A Secure Framework for Detecting and Preventing Grayhole Attack (SFAODV)

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-43 Number-5
Year of Publication : 2017
Authors : Asif Uddin Khan, Bikram Kesari Ratha
DOI :  10.14445/22315381/IJETT-V43P244

Citation 

Asif Uddin Khan, Bikram Kesari Ratha "A Secure Framework for Detecting and Preventing Grayhole Attack (SFAODV)", International Journal of Engineering Trends and Technology (IJETT), V43(5),259-267 January 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Mobile Ad-hoc Network (MANET) is a network where nodes cooperate each other to communicate data through multi-hop nodes. It has numerous applications in the current and future networking generations. Due to the popularity of Internet of Things (IOT), where everything can be connected, there is a vital role of MANET in communicating among the IOT devices to exchange information. However providing QOS in terms of security to this network is an important issue. In this paper we investigate grayhole attack in MANET and do analysis with ns2 experimental results and show how the performance degradation of the MANET occurs due to such attack. We then propose a scheme to detect and prevent grayhole attacks in various scenarios. We propose a secure routing frame work based on elliptic curve cryptography digital signature algorithm (ECDSA) which can prevent and detect the grayhole attack with improved performance. We take (Ad-hoc On Demand Distance Vector routing) AODV protocol for implementing our scheme and evaluating performance taking various performance metrics such as packet delivery ratio, end to end delay, throughput and routing overhead to show that our scheme resolve the grayhole attack with better performance.

 References

[1] S. S. Anjum, R. M. Noor and M. H. Anisi, "Survey on MANET Based Communication Scenarios for Search and Rescue Operations," 2015 5th International Conference on IT Convergence and Security (ICITCS), Kuala Lumpur, 2015, pp. 1-5. doi: 10.1109/ICITCS.2015.7293023.
[2] M. Rath and B. K. Pattanayak, "A methodical survey on real time applications in MANETS: Focussing on key issues," 2014 International Conference on High Performance Computing and Applications (ICHPCA), Bhubaneswar, 2014, pp. 1-5. doi: 10.1109/ICHPCA.2014.7045301.
[3] G. Karagiannis et al., "Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions," in IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 584-616, Fourth Quarter 2011. doi: 10.1109/SURV.2011. 061411.00019
[4] P. Bellavista, G. Cardone, A. Corradi and L. Foschini, "Convergence of MANET and WSN in IoT Urban Scenarios," in IEEE Sensors Journal, vol. 13, no. 10, pp. 3558-3567, Oct. 2013. doi: 10.1109/JSEN.2013.2272099.
[5] Perkins, Charles, Elizabeth Belding-Royer, and Samir Das. Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561. 2003.
[6] Perkins, Charles E., and Pravin Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers." ACM SIGCOMM computer communication review. Vol. 24. No. 4. ACM, 1994.
[7] Clausen, Thomas, and Philippe Jacquet. Optimized link state routing protocol (OLSR). No. RFC 3626. 2003.
[8] Johnson, David B., David A. Maltz, and Josh Broch. "DSR: The dynamic source routing protocol for multi- hop wireless ad hoc networks." Ad hoc networking 5 (2001): 139-172.
[9] Park, Vincent, and M. Scott Corson. Temporally- ordered routing algorithm (TORA) version 1 functional specification. Internet-Draft, draft-ietf- manet-tora-spec-00. txt, 1997.
[10] Raffo, Daniele, et al. "An advanced signature system for OLSR." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004.
[11] Adjih, Cédric, Daniele Raffo, and Paul Mühlethaler. "Attacks against OLSR: Distributed key management for security." 2nd OLSR Interop/Workshop, Palaiseau, France. 2005.
[12] Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Wormhole attacks in wireless networks." IEEE journal on selected areas in communications24.2 (2006): 370-380.
[13] Adjih, Cedric, et al. "Securing the OLSR protocol." Proceedings of Med-Hoc-Net. 2003.
[14] Patel, Ankit D., and Kartik Chawda. "Blackhole and grayhole attacks in MANET." Information Communication and Embedded Systems (ICICES), 2014 International Conference on. IEEE, 2014..
[15] Kannhavong, Bounpadith, et al. "NIS01-2: A collusion attack against olsr-based mobile Ad Hoc networks." IEEE Globecom 2006. IEEE, 2006.
[16] Patel, Meenakshi, and Sanjay Sharma. "Detection of malicious attack in MANET a behavioral approach." Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013.
[17] Sen, Jaydip, et al. "A mechanism for detection of grayhole attack in mobile Ad Hoc networks." Information, Communications & Signal Processing, 2007 6th International Conference on. IEEE, 2007.
[18] Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala, “ A novel approach for Grayhole and Blackhole Attack in Mobile Adhoc Networks.” , Second International Conference on Advanced Computing & Communication Technologies, IEEE, 2012.
[19] Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala, “ Improving Route Discovery for AODV to prevent Blackhole and Grayhole Attacks in MANETs.” , INFOCOMP, Version 11, No. 1, p. 01-02, March 2012.
[20] Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, Arjun Agarwal, “Detection and Removal of Co-operative Blackhole and Grayhole attacks in MANET’s “, International Conference on System Engineering and Technology, IEEE, 2012.
[21] Chen Wei, Long Xiang, Bai Yubein, Gao Xiaopeng, “ A new solution for resisting Grayhole Attack in Mobile Adhoc Networks.” , IEEE, 2007.
[22] Gao Xaiopeng, Chen Wei, “ A novel Gray Hole Detection Scheme for Mobile Adhoc Networks.”, IFIP International Conference on Networking and Parallel Computing –Workshops, IEEE, 2007.
[23] Jaydip Sen, M. Girish Chandra, Harihara S.G. , Harish Reddy, P. Balamuralidhar, “ A mechanism for Detection of Grayhole Attack in Mobile Adhoc Networks.”, IEEE, 2007.
[24] Vishnu K, Amos J. Paul , “Detection and Removal of Cooperative Black/Gray hole attack in mobile adhoc networks.” , International Journal of Computer Applications,Vol.1,No.22, 2010.
[25] Avenash Kumar and Meenu Chawla, “Destination based group Grayhole attack detection in MANET through AODV”, International Journal of Computer Sciences , Vol 9 issue 4, No 1, July 2012.
[26] Sukla Banerjee, “ Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008, WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
[27] Chetan S. Dhamade, Prof. H. R. Deshmukh, “An Efficient way to minimize the impact of the Grayhole attack in Adhoc network”, International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue 2, February 2012.
[28] Disha G. Kariya, Atul B. Kathole, Sapna R. Heda, “Detecting Black and Gray Hole Attacks in Mobile Adhoc Network Using an Adaptive Method,”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 1, January 2012.
[29] Rutvij H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs “, Third International Conference on Advanced Computing & Communication Technologies, IEEE, 2013.
[30] Schweitzer, Nadav, et al. "Contradiction Based Gray- Hole Attack Minimization for Ad-Hoc Networks." IEEE Transactions on Mobile Computing (2016).
[31] Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone. Guide to elliptic curve cryptography. Springer Science & Business Media, 2006.
[32] Koblitz, Neal, Alfred Menezes, and Scott Vanstone. "The state of elliptic curve cryptography." Towards a quarter-century of public key cryptography. Springer US, 2000. 103-123.
[33] Kar, Binayak, et al. "Ecc Based Self Proxy Signature Scheme." International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011). ASME Press, 2011.
[34] Nickalls, R. W. D. "A new approach to solving the cubic: Cardan`s solution revealed." The Mathematical Gazette 77.480 (1993): 354-359.
[35] Stallings, William. Cryptography and network security: principles and practices. Pearson Education India, 2006.

Keywords
of service, digital signature, MANET, ECC, IOT, routing protocols,security.