the misbehaving nodes that drops the packet. Each packet is encrypted and bloom key is generated so as to hide the original packet. We also calculate the throughput in order to check the performance of the MANET. As a future scope of work, the mechanism can be extended to the standard protocols so that the identified packet drop nodes are isolated from the network for secure data transmission. has published two International Journal papers, Two international conference papers and many National Conference papers. Her areas of interest is Network Security, Networking, Cloud Computing etc. Vinod Bhupathi has received the B.Tech Degree in Information Technology (IT) from Christu Jyoti Institute of Technology. M.Tech degree in Information Technology(IT) from JNTUH College of Engineering, Jagityal. He is now working as an Assistant Professor in CSE department, Balaji Institute of Technology, Warangal. His areas of interest is Network Security, Netwoking, Cloud Computing etc.

REFERENCES
[1] Venkatesan Balakrishnan and Vijay Varadharajan, A serious Threat to Operational Mobile Adhoc Networks, In Proceedings of the 6th International Conference on Mobile Computing and Networking. [2] Shirini Samreen and Dr. G. Narasimha, Detection of Colluding Adversaries in a Packet Drop Attack in MANET, In the Proceedings of the International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 [3] Ashok M. Kanthe, Dina Simunic, Ramjee Prasad, The Impact of Packet Drop Attack and Solution on Overall Performance of AODV in Mobile Adhoc Networks, In the proceedings of the International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2249-8958, Volume-2, Issue-2, December 2012. [4] N.Bhalaji, Dr.A.Shanmugam, Reliable Routing against Selective Packet Drop Attack in DSR based MANET, In the proceedings of JOURNAL OF SOFTWARE, VOL. 4, NO. 6, AUGUST 2009. [5] Angel Mary Alex, M. Ashwin, Detection of Stealthy Attacks of Packet Dropping in Wireless Ad Hoc Networks, In the proceedings of International Journal of Science, Engineering and Technology Research (IJSETR). [6] P.Swetha, Vinod Bhupathi, MITIGATION OF PACKET DROP ATTACK IN MANET, In the proceedings of National Conference on Advances in computing and Networking (NACACN) ISBN:9789383038114.

AUTHOR:
P.Swetha has received the B.Tech degree in Computer Science Engineering (CSE) Department from JNTUH College of Engineering. M.Tech Degree in Computer Science (CS) from School of Information Technology(SIT), JNTUH College of Engineering. She is now working as an Associate Professor in CSE Department, JNTUH college of Engineering, Jagityal. She Volume 2, Issue 6 November December 2013 Page 214

You might also like