Professional Documents
Culture Documents
3
Assistant Professor (Department of ECE)
Institute of Engineering & Technology, DAVV-Indore,
Department of Electronics & Communication Engineering
Abstract: In this paper we present an investigative analysis The mobile ad hoc network has the following typical
of Repudiation attack that arrives at the application layer in features [1]:
mobile ad-hoc network. Most of the research work in MANET 1. Unreliability of wireless links between nodes. Because
is focused on network layer attack analysis because most of the limited energy supply for the wireless nodes and
attacks can be identified and its effect can be neutralized on the mobility of the nodes, the wireless links between
network layer itself. But some attacks bypasses the network mobile nodes in the ad hoc network are not consistent for
layer and reaches to affect the application layer .In this
the communication participants.
paper, we also implemented different routing protocols for
the analysis and compare them using performance
2. Constantly changing topology. Due to the continuous
parameters like Throughput, Delay & Load. In order to motion of nodes, the topology of the mobile ad hoc
suggest the most efficient routing protocol under the network changes constantly: the nodes can continuously
influence of repudiation attack, we use this comparative move into and out of the radio range of the other nodes in
study. In this comparative study we found that AODV the ad hoc network, and the routing information changes
protocol is better if we consider Throughput and Delay as all the time because of the movement of the nodes.
performance parameter and DSR is better if we consider 3. Lack of incorporation of security features in statically
Load as performance parameter. configured wireless routing protocol not meant for ad hoc
environments. Because the topology of the ad hoc
Keywords: Repudiation, routing protocols, mobile nodes, networks is changing constantly, it is necessary for each
scenario pair of adjacent nodes to incorporate in the routing issue
so as to prevent some kind of potential attacks that try to
1. Introduction make use of vulnerabilities in the statically configured
Mobile Ad-Hoc Network (MANET) is a decentralized self routing protocol.
configured wireless system having free nodes. A MANET 1.1 Routing Protocols
also consists of mobile nodes, a router with multiple hosts This section presents the most common routing protocols
and wireless communication devices. Security in Mobile in mobile ad-hoc networks. There are basically three
Ad-hoc Networks always draws attention of the types of routing protocols which are discussed below:
researcher due to its unsecured boundaries, infrastructure
1.1.1 Table Driven Routing Protocol
less system and dynamic & random behavior. Most of the
works in MANET have been focused on the Network In table driven routing protocols each node in the network
Layer attacks because the attacks can be identified and its maintains the updated routing table information by
effects can be minimized on the Network layer itself. On frequent exchanging the information among the nodes.
the other hand, few attacks bypass the network layer This reduces the delay time of sending data or
security and reached the Application Layer. This paper information from one node to another because nodes will
investigate the effect of Application layer attack on spend no time in discovering the route. This type of
Mobile Ad-hoc Network using OPNET simulator and routing protocols approximately works the same way as
compare the outcomes of investigation of with and the wired network routing protocol works. The table
without attacks using different routing protocols. In our driven protocols are DSDV and WRP.
simulation, we investigate the Repudiation attack using a
1.1.2 On Demand Routing Protocols
misbehavior node and compare it with a scenario of nodes
applying different routing protocols. In on demand routing protocols, a node simply maintains
routes information to get destination that it needs to send
Volume 2, Issue 3 May – June 2013 Page 356
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 2, Issue 3, May – June 2013 ISSN 2278-6856
required data packets. The routes to get their desire repudiation attack on a commercial system: a selfish
destinations will expire automatically after some time of person could deny conducting an operation on a credit
idleness, while the network is not being used. These card purchase or deny any on-line transaction [3].
routing protocols are AODV, DSR and TORA.
1.1.3 Hybrid routing Protocols
Table 1: Security attacks at each layer [4]
In this type of routing protocol is the combination of the
above two categories. In which nodes belonging to a Sno Layer Attacks
particular geographical area or within a certain
detachment from an anxious node are said to be in Repudiation, Data Corruption,
1 Application
routing area and uses table driven routing protocol. Malicious code attack
Communication between nodes in different areas will rely
on the source initiated or on-demand routing protocols. Session Hijacking, SYN
This routing protocol Include ZRP. 2 Transport
flooding
2 Application Layer attacks
Wormhole, blackhole,
Applications layer need to be designed to handle frequent Byzantine, flooding, resource
3 Network
disconnection and reconnection with peer applications as consumption,location
well as widely varying delay and packet loss disclosure attacks
characteristics [2]. Like other layers application layer also Traffic analysis, monitoring,
vulnerable and attractive layer for the attacker to attack. 4 Data Link disruption MAC (802.11),
Because this layer contains user data that supports many WEP Weakness
protocols such as SMTP, HTTP, TELNET and FTP Jamming, interceptions,
which have many vulnerabilities and access points for 5 Physical
eavesdropping
attackers. The main attacks in application layer are
malicious code attacks and repudiation attacks.
Value
Value (Misbehavior
S No Attributes (MANET
node)
node)
Transmit
2 0.005 0.001
Power (W)
Above graph shows that while taking throughput as a Processing and Management (IJIPM), Vol. 1, No. 1,
performance parameter, both protocols are giving almost pp. 4-14, July 2010.
same result but still AODV is on the higher side. [8] Shuyao Yu, Youkun Zhang, Chuck Song, and Kai
Chen. A security architecture for Mobile Ad Hoc
Networks.
5 Conclusions
On analysis of above simulation results we conclude that
AODV protocol gives better result in case of both delay
and throughput. It may also be conclude that AODV
protocol performs better in dealing with Application layer
attack.
References
[1] Amitabh Mishra and Ketan M. Nadkarni, Security in
Wireless Ad Hoc Networks, in Book The Handbook
of Ad Hoc Wireless Networks (Chapter 30), CRC
Press LLC, 2003.
[2] Amit M Holkar, Neha Shinde Holkar and Dhiiraj
Nitnawwre, Investigatioin of Application attack on
MANET, IJCA June 2013 edition (ISBN No- 973-93-
80875-44-0)
[3] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of
Attacks and Countermeasures in Mobile Ad Hoc
Networks,” Department of Computer Science and
Engineering, Florida Atlantic Universitymi
[4] Amit M Holkar, Neha Shinde Holkar and Dhiiraj
Nitnawwre, Investigatioin of Application attack on
MANET, IJCA June 2013 edition (ISBN No- 973-93-
80875-44-0)
[5] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of
Attacks and Countermeasures in Mobile Ad Hoc
Networks,” Department of Computer Science and
Engineering, Florida Atlantic Universitymi
[6] Renu Mishr, Sanjeev Sharma, Rajeev Agrawal, IEEE
2010, Vulnerabilities and Security of Ad-hoc
Networks.
[7] N. Meghanathan, “A Simulation-based Performance
Analysis of Multicast Routing in Mobile Ad hoc
Networks,” International Journal of Information
Volume 2, Issue 3 May – June 2013 Page 359