13209-13218 - Available Online through
-
Upload
khangminh22 -
Category
Documents
-
view
3 -
download
0
Transcript of 13209-13218 - Available Online through
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13209
ISSN: 0975-766X CODEN: IJPTFI
Available Online through Research Article
www.ijptonline.com ADVANCED DETERMINATION OF NODE-MISBEHAVIOUR USING OVERHEARING AND
AUTONOMOUS AGENTS IN WIRELESS AD-HOC NETWORKS B.S.Sathish
1*, Dr.P.Thirusakthimurugan
2, Ganesan P
1,
1V.Kalist
1Faculty of Electrical and Electronics Engineering, Sathyabama University, Chennai, Tamilnadu, India.
2Department of EIE, Pondicherry Engineering College, Pondicherry, India.
Email: [email protected]
Received on 13-05-2016 Accepted on 12-06-2016
Abstract
In Wireless Ad-hoc networks, nodes-operate among themselves to forward information packets from a supply node to a
destination node. Nodes might participate in route discovery or route maintenance method however refuse to forward
packets owing to presence of faulty hardware or package or to save lots of their resources, such as, battery power and
information measure. Detection and isolation of misbehavior nodes area, unit vital problems to boost the standard
communication service and to save lots of resources of well behaving wireless nodes, During this work firstly, a
neighbour Overhearing based mostly misbehaviour Detection (OMD) theme is planned. In OMD, each node
transmissions of its neighbours and calculates packet forwarding quantitative relation of its own in addition as its
neighbours. Source node uses the calculated data to spot a misbehaving node. Secondly, associate Autonomous Agent
based mostly misbehaviour Detection (AAMD) technique is planned.
Keywords: Wireless Ad-hoc Networks, Misbehaviour, Overhearing, Hash chain, Trusted Third Party, Autonomous
Agent, Victimisation, Route discovery
1. Introduction
Wireless ad-hoc network is a decentralized network which is not supported by any pre-existing infrastructure. Nodes in
this type of network work collaboratively to realize end to end communication. Multi-hop routes are used to overcome
limited communication range of nodes in the network. In wireless ad-hoc networks, a source node relies on intermediate
nodes to forward data packets to a designated destination node. Wireless ad-hoc network is deployed in some hostile or
uncontrolled environment where nodes may not behave according to the defined protocol. So, there will be a probability
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13210
of presence of misbehaviour nodes. Nodes may deny to forward packets (misbehaviour of nodes) to save battery power
and other resources, may provide false routing information or may drop packets to degrade the performance of the
network. Misbehaving nodes can be of different types, an overloaded node may lack of processing power, buffer space or
available network bandwidth to forward packets. A faulty node might have a software fault where as a malicious node
may launch a DOS attack. A selfish node may refuse to forward packets to save its battery power and other resources to
forward its own traffic. Existing solutions for identifying misbehaving nodes either require some type of hardware support
or use some form of per-packet evaluation of peer behaviour. Credit based approaches require some type of hardware
support or a payment system and do not identify misbehaving node. Reputation based approaches are based on
transmission overhearing which are expensive and incur more communication overhead. Acknowledgment based
approaches require issuance of per-packet acknowledgment, thus introducing high communication overhead. Audit based
approach introduces high communication overhead and identification delay for route discovery and audit process.
Moreover, existing techniques fail to detect dropping attacks accurately and efficiently. The rest of the paper is organized
as follows. In section II a brief details of proposed work compare with existing work on misbehaviour detection is given.
Section III discusses the concepts related to proposed mechanisms. In section IV the experimental setup and simulation
results are shown. Concluding remarks are presented in Section V.
2. Related Work
Various techniques have been developed to detect the dropping misbehaviours in wireless ad hoc network. Proposed
schemes can be classified as:
A. Credit Based Systems
In credit based systems, some credits are given to intermediate nodes whenever a node forwards packets or provide
services to other nodes in the network. The credits received can be used by the nodes to transmit their own traffic. Buttyan
and Hubaux have proposed two models which can be used in credit based schemes: Firstly, Packet Trade Model in which
each intermediate node gives some credits to previous node and buy packets from it and sells the packets to next node for
more credits.
The destination node bears the overall cost of forwarding the packets. Secondly, Packet Purse Model in which credits are
loaded into packet before it is sent by the sender node.
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13211
B. Reputation Based Systems
Reputation of a node is calculated by its neighbour by observing the packet forwarding behaviour of the node. Reputation
computed is used in the system for evaluating the trustworthiness of nodes in forwarding traffic and detecting the
misbehaviour of suspicious nodes. This in sequence is then propagating all the way through the network so that the
detected misbehaving node can be removed from the network. Marti et al. have proposed a system that contains two most
important modules, term watchdog and pathrater, to detect and mitigate routing misbehaviour in MANET,
correspondingly. Using the declaration of watchdog module, pathrater rates each path in the cache and selects the path
which avoids node misbehaviour.
C. Acknowledgment Based Systems
Acknowledgment based systems rely on the reception of acknowledgment to verify that a message is forwarded to next
hop. Balakrishnan et al. have proposed TWOACK scheme in which a node sends 2-hop acknowledgment message,
whenever they receive a packet, along the reverse path which verifies that the intermediate node has forwarded the packet.
Samreen et al. have proposed an approach which uses two techniques: 2ACK technique and Principle of Flow of
Conservation (PFC) technique which are used in parallel to enable the detection of nodes that exhibit packet dropping
behaviour. The result generated by first technique is used by the second technique to generate the list of misbehaving
nodes.
D. Audit Based System
Audit based Misbehaviour Detection (AMD) technique integrates three modules:(a) Reputation module is responsible for
management of reputation value of nodes in the network and for updating the reputation based on the input provided by
the audit module.(b) Route discovery Module is responsible for finding most trustworthy path among available paths on
the basis of path reputation value and path selection factor.(c) Audit module identifies the misbehaving nodes in the path
using auditing process. This process is accelerated based on the reputation values provided by the reputation module.
AMD evaluates node misbehaviour on per packet basis without using overhearing technique or acknowledgment scheme.
AMD can also detect dropping attack of selective nature. In this work, firstly, a neighbour overhearing based
misbehaviour detection scheme is proposed. Secondly, an autonomous agent based misbehaviour detection scheme is
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13212
proposed. Motivation behind the work is to improve communication overhead and identification delay in a wireless ad-
hoc network as shown in figure 1.
Fig. 1. Block Diagram of Proposed System.
3. Improved Missed Detection Techniques Using Neighbor Overhearing And Autonomous Agents.
In this section, firstly, the system model and basic definitions are bestowed. Secondly, projected neighbour Overhearing
primarily based misdeed Detection (OMD) technique has been mentioned within which every node gift within the path
between supply node and destination node calculates Packet Forwarding Ratio (PFR) of its own and its neighbours.
Supply node maintains a matrix that is updated on the premise of the PFR values calculated by the nodes. This matrix is
employed to spot misbehaving nodes. Thirdly, projected Autonomous Agent primarily based misdeed Detection (AAMD)
technique has been bestowed within which associate degree agent resides at every node which is able to be activated to
calculate PFR of that node as shown in figure 1.
A. System Model
The term neighbour is employed to seek advice from a node that's at intervals wireless transmission varies of another
node. Neighbourhood refers to any or all the nodes that area unit at intervals wireless transmission varies of that node. A
hash chain may be a sequence of hash prices that area unit computed by iteratively line of work a unidirectional hash
performs on associate degree initial value. A crucial property of the hash chain is that its parts will be simply computed in
one direction, however not within the reverse direction as shown in figure 2, Table 1 .
B. Neighbour Overhearing primarily based misdeed Detection: a light-weight approach
In this work, the projected neighbour Overhearing primarily based misdeed Detection(OMD) technique uses the data
provided by the neighbours for behaviour analysis of nodes within the path while not acquisition high communication
overhead. Associate degree algorithmic program for overhearing primarily based misdeed detection is shown in (Sath
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13213
Node Algorithm rule 1), Source node maintains a matrix φPFR of Packet Forwarding Ratio (PFR) of every node. The
matrix contains node id denoted as i, forwarding quantitative relation calculated by its own denoted as PFR and
forwarding quantitative relation calculated by its neighbors denoted as PFR wherever j denotes all the neighbours of node
metal.
Sath Node Algorithm Rule 1: Algorithm for Overhearing Based Detection of Misbehaving Node.
Require: Forwarding ratio PFR of each node, time epoch t and t1.
Ensure: Detection of misbehaving node.
1. Initialize matrix φ PFR of Packet Forwarding Ratio (PFR) with zeros.
2. Selection of path PDS−>D using DSR algorithm between source node S and destination
node.
3. Monitoring packet delivery ratio η of the path PS−>D by node S.
4. If η < η0
5. Node S sends a control packet Request PFR to request all the nodes along the path to calculate PFR of its own
PFRii and its neighbours PFRi (where j denotes all the neighbours of node i) at time t for a time duration t1.
6. Calculation of PFRii and PFRij by the intermediate node.
7. At time t+t1 node D sends a reply Request PFR along the reverse path and all intermediate nodes append the
calculated values to the reply.
8. Node S modifies it’s matrix φPFR based on the received Request PFR
9. Node S checks all the entries
10. If PFRii ≠ PFRij
11. Node i is misbehaving node.
12. Else
13. Node i is well behaving node.
Fig. 2. Calculation of PFR values by nodes using neighbour overhearing and verification of misbehavior.
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13214
Table. 1. Conflicting Values Verifies the Misbehavior.
ni PFRii PFR
i i-1 PFR
ii+1
1 0.5 0.5 0.5
2 0.6 0.6 0.6
3 0.6 0.4 0.4
4 0.4 0.2 0.4
4. Simulation Results
In the simulation, packet dropping has been implemented under channel conditions given in JProwler. The performance
metrics such as Communication Overhead, Identification Delay and Packet Delivery Ratio have been used to evaluate the
performance of the proposed scheme. Figure 3 shows the communication overhead introduced to detect misbehaving
nodes with respect to percentage of misbehaving nodes. The Y axis is in logarithmic scale. If number of misbehaving
nodes increases in the network, communication overhead to detect those node will also increases as more number of
agents that are residing at the nodes need to be activated.
X – axis : percentage of misbehaving node Y – axis : communication overhead
Fig. 3. The comparison of communication overhead between AMD and AAMD v/s percentage of misbehaving
nodes
The control packets need to be transmitted to more number of nodes to collect the calculated PFR values. In OMD,
increment in identification delay is less as the number of misbehaving nodes increase because a single control packet can
be used for detection of more misbehaving nodes. Identification delay will increase in AAMD in the presence of more
misbehaving nodes because more number of agents will be activated for detection. Figure 4 shows the identification delay
0 5 10 15 20 25 30 35 40 2
2.5
3
3.5
4
4.5
5
5.5
% of Misbehaving Nodes
AMD AAMD
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13215
with respect to path length in presence of one misbehaving node. This additional delay incurs in Overhearing based
Misbehavior Detection (OMD) as more number of nodes need to perform the transmission overhearing and calculation of
Packet Forwarding
X – axis : path length Y – axis : Identification delay
Fig. 4. Identification delay v/s path length (in presence of one misbehaving node)
Figure 5 shows the delay required to identify two misbehaving nodes with respect to path length. To identify the
misbehaving nodes, the identification delay increases if the path length increases.
X – axis : Path Length Y – axis : Identification Delay
Fig. 5. Identification delay v/s path length (in presence of two misbehaving node)
5. Conclusion
We have proposed two techniques for misbehaviour detection in wireless ad-hoc networks. Firstly, an Overhearing based
Misbehavior Detection (OMD) technique is proposed which is based on behaviour evaluation by neighbouring nodes. The
OMD technique reduces the identification delay by transmitting few control packets for identifying the misbehaving nodes
in the network. Secondly, an Autonomous Agent based Misbehavior Detection (AAMD) technique is proposed. The
AAMD technique achieves up-to 25% less communication overhead than the AMD technique. Also, the identification
5 6 7 8 9 10 11 12 13 14 15 4
4.5
5
5.5
6
6.5
7
7.5
8
8.5
Path length
..
OMD AAMD
5 6 7 8 9 10 11 12 13 14 15 3
4
5
6
7
8
9
Path Length
OMD AAMD
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13216
delay has been reduced (using AAMD) significantly for identifying misbehaving nodes using autonomous agents in the
network. Further, investigation may be done to develop an isolation scheme to isolate the detected misbehaving nodes
from the network.
References
1. A. Visconti and H. Tahayori, “Detecting misbehaving nodes in manet with an artificial immune system based on
type-2 fuzzy sets,” International Conference for Internet Technology and Secured Transactions, ICITST’09, pp. 1–2,
2009.
2. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, “Self-securing ad-hoc wireless networks,” in In Proc. of ISCC, 2002.
3. R. R. Rout and S. K. Ghosh, “Enhancement of lifetime using duty cycle and network coding in wireless sensor
networks,” IEEE Transaction on Wireless Communication, vol. 12, no. 2, pp. 656–667, 2013.
4. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc
networks,” IEEE Wireless Communications, vol. 14, no. 5, pp. 85–91, 2007.
5. A. B. Abderrahmane Baadache, “Fighting against packet dropping misbehaviour in multi-hop wireless ad hoc
networks,” J. Network and Computer Applications, vol. 35, no. 3, pp. 1130–1139, 2012.
6. D. Djenouri and N. Badache, “On eliminating packet droppers in manet: A modular solution,” Ad Hoc Networks, vol.
7, no. 6, pp. 1243–1258, 2009.
7. F. Kargl, a. Klenk, M. Weber, and S. Schlott, “Advanced detection of selfish or malicious nodes in ad hoc
networks,” in 1st European Workshop on Security in Ad-hoc and Sensor Networks, Heidelberg, Germany, Aug 5-6,
2004, 2004.
8. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement based approach for detection of routing
misbehaviour in mantes,” IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536–550, 2007.
9. S. Zhang, J. Chen, and Y.R.Yang, “Sprite : A simple cheat-proof, credit based system for mobile ad-hoc networks,” in
Proc. of INFOCOM, 2003, pp. 1987–1997.
10. L. Buttyan and J. P. hubaux, “Stimulating cooperation in self organizing mobile adhoc networks,” Mobile Net. and
Application, vol. 8, no. 5, pp. 579–592, 2003.
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13217
11. J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentive for collabration in mobile adhoc
network,” in Proc. of WiOpt, 2003.
12. S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation based framework for high integrity sensor networks,”
ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1–37, 2008.
13. Q. He, D. Wu, and K. Khosla, “Sori: A secure and objective reputation based incentive scheme for adhoc
networks,” in In Proc. of WCNC, 2004.
14. S. Buchegger and J. Y. L. Boudec, “Self policing mobile adhoc networks by reputation systems,” in IEEE Comm.
Magazine, 2005, pp. 101–107.
15. L. Miranda, H.and Rodrigues, “Preventing selfishness in open mobile adhoc networks,” in Proc. of Seventh
CaberNet Radicals Workshop, 2002.
16. S. Buchegger and J. Y. L. Boudec, “Performance analysis of the confidant protocol: Cooperation of nodes,
fairness in dynamic ad-hoc networks,” in Proc. of MobiHoc, 2002.
17. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotary, and H. Rubens, “Odsbr: An on-demand secure byzantine
resilient routing protocol for wireless ad hoc networks,” ACM Transactions on Information System Security, vol. 10,
no. 4, pp. 11–35, 2008.
18. B.S.Sathish, Dr.P.Thirusakthimurugan (2015). “Fuzzy Position Control of PMBLDC Motor using Adaptive Genetic
Algorithm”, Indian Journal of Science and Technology (Indjst), Vol.8, No. 8, pp.600-606.
19. Shaik, Khamar Basha and Ganesan, P and Kalist, V and Sathish, BS and Jenitha, J Merlin Mary “Comparative
Study of Skin Color Detection and Segmentation in HSV and YCbCr Color Space”, Procedia Computer Science,
volume -57, pp 41- 48, 2015, Elsevier.
20. Kalist, V and Ganesan, P and Sathish, BS and Jenitha, J Merlin Mary, “Possiblistic-Fuzzy C-Means Clustering
Approach for the Segmentation of Satellite Images in HSL Color Space”, Procedia Computer Science vol 57, Pp 49-
56, 2015}, Elsevier.
21. Krishna, R Vivek and Sathish, BS and Ganesan, P and Babu, P Jawahar and Abilash, R, “Design of voice and
gesture controlled Quadcopter”, International Conference on Innovations in Information, Embedded and
Communication Systems (ICIIECS), IEEE, 2015, Pp 1--6, 2015.
B.S.Sathish* et al. International Journal Of Pharmacy & Technology
IJPT| June-2016 | Vol. 8 | Issue No.2 | 13209-13218 Page 13218
22. Ganesan, P and Palanivel, K and Sathish, BS and Kalist, V and Shaik, Khamar Basha, “Performance of fuzzy
based clustering algorithms for the segmentation of satellite images-A comparative study”, IEEE Seventh
National Conference on Computing, Communication and Information Systems (NCCCIS), 20 15,Pp 23 - 27, 2015,
IEEE.
23. Govindaswamy Indhumathi, Dr.R. Seshasayanan “Periodic Wave Generation for Direct Digital Synthesization”,
International Journal on Intelligent Electronics Systems, Sathyabama university, pp 22-27, Vol. 10, January 2016.
24. B.S.Sathish, Ganesan P, ”Color Image Segmentation based on Genetic Algorithm and Histogram Threshold”,
International Journal of Applied Engineering Research (IJAER), vol-10, issue-6, pp 5205-5209, 2015.
Corresponding Author:
B.S.Sathish*,
Email: [email protected]