You are on page 1of 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com


Volume 2, Issue 3, May – June 2013 ISSN 2278-6856

Investigative analysis of repudiation attack on


MANET with different routing protocols
Amit M Holkar1, Neha Shinde Holkar2 and Dhiiraj Nitnawwre3
1
ME Scholar (Digital Communication)
Institute of Engineering & Technology, DAVV-Indore,
Department of Electronics & Communication Engineering
2
ME Scholar (Information Technology)
Medicaps Institute of Science & Technology, Indore
Department of Computer Science & Engineering

3
Assistant Professor (Department of ECE)
Institute of Engineering & Technology, DAVV-Indore,
Department of Electronics & Communication Engineering

Abstract: In this paper we present an investigative analysis The mobile ad hoc network has the following typical
of Repudiation attack that arrives at the application layer in features [1]:
mobile ad-hoc network. Most of the research work in MANET 1. Unreliability of wireless links between nodes. Because
is focused on network layer attack analysis because most of the limited energy supply for the wireless nodes and
attacks can be identified and its effect can be neutralized on the mobility of the nodes, the wireless links between
network layer itself. But some attacks bypasses the network mobile nodes in the ad hoc network are not consistent for
layer and reaches to affect the application layer .In this
the communication participants.
paper, we also implemented different routing protocols for
the analysis and compare them using performance
2. Constantly changing topology. Due to the continuous
parameters like Throughput, Delay & Load. In order to motion of nodes, the topology of the mobile ad hoc
suggest the most efficient routing protocol under the network changes constantly: the nodes can continuously
influence of repudiation attack, we use this comparative move into and out of the radio range of the other nodes in
study. In this comparative study we found that AODV the ad hoc network, and the routing information changes
protocol is better if we consider Throughput and Delay as all the time because of the movement of the nodes.
performance parameter and DSR is better if we consider 3. Lack of incorporation of security features in statically
Load as performance parameter. configured wireless routing protocol not meant for ad hoc
environments. Because the topology of the ad hoc
Keywords: Repudiation, routing protocols, mobile nodes, networks is changing constantly, it is necessary for each
scenario pair of adjacent nodes to incorporate in the routing issue
so as to prevent some kind of potential attacks that try to
1. Introduction make use of vulnerabilities in the statically configured
Mobile Ad-Hoc Network (MANET) is a decentralized self routing protocol.
configured wireless system having free nodes. A MANET 1.1 Routing Protocols
also consists of mobile nodes, a router with multiple hosts This section presents the most common routing protocols
and wireless communication devices. Security in Mobile in mobile ad-hoc networks. There are basically three
Ad-hoc Networks always draws attention of the types of routing protocols which are discussed below:
researcher due to its unsecured boundaries, infrastructure
1.1.1 Table Driven Routing Protocol
less system and dynamic & random behavior. Most of the
works in MANET have been focused on the Network In table driven routing protocols each node in the network
Layer attacks because the attacks can be identified and its maintains the updated routing table information by
effects can be minimized on the Network layer itself. On frequent exchanging the information among the nodes.
the other hand, few attacks bypass the network layer This reduces the delay time of sending data or
security and reached the Application Layer. This paper information from one node to another because nodes will
investigate the effect of Application layer attack on spend no time in discovering the route. This type of
Mobile Ad-hoc Network using OPNET simulator and routing protocols approximately works the same way as
compare the outcomes of investigation of with and the wired network routing protocol works. The table
without attacks using different routing protocols. In our driven protocols are DSDV and WRP.
simulation, we investigate the Repudiation attack using a
1.1.2 On Demand Routing Protocols
misbehavior node and compare it with a scenario of nodes
applying different routing protocols. In on demand routing protocols, a node simply maintains
routes information to get destination that it needs to send
Volume 2, Issue 3 May – June 2013 Page 356
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 2, Issue 3, May – June 2013 ISSN 2278-6856

required data packets. The routes to get their desire repudiation attack on a commercial system: a selfish
destinations will expire automatically after some time of person could deny conducting an operation on a credit
idleness, while the network is not being used. These card purchase or deny any on-line transaction [3].
routing protocols are AODV, DSR and TORA.
1.1.3 Hybrid routing Protocols
Table 1: Security attacks at each layer [4]
In this type of routing protocol is the combination of the
above two categories. In which nodes belonging to a Sno Layer Attacks
particular geographical area or within a certain
detachment from an anxious node are said to be in Repudiation, Data Corruption,
1 Application
routing area and uses table driven routing protocol. Malicious code attack
Communication between nodes in different areas will rely
on the source initiated or on-demand routing protocols. Session Hijacking, SYN
This routing protocol Include ZRP. 2 Transport
flooding
2 Application Layer attacks
Wormhole, blackhole,
Applications layer need to be designed to handle frequent Byzantine, flooding, resource
3 Network
disconnection and reconnection with peer applications as consumption,location
well as widely varying delay and packet loss disclosure attacks
characteristics [2]. Like other layers application layer also Traffic analysis, monitoring,
vulnerable and attractive layer for the attacker to attack. 4 Data Link disruption MAC (802.11),
Because this layer contains user data that supports many WEP Weakness
protocols such as SMTP, HTTP, TELNET and FTP Jamming, interceptions,
which have many vulnerabilities and access points for 5 Physical
eavesdropping
attackers. The main attacks in application layer are
malicious code attacks and repudiation attacks.

2.1 Malicious code attack 3 Simulation Environments


In this attack a malicious node attack on the operation In this paper we have explained the investigative result
system (OS) of the other host node on the network. obtained from the simulation of different scenarios using
Malicious node sent a Malware or Trojan virus in to a OPNET Modeller 14.5. There are four different network
victim node. These attacks are severe and cause victim scenario which we implement in OPNET and they are
node to stop using the network resources. Malicious code given below:
attacks are a vulnerable program that attack on host 1. MANET using DSR protocol without attack.
nodes. Trojan virus infects the operation system however 2. MANET using AODV protocol without attack.
Malware code copy itself on the network and keep 3. MANET using DSR protocol with Repudiation attack.
spreading around the network. the aim of these attack are 4. MANET using AODV protocol with Repudiation
to constrain itself on the network and whenever a attack.
new nodes get IP access it start itself on the operation
system on the node without giving any notice to node. We compare the above scenarios by taking Delay and
These attacks mostly seek the specific information on the Throughput as performance parameter.
legitimate node and sent information to malicious node
which will be used to collection personal information and 3.1 Network Scenario Description
specifics information to attack on other nodes. In the simulation of mobile ad-hoc networks through
OPNET we use 5 MANET node, 1Misbehavior node,
2.2 Repudiation attack Profile configuration, Application configuration &
Transport layer and network layer security is not enough Mobility configuration. Attributes of MANET stations are
to prevent the attacker to attack on the nodes in network. used as below:
Repudiation is the attack which is by passed by attacker 1.Adhoc routing protocol-AODV/DSR
from transport and network layer. Repudiation attacks 2.Packet size (packets)-infinity
refer as denial of participation in the communication. 3.Addrssing mode –IPv4
Repudiation attack can be seen as Malware 4.Transmit power -0.0005 (W)
whereas an attacker node keep accessing the system as a 5.Buffer size (bits)-256000
selfish node and deny any conducting operation which is 6.Larg packet processing-Drop
coming from system in order to communication on the
network. Therefore, the solution that taken to solve Application configuration model is used in the network
authentication or non-repudiation attacks in network topology. The application config node can be used for the
layer or in transport layer is not enough. Example of following specification.

Volume 2, Issue 3 May – June 2013 Page 357


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 2, Issue 3, May – June 2013 ISSN 2278-6856

1. ACE Tiers information 4 Simulation result & Analysis


2. Application specification
3. Voice encoder schemes We got four comparative results, two for each routing
protocol (AODV & DSR), between scenarios with one
Profile configuration model is used in the network attack and one without attack. We simulate the result
topology. The profile config node can be used to create keeping simulation time of 300 sec. All results are taken
user profiles. These user profiles can then be specified on on the scale of time-average. Below we describe the
different nodes in the network to generate application analysis of our simulated result:
layers traffic. Mobility configuration is used to define the
mobility of wireless stations.

3.2 Implementation of Repudiation attack


As discussed earlier, repudiation attack denies the
participation in communication. We found two ways to
create a repudiation attack by either fail a node or by
creating a misbehavior node by changing the attributes of
a MANET node so that it behaves differently from the
other nodes. By failing the node we mean completely
denying a node to communicate, but it is likely to have
one less MANET node in the network. Therefore we have Figure 2: Comparison of Simulation result of Delay in
used second option to create a Misbehavior node by MANET using AODV & DSR protocols without attack
changing the following tabulated attributes.
Above graph shows that AODV is having less delay than
Table 2: Comparison of MANET node attributes with DSR in no attack scenario
Misbehavior node attributes

Value
Value (Misbehavior
S No Attributes (MANET
node)
node)

1 Trajectory Vector None

Transmit
2 0.005 0.001
Power (W)

Figure 3: Comparison of Simulation result of Delay in


3 Data Rate 11mbps 2Mbps MANET using AODV & DSR protocols with repudiation
attack

Large In above simulated result it is shown that AODV has less


4 Packet Drop Fragment delay than DSR with repudiation attack.
processing

Figure 4: Comparison of Simulation result of Throughput


Figure 1 Scenario representing misbehavior node in MANET using AODV & DSR protocols without attack

Volume 2, Issue 3 May – June 2013 Page 358


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 2, Issue 3, May – June 2013 ISSN 2278-6856

Above graph shows that while taking throughput as a Processing and Management (IJIPM), Vol. 1, No. 1,
performance parameter, both protocols are giving almost pp. 4-14, July 2010.
same result but still AODV is on the higher side. [8] Shuyao Yu, Youkun Zhang, Chuck Song, and Kai
Chen. A security architecture for Mobile Ad Hoc
Networks.

Figure 5: Comparison of Simulation result of Throughput


in MANET using AODV & DSR protocols with
repudiation attack

5 Conclusions
On analysis of above simulation results we conclude that
AODV protocol gives better result in case of both delay
and throughput. It may also be conclude that AODV
protocol performs better in dealing with Application layer
attack.

References
[1] Amitabh Mishra and Ketan M. Nadkarni, Security in
Wireless Ad Hoc Networks, in Book The Handbook
of Ad Hoc Wireless Networks (Chapter 30), CRC
Press LLC, 2003.
[2] Amit M Holkar, Neha Shinde Holkar and Dhiiraj
Nitnawwre, Investigatioin of Application attack on
MANET, IJCA June 2013 edition (ISBN No- 973-93-
80875-44-0)
[3] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of
Attacks and Countermeasures in Mobile Ad Hoc
Networks,” Department of Computer Science and
Engineering, Florida Atlantic Universitymi
[4] Amit M Holkar, Neha Shinde Holkar and Dhiiraj
Nitnawwre, Investigatioin of Application attack on
MANET, IJCA June 2013 edition (ISBN No- 973-93-
80875-44-0)
[5] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of
Attacks and Countermeasures in Mobile Ad Hoc
Networks,” Department of Computer Science and
Engineering, Florida Atlantic Universitymi
[6] Renu Mishr, Sanjeev Sharma, Rajeev Agrawal, IEEE
2010, Vulnerabilities and Security of Ad-hoc
Networks.
[7] N. Meghanathan, “A Simulation-based Performance
Analysis of Multicast Routing in Mobile Ad hoc
Networks,” International Journal of Information
Volume 2, Issue 3 May – June 2013 Page 359

You might also like