Malicious Nodes Detection by CBDS Scheme in WSNs

DOI : 10.17577/IJERTCONV5IS22025

Download Full-Text PDF Cite this Publication

Text Only Version

Malicious Nodes Detection by CBDS Scheme in WSNs

Guruprasanna R

Research Assistant, Electronics and communication MS Engineering College, Bengaluru, India

Abstract: The MANET [mobile ad-hoc network] is most popular and most applicable term and MANET consists of number of mobile nodes, and each independent node in the MANET can communicate with the other node without any wire connections. In the presence of malicious nodes in the MANET, Leads to serious security problem because it will disturb the entire routing processes. So in this paper we are introducing a new method to solve this problem. This papergives a new method called CBDS [co-operative bait discovery method] to detect a malicious attack caused by malicious nodes in the MANET, and establish the efficient route in the network to carry the data from source node to destination node without any data loss and establish the efficient route by using the routing scheme called DSR [Dynamic source routing scheme].This CBDS method implements a new technique to detect the exact position of malicious nodes in the network called Reverse trapping technique. The CBDS scheme takes the advantage of both pro-active and reactive mechanism to achieve the goal of this paper. Simulation results are shown, this simulation results of our CBDS scheme is compare with the existing scheme called DSR scheme in relations of delay, routing overhead, PDR (Packet delivery ratio) and finally Throughput.

Keywords: CBDS [co-operative bait discovery scheme], MANETs[mobile ad hoc networks], DSR [dynamic source route].

In the below figure ii, shows how the malicious nodes are attract data packets in the network by forged route response. By this false RREP the malicious nodes carry the selected data packets to other un-defined destination or false destination [1].In generally these malicious nodes introduce two types of attacks in the network. They are blackhole attack and grayhole attack. In black hole attack, The malicious nodes which are present in the network can captured the entire data packets from source node and send this captured data to un-defined fake destination this creates a damages in the routing process.

I INTRODUCTION

The MANET [mobile ad hoc networks] is widely used technology for various applications because of its unique features and this mobile ad hoc networks are motivatedvarious wireless applications such as military, educations, hospitals and entertainment etc. The unique features of the MANETs is it has the capability of self- organizing and independent organization. During, transmission of data between the nodes in MANET, the cooperation between nodes is also very important showing in figure i. Because in Manet each node works as host and also acts as a router.This important feature also sometimes come as dangerous problem during the data transmission, because if the malicious nodes is present in thenetwork, this nodes occurs a disturbance to entire routing process.

Fig. i: MANET structure.

Fig. ii: packet dropping by malicious node n4

But in the grayhole attack initially malicious nodes are not detected but in later by the dropping of the date in PDR the grayhole attack will be detected. In this paper we are concentrated on grayhole and blackholeattack detection caused by malicious nodes and establishment of an effective path between nodes by using the DSR [dynamic source route scheme] [1].

To, design an effective path between nodes in the network we are using a DSR technique. This DSR technique does not comprise in detecting of any malicious nodes in the network. This DSR involves only in the effective path discovery between nodes.Initially the source node send a path request or route request [RREQ] to all nodes. When this path request reaches the all nodes, each nodes in the network gives the route responses to that request. During that path response time each nodes in the MANET adds its entire address information in that RREQ packet. This RREQ packet consist of route record with in that route or path record, the address information of each node will be store. When the destination node receives this path request packet, then destination node will get know about in between nodes address in the whole route.After

the destination node receive the route or path request packet [RREQ], immediately it sends a path response [RREP] to source node. This path response packet contains the entire routing information and within this route or path response packet contains the entire information of established route between source node to destination node. If the RREP packet contains any false or fake destination address then source node will get know the fake destination address replied node is malicious node. Now we, are introducing a new method called CBDS [co-operative bait discovery scheme]for detection of malicious attack in the WSNs

In this new method we are used an address of the neighbour node as bait terminus address to attract the malicious node in the network to send a path response or route response [RREP] to source node and in this new method we are using a new technique to trace the exact location of the malicious nodes in the network, that technique is called REVERSE TRAPPING TECHNIQUE for detecting malicious nodes in the MANETs. The detected malicious nodes by this technique are kept in the blackhole list, and send alarm to all nodes which are present in the network. After receiving of this alarm message by all nodes in the network. Each nodes stop the communication with the nodes which are present in the blackhole list.

  1. EXISTING SYSTEMS

    In generally the detection of malicious nodes mechanism are classified into mainly two categories that are pro-active detection and re-active detection scheme. First, in pro-active detection scheme, during the detection of malicious nodes we need to monitor all nearby nodes constantly. During the time of constant monitoring of neighbor nodes the routing overhead is constantly created and another important factor is the resources used for this malicious nodes detection scheme is constantly wasted andin this scheme malicious nodes, attacks are detected and prevented initially. Similarly another technique is called reactive detection scheme, this technique is also used detect malicious attack in the network. Compare to pro-active detection scheme this technique is not initiate initial stage this will initiated during, if the significant drop occur at the destination in packet delivery ratio.

    In above mentioned two schemes, the one scheme is used in the existing malicious node detection technique called 2 acknowledgement detection schemes [5]. This two acknowledgement detection scheme for malicious nodes in the MANETs is most popular. In this scheme the pro-active detection scheme is used to detect malicious nodes in the networks. Initially the two hop acknowledgement packets is pass within the route of the network in opposite direction. By using of this acknowledgement packets is to finding whether data packets are successfully received or not. If successfully packet is received at the destination the process will terminate or again process will starts by sending the two hop acknowledgement in opposite direction and in this scheme the parameter acknowledgement ratio Rackis used is regulate the received data packets. Due to this pro-active detection scheme

    based, the additional routing overhead is existing in the presence of malicious nodes in the network.

    Next existing method is BFTR[best effort fault tolerance method]. In this method, before sending the data end to end acknowledgements are injected into the network, this acknowledgements indicates whether the data is successfully received or not. This method also similar to the 2ACK method, this method also failed when the multiple malicious nodes present in the network[7].

    Another existing malicious node detection scheme is DSR based scheme [6]. D. Johnson and D. Maltz proposed this DSR scheme. In this technique they proposed DSR protocol. During malicious nodes presence in the network, this protocol gives the efficient routing process. But the important drawback of this scheme is, if the multiple malicious nodes present in the networkthis scheme is failed to exist the efficient route and also does not focuses on security concerns. Compare to existing systems the CBDS scheme effectively detects the malicious nodes.

  2. METHODOLGY

    In this paper, the new propose detection method called co-operative bait discovery scheme [CBDS] to detect grayhole/collaborative black hole attack caused by the malicious nodes in MANETs.

    In this newly introduced method, initially the source randomly selects all nodes which are present with in the network and this source node use a neighbour node address as the bait address to detect the address of the malicious node to send path response or route response packet.. In this CBDS detection method the malicious node is detected and avoid the participation of malicious node can be achieved by the reverse trapping technique.

    This reverse trapping technique initiated when the dropping of packets occur in the packet delivery ratio. After the Malicious node is detected by reverse trapping, an alarm message is send all nodes and put that malicious node in the blackhole list. All nodes will receives that alarm message and stop with the communication the nodes which are present in that blackhole list andthe important feature of this CBDS method is, it takes the advantage of both pro-active and re-active detection schemes. By this using of both the detection scheme in single mechanism the resources which are used for the detection mechanism is very less such as time and cost.

    This CBDS method is mainly based on the DSR technique. Due to the presence of malicious nodes in the network, the source will forward the entire data packets the un- authorised destination via fake path. This may leads occurring of blackhole attack in the network. To avoid this blackhole attack in the network the HAI message is added to packet informationin CBDS. This adding of HAI message in the CBDS method to help respective node can recognize their neighbour nodes with single hop. And by adding this HAI message the source node get all information about each nodes present in the network, and by this address information of all nodes malicious nodes is detected.The detection of malicious node by CBDS mechanism can be achieved by 3 stages.1) Initial bait stage,

    2) Reverse trapping stage, 3) Reactive defence stage.

    1. Initial Bait Stage

      In this initial bait stage illustrated in below figure 3.

      Fig.: iii: Initial bait detecting by random selection of nodes by source node

      This initial bait stage, initially done by the source node. First, the source node selects the neighbour nodes randomly. The above figure iii shows this random selection of nodes by the source node. In figure iii source node selects a neighbour node nr, within its single hop neighbourhood nodes and source node exist the cooperation with this node by sending the RREQ[route or path request]. Each baiting is done randomly and neighbour nodes can change but bait is constant in the entire process.If the malicious attack is not caused by the node nr, after the sending of path request or route request

      then it shows that, the node nris not a malicious node. But if source node receives path response from any other node except the node nr. This shows that still malicious nodes present in the network and Now the reverse trapping is initiated to detect the position of malicious node. If suppose source node sends a path or route request to node nrdirectly, if it is not reply for that path request then source node directly listed that node to blackhole list that indicates that node nris maliciousnode in that path.

    2. Reverse trapping stage

      This reverse trapping is new technique using in the CBDS detection method. By using this reverse trapping technique the detection of exact position of malicious node in network is done. This reversetrapping technique is initiated, during the source node send the route or path request into the network and get the path response from each nodes which are present in the network. The response packet RREP contains any false destination address immediately this reverse trapping technique starts its function and detects the position of malicious nodes in network. This CBDS method is more effective scheme to detect malicious nodes in the network compare to other existing methods. Because this CBDS method can capable to detect more than one malicious node in the network by using reverse trapping technique.

      Figure iv shows, detecting of malicious node by using the reverse trapping technique. The node n4 is the malicious node in the network .This n4 malicious node send fake response to source node along with entire address list Q={node n1, node n2, node n3, node n4, node n5,node n6}.This node n4 can reply with K4= {n5,n6},this K4 Represents the entire information of the route to

      destination node and now, the node 3 test and deleted the k4!,

      After the receiving of path response. After the intersection k4!By source node. Now the unsure path information Z replied by malicious node is detected.

      Z =K1K2K3.Kk.. ..(1)

      These malicious nodes which are present in the network give path response to every path or route request [RREQ]. Before detected a malicious node, the nodes which are present in the route is temporarily trusted.These provisionally trusted set Y is obtained by the difference of both sets Q and Z

      Y=Q-Z ..(2)

      Initially, the source node confirms the presence of malicious node in the network by sending the test packet into the network. When path test packet enter to the network it rechecks the neighbour node that neighbour node sends the test packet to another node until this packet reaches the last node in Y. This happens to detect exact position of malicious node in the network. After the receiving of test packets up to last node, each nodesends their route response to source node. If the route response contain any fake destination that node considered as a malicious node and listed in blackhole list and send alarm message to other nodes to stop communication with that black listed node.

      k

      In figure iv, shows the network containing a only one malicious node that is nk. This node n4 sends fake route response to source node with the address list Q={Node n1, Node n2, Node n3, Node n4, Node n5, Node n6}and then these malicious nodes select another fake node n5 by intentionally. This fake path detection by source node interact the received K to obtain Z and node n2 will send the request to n3 to know where the node is sending the packets. If the packets are sent node n5 to n3 through n4, then the source node stores this node to black list.In the figure 4, if the nodes n4 and n5 are cooperative malicious nodes. Then the T=Q-S = {n1,n2,n3} would be obtained, then n2 send the RREQ to n3 to listen to which node n3 sending the packets, either n5 or n6 identified.After the detection of fake node immediately cooperation with that fake node is stopped and sends alarm mess to all nodes to stop communication with that fake node and establish the efficient route path from source node to destination node in the network

      Fig.: iv: Reverse tracing approach of CBDS scheme.

    3. Reactive Defence Stage

    After the completion of initial pro-active defence, The DSR starts its function, mainly the DSR function is route discovery, after this completion of above stages the DSR is initiated. While the way was established betwen the source to destination node. During data transmission of data from source node to destination node, if dropping occurs in packet delivery ratio immediately the detection method is initiated and detect the in which node data is dropping. This method defined the threshold 95%. The flow chart of entire mechanism is shown in figure v.

    Fig.: v: Flow chart of CBDS mechanism

  3. RESULRS

    i. Simulation parameters.

    To,study the simulation parameters of our newly introducing method called co-operative bait discovery method, we are using tool NS 2.33 [network simulator].these parameters of our CBDS method is shown in table I.

    Constraints

    values

    Packet size

    1000KB

    Number of nodes

    33

    Malicious nodes

    0 TO 40%

    Pause time

    0Sec

    Area

    1000m*1000m

    Threshold

    Dynamic threshold algorithm

    Table I: Simulation parameters

    i. Performance parameters of CBDS method.

    We comparing the performance parameters, in terms of PDR[ packet delivery ratio] and delay, routing overhead and finally the parameter throughputFirst, the below figure vi, shows the effect of malicious nodes in the network on the parameter PDR.

    Fig.vi: Comparison DSR and CBDS method on parameter PDR

    Compare to CBDS, The existing DSR scheme does not have any capabilities to protecting the data by malicious attack in the MANETs. If more number of malicious nodes present in the network our, CBDS method give high PDR ratio than existing systems. Next, Will disuses the other parameter of the CBDS method called RO [routing overhead. The below figure vii, shows the results of this 2 schemes. Compare to CBDS, DSR produce a less routing overhead. Because in CBDS method it takes the use of both pro-active and reactive detection both during detection of malicious nodes in network.But in DSR, there is no higher capable detection schemes are used.

    Fig. vii: Comparison of routing overhead between CBDS and DSR

    Third, we study the important parameter called throughput. The figure viii shows the throughput of the both the methods.

    Fig.viii: Comparison of throughput between CBDS and DSR

    The above figure shows the CBDS scheme achieve more throughput than the DSR, because if multiple malicious nodes present in the network DSR method fails to survive from that malicious attack.

    Finally, the last parameter is delay. The comparison of parameter delay between CBDS and DSR methods showed in Figure ix. In this delay parameter the CBDS scheme will produces less delay compare to DSR because this CBDS method capable to detect multiple malicious node in MANETs.

    Fig. ix: Comparison of end to end delay between CBDS and DSR

  4. CONCLUSION AND UPCOMING WORK

In this, paper we proposed anew mechanism called Cooperative bait discovery scheme [CBDS] for detecting the malicious node in MANET under gray/collaborative blackhole attack and in this detection method takes the use of both proactive and reactive detection techniques. By using this CBDS mechanism, our simulation results are compare with the existing system called DSR method in terms of PDR [packet delivery ratio],RO[rotting overhead], Delay and lastly throughput and as future work, We can Implement this CBDS mechanism to detect other types of collaborative attacks on MANETs.

REFERENCES

  1. P.C. Tsou, J.-M Chang, H.-C Chao and J.-L.Chen,A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defines architecture,in Proc.2nd Intl. Conf.wireless comm,VITAE, Chenai, India, Feb. 28-Mar., 03,2011,pp.1-5.

  2. I. Rubin, A. Behzad, R Zhang, H. luo, and E. Caballero,TBONE: A mobile-backbone protocol for ad hoc wireless networks, in Proc. IEEE Aerosp. Conf.,2002,vol.6, pp.2727-2740.

  3. A. Baadache and A. Belmehdi, Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks,Intl. J.Comput. Sci. Inf. Security, vol. 7,no.1, 2010.

  4. W. Wang, B. Bhargava, and M Linderman, defending against collaborative attack packet drop attacks on MANETs,in Proc. 28th IEEE Int.Symp. Reliable Distrib, Syst., New Delhi, India, Sep. 2009.

  5. K.Liu,D. Pramod, K. Varshney, and K. Balakrishnan,An Acknowlodgement based approach for detection of routing misbehaviour in MANETs,IEEETrans,Mobilecomput., vol 6,no. 5,pp. 536-550,May 2007.

  6. D. Johnson and D.Maltz,Dynamic source routing in ad hoc wireless networks,IEEE Trans, Mobile Comput.,pp. 153-181,1996.

  7. Y.Xue and K. Nahrstedt,Providing fault-tolerent ad-hoc routing service in adversarialenvironments,wireless pers.commun, vol.29,pp.367-388,2004.

Leave a Reply