Posts

Analysis of Routing and Secure Routing in Hybrid Wireless Mesh Networks

Abstract: Interoperability is one of the main characteristics of Hybrid Wireless Mesh Networks (HWMNs). In HWMNs, network devices have different resource constrains; identifying optimal paths over the heterogeneous environment is a challenging task. Reactive and proactive routing protocols of Ad-Hoc and sensor networks are ineffective in terms of scalability, thus researchers have come up with new routing protocols like cross-layer, and load-balancing protocols. However, these protocols fail to provide basic security to the network, a very few protocols have addressed the security in HWMNs, each of the secure protocol has its own limitations. In this paper, we analyze the issues in HWMNs routing protocols, and the security issues in proactive, reactive and hybrid protocols with respect to various network layer attacks. Based on our analysis, we have proposed the new research directions in terms of improving HWMNs routing functionality in the heterogeneous environment and new security

Simulation analysis on network layer attacks in wireless mesh networks

Security mechanisms in Wireless Mesh Networks (WMNs) play an essential role to protect WMNs features. However, the existing security standards of WMNs are still in draft state. In addition to that, WMNs features like integrating with heterogeneous nodes and networks, which make designing robust security mechanism for WMNs is more complex. To develop an efficient security mechanism for WMNs, firstly we need to study the vulnerabilities of WMNs, and then exploit these vulnerabilities to perform various attacks and find the counter measures for these attacks. In this paper, we have studied various network layer attacks, based on this study we identified the interdependencies of these attacks. We use AODV protocol to exploit these attacks. Our simulation results show that the each attack severity with respect to goodput and Packet Delivery Ratio (PDR). We explained how these severity measures are useful for future WMNs security mechanisms. download link

Reputation Based IDS for Gray hole Attack in MANETs

  Abstract :MANETs are more vulnerable to various attacks, out of which gray hole(selective packet drops) attack is one of the severe attack. The existing security mechanisms are inadequate to detect gray hole attack. In this paper, we propose a reputation based IDS for high detection rate of gary hole attack with less control overhead. Our proposed IDS works based on node independent approach, and key functionalities of this approach are 1) average number of collisions and 2) additive increase/ exponential decrease of node reputation value. Our Simulation results show that the proposed mechanism has a significantly high detection rate which improves network performance such as goodput, packet delivery ratio.  FULL PAPER: Reputation Based IDS for Gray hole Attack in MANETs

MAC layer security issues in wireless mesh networks

Abstract: Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic  network topology  and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis

Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

ABSTRACT Wireless mesh networks provide long-distance wireless network connectivity over heterogeneous devices for greater scalability and availability. However, protecting legitimate long-distance wireless links from wormhole attacks is an important yet challenging security issue in wireless mesh networks. In this paper, we propose a reputation-based cross-layer intrusion detection system to effectively detect various wormhole attacks. The proposed system analyses the behaviours of the routing paths in wireless mesh networks to correctly isolate the malicious wormhole paths from legitimate long-distance wireless links. It uses  reputation  and  cross-layer parameters  for comprehensive ability to isolate the wormhole attacks in routing paths. This isolation ensures full utilisation of legitimate long-distance wireless links in wireless mesh networks, which is not possible with the existing wormhole attack detection approaches. Experimental results show that the proposed syst

Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network

Abstract Wireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs from single adversary node, but failed to protect colluding attacks. We proposed new Intrusion Detection (ID) technique, to protect the WMNs from wormhole attack (colluding attack) and following jellyfish and byzantine attacks. The proposed ID technique works based on different delays such as initial end-to-end packet delay, average end-to-end packet delay, and worst case end-to-end packet delay because wormhole attackers attract the network nodes by sending lower latency. Eventually, simulation results show that, our ID technique improves throughput of the network, when source and destination nodes detect and isolate (select new path which does not contain adversaries) the adver

NS2 code for Rushing attacks (Jellyfish and Byzantine attacks)

Image
Workshop on Cyber Security and Forensics (16th to 20th August 2016) http://svecw.edu.in/docs/CSEFDPCS.pdf    Workshop on Big Data Analytics (2nd to 6th August 2016) http://svecw.edu.in/docs/CSEFDPBigDataAnalytics2016.pdf Rushing attack   Rushing attack is a zero delay attack andmore effective when the attacker nearby source or destination node.On-demand routing protocols like AODV and DSR are more vulnerable to this attack, because whenever source nodefloods the route request packet in the network, an adversary nodereceives the route request packet and sends without any hop_count update and delay intothe network. Whenever the legitimate nodes receive the originalsource request packets, they are dropped because legitimate nodes,would have already received packet from the attacker and treat the currently received packets asduplicate packets. Thus, adversary is included in active routeand disturbs the data forwarding phase. Rushing attack can be takenplace at source side o