بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

نویسندگان

چکیده مقاله:

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If the source chooses this fake route, malicious nodes have the option of sniff, modify, selectively forward packets or them. Existing solution defends wormhole attacks, such as SECTOR, Packet Leashes, DelPHI, directional antenna. These solutions require special hardware or strict synchronized clocks or cause message overhead, or generate false-positive alarms. A novel approach MAODV: Modified AODV is proposed to defend wormhole attacks, launched in AODV. The proposed approach is based on weight per hop. Each node in network has its own weight, given by administration due to trusty power capability. Sum of weight will not be exceeded from 100. Whenever a source node wants to send a traffic to destination, puts its minimum weight in RREQ packet to constitute the route. The destination node is selected in the route that its weight is close to destination announcement weight. Since no special hardware and no encryption techniques are used, it is likely to have less overhead and delay, compared to other techniques. The proposed wormhole defend mechanism is discussed in detail. Our proposed system does not require any synchronized clocks or special hardware to defend wormhole attacks. In our proposed system some parameters will be added to AODV routing protocol and make it more secure against wormhole attacks. We will name this new protocol as MAODV. In the first place, there is a master node in network, which  weighs 100 (weighs of whole network). Whenever a node attends to enter the network, sends a join message to nearest neighbor. After receiving the message, master node will share its weights with the node requester, and sends the weight to this node requester. This process and weight sharing will be repeated after any requests to join a network, and total weight of network is not exceeded from 100. In our proposed method, each path which is created between source and destination, has a particular weight and this weight equals to intermediate node weights being added to each other. In MAODV whenever a source node wants to send RREQ packet, it adds the minimum weight to constitute route. After receiving RREQ packets, each intermediate node increases its weight beside increasing hop count. Each intermediate node does the same action, as far as destination node receives, RREQ packet among the received RREQ, one of them will be selected which its weight is the same as minimum requested weight by source, or slightly more than that. For instance, consider fig 1 which has 14 nodes. Assuming the node weights are equal for each node and its 7. As mentioned, the weight of whole network is tantamount to 100. Example 1: consider fig. 1 in which node A sends RREQ to node B. At first, node A checks its cache table to see whether there is a route between A and B, or not. If the answer is positive, it starts to send data. If the answer is negative, it sets up RREQ as follow: which means: A: source, B: destination, 1: hop count, 7: constitute path weight, 25: request weight, []: intermediate nodes. Each node which receives RREQ will check if it is the destination or not. If it wasn’t: 1. Increase hop count, 2. puts its weight to constitute path weight, 3. Adds its address as an intermediate node. And then broadcasts RREQ packet to the neighbors. In this example node A sends RREQ to X and C, which are legitimate neighbor of A. When X receives the packet, modifies it as: and forwards it to its neighbors on the other hand node. C modifies packet as: and forwards it to its neighbor D. This action will be repeated until B gets two RREQ - and - among the received RREQ, B will be selected which its weight is the same as minimum requested weight by A, or slightly more than that, so the first route will be chosen by B. node B setup RREP packet as which means: A: source, B: destination, 1: back path weight, 4: hop count, 25: request weight, 7: constitute path weight, [E,D,C]: intermediate nodes. The effectiveness of the propose mechanism is evaluated using ns2 network simulator. The simulator's outcome demonstrates that PDR in MAODV rose by 5% up to 8% in presence of two malicious nodes, compared to PDR in AODV routing protocol. The average delay point to point in MAODV is more than AODV, but on the other hand, it is less than SAODV due to not using encryption.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مقابله با حملات سیاه چاله در پروتکل مسیریابی AODV با بهره گیری از منطق فازی

شبکه‌های موردی سیار، به علت سادگی و سرعت پیاده‌سازی، در بسیاری از موارد گزینه انتخابی قدرتمند و مناسبی هستند. با این حال، به علت پویایی و فقدان زیرساخت ثابت در برابر تهدیدهای امنیتی بسیار آسیب‌پذیر هستند. در سال‌های اخیر تلاش‌های قابل توجهی در زمینه طراحی پروتکل‌های مسیریابی امن و قدرتمند انجام شده و طرح‌های امنیتی زیادی برای مقابله با این مسائل امنیتی ارائه شده است. دلیل این حساسیت، کاربردهای...

متن کامل

تشخیص ناهنجاری در شبکه های اقتضایی مبتنی بر پروتکل aodv

پروتکل aodv به عنوان یکی از معروفترین پروتکل های مسیریابی شبکه های بی سیم اقتضایی (manet) در مقابل شماری از حمله ها و سوءرفتارها آسیب پذیر می باشد. در این رساله یک سیستم تشخیص حمله با رویکرد تشخیص ناهنجاری (ads) در manet با پروتکل مسیریابی aodv پیشنهاد می شود. در طرح پیشنهادی 1) خصیصه های لازم برای توصیف رفتار پروتکل aodv با رویکردی مبتنی بر رهگیری مرحله به مرحله ی ویژگی ها و رفتار پروتکل تعریف...

15 صفحه اول

اثر بربرین در تنظیم آستروسیتهای Gfap+ ناحیه هیپوکمپ موشهای صحرایی دیابتی شده با استرپتوزوتوسین

Background: Diabetes mellitus increases the risk of central nervous system (CNS) disorders such as stroke, seizures, dementia, and cognitive impairment. Berberine, a natural isoquinolne alkaloid, is reported to exhibit beneficial effect in various neurodegenerative and neuropsychiatric disorders. Moreover astrocytes are proving critical for normal CNS function, and alterations in their activity...

متن کامل

اثر بربرین در تنظیم آستروسیتهای Gfap+ ناحیه هیپوکمپ موشهای صحرایی دیابتی شده با استرپتوزوتوسین

Background: Diabetes mellitus increases the risk of central nervous system (CNS) disorders such as stroke, seizures, dementia, and cognitive impairment. Berberine, a natural isoquinolne alkaloid, is reported to exhibit beneficial effect in various neurodegenerative and neuropsychiatric disorders. Moreover astrocytes are proving critical for normal CNS function, and alterations in their activity...

متن کامل

گمنام سازی پروتکل های مسیریابی در شبکه های اقتضایی سیار به منظور مقابله با حملات تحلیل ترافیک

در دهه ی اخیر، تحقیقات در زمینه حفظ حریم خصوصی در شبکه های manet افزایش یافته است. نقض حریم خصوصی به منظور دستیابی به اطلاعات شخصی شبکه و اعضای آن هدف اصلی مهاجم در حمله تحلیل ترافیک می باشد. در واقع در حمله تحلیل ترافیک دشمن سعی دارد با مشاهده و بررسی الگوی ترافیک شبکه و تغییرات آن به اطلاعات ارزشمندی در مورد مشخصه-های ترافیک ارسالی مثل هویت طرفین ارتباط، فرکانس ارسال داده، هویت گره های روی مس...

15 صفحه اول

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 13  شماره 4

صفحات  109- 120

تاریخ انتشار 2017-03

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

کلمات کلیدی برای این مقاله ارائه نشده است

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023