EAACK—A
Secure Intrusion-Detection System for MANETs
ABSTRACT:
The migration
to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it
possible in many applications. Among all the contemporary wireless networks, Mobile
Ad hoc NETwork (MANET) is one of the most important and unique applications. On
the contrary to traditional network architecture, MANET does not require a
fixed network infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they are both
within the same communication range. Otherwise, they rely on their neighbors to
relay messages. The self-configuring ability of nodes inMANETmade it popular
among critical mission applications like military use or emergency recovery.
However, the open medium and wide distribution of nodes make MANET vulnerable
to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection
mechanisms to protect MANET from attacks. With the improvements of the
technology and cut in hardware costs, we are witnessing a current trend of expanding
MANETs into industrial applications. To adjust to such trend, we strongly
believe that it is vital to address its potential security issues. In this
paper, we propose and implement a new intrusion-detection system named Enhanced
Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to
contemporary approaches, EAACK demonstrates higher malicious-behavior-detection
rates in certain circumstances while does not greatly affect the network
performances.
AIM:
In this paper a new Intrusion-Detection system technique is
used to prevent a malicious node in the MANETS, the malicious attacker used the
wide distribution and open medium features of the MANETS to establish the
vulnerabilities in the network.
SYNOPSIS:
MANET is a self-configuring infrastructure network of
mobile devices connected by wireless network it equipped with both a wireless
transmitter and a receiver that communicate each other bidirectional wireless
either directly or indirectly.
One of the major advantages of wireless networks is its
ability to allow data communication between different parties and still maintain
their mobility. This means that two nodes cannot communicate with each other
when the distance between the two nodes is beyond the communication range of
their own. MANET solves this problem by allowing intermediate parties to relay
data transmissions. This is achieved by dividing
MANET into two types of networks, namely, single-hop and
multihop. Unfortunately, the open medium and remote distribution of MANET make
it vulnerable to various types of attacks.
Due to the nodes lack of physical protection, malicious
attackers can easily capture and compromise nodes to achieve attacks. In
particular, considering the fact that most routing protocols in MANETs assume
that every node in the network behaves cooperatively with other nodes and
presumably not malicious.
If MANET can detect the attackers as soon as
they enter the network, we will be able to completely eliminate the potential
damages caused by compromised nodes at the first time. IDSs usually act as the
second layer in MANETs, and they are a great complement to existing proactive
approaches.
EXISTING SYSTEM:
By definition,
Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with
both a wireless transmitter and a receiver that communicate with each other via
bidirectional wireless links either directly or indirectly. Unfortunately, the
open medium and remote distribution of MANET make it vulnerable to various
types of attacks. For example, due to the nodes’ lack of physical protection, malicious
attackers can easily capture and compromise nodes to achieve attacks. In
particular, considering the fact that most routing protocols in MANETs assume
that every node in the network behaves cooperatively with other nodes and presumably
not malicious, attackers can easily compromise MANETs by inserting malicious or
noncooperative nodes into the network. Furthermore, because of MANET’s
distributed architecture and changing topology, a traditional centralized monitoring
technique is no longer feasible in MANETs. In such case, it is crucial to develop
an intrusion-detection system (IDS) specially designed for MANETs.
DISADVANTAGES OF EXISTING SYSTEM:
Watchdog scheme
fails to detect malicious misbehaviors with the presence of the following: 1)
ambiguous collisions; 2) receiver collisions; 3) limited transmission power; 4)
false misbehavior report; 5) collusion; and 6) partial dropping.
The TWOACK
scheme successfully solves the receiver collision and limited transmission
power problems posed by Watchdog. However, the acknowledgment process required
in every packet transmission process added a significant amount of unwanted
network overhead. Due to the limited battery power nature of MANETs, such
redundant transmission process can easily degrade the life span of the entire
network.
The concept of
adopting a hybrid scheme in AACK greatly reduces the network overhead, but both
TWOACK and AACK still suffer from the problem that they fail to detect
malicious nodes with the presence of false misbehavior report and forged
acknowledgment packets.
PROPOSED SYSTEM:
In fact, many
of the existing IDSs in MANETs adopt an acknowledgment-based scheme, including
TWOACK and AACK. The functions of such detection schemes all largely depend on
the acknowledgment packets. Hence, it is crucial to guarantee that the
acknowledgment packets are valid and authentic. To address this concern, we
adopt a digital signature in our proposed scheme named Enhanced AACK (EAACK).
ADVANTAGES OF PROPOSED SYSTEM:
Our proposed approach EAACK is designed
to tackle three of the six weaknesses of Watchdog scheme, namely, false misbehavior,
limited transmission power, and receiver collision.
MODULES:
ACK implementation
Secure Acknowledgment (S-ACK)
Misbehavior Report Authentication (MRA)
Digital Signature Validation
MODULES DESCRIPTION:
ACK implementation:
ACK is basically an end – to – end acknowledgment scheme
.It is a part of EAACK scheme aiming to reduce the network overhead when no
network misbehavior is detected.
The basic flow is if Node A sends
an packet p1 to destination Node D, if all the intermediate node are
cooperative and successfully receives the request in the Node D. It will send
an ACK to the source (Node A) , if ACK from the destination get delayed then it
S-ACK process will be initialized.
Secure Acknowledgment (S-ACK):
In the S-ACK principle is to let every three consecutive
nodes work in a group to detect misbehaving nodes. For every three consecutive
nodes in the route, the third node is required to send an S-ACK acknowledgment
packet to the first node. The intention of introducing S-ACK mode is to detect
misbehaving nodes in the presence of receiver collision or limited transmission
power.
Misbehavior Report Authentication
(MRA):
The MRA scheme is designed to resolve the weakness of
watchdog with respect to the false misbehavior report. In this source node
checks the alternate route to reach destination. Using the generated path if
the packet reaches the destination then it is concluded as the false report.
Digital Signature Validation:
In all the three parts of EAACK, namely, ACK, S-ACK, and
MRA, are acknowledgment-based detection schemes. They all rely on
acknowledgment packets to detect misbehaviors in the network. Thus, it is
extremely important to ensure that all acknowledgment packets in EAACK are
authentic and untainted. Otherwise, if the attackers are smart enough to forge
acknowledgment packets, all of the three schemes will be vulnerable.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard Disk -
20 GB
ü Key Board -
Standard Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System : Windows XP
ü Programming Language :
JAVA
ü Java Version :
JDK 1.6 & above.
REFERENCE:
Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and
Tarek R. Sheltami, Member, IEEE, “EAACK—A Secure Intrusion-Detection System
for MANETs”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3,
MARCH 2013.