Download Secure and Efficient Routing in Heterogeneous Mobile Ad hoc

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Peering wikipedia , lookup

Network tap wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Secure and Efficient Routing in Heterogeneous Mobile Ad hoc Networks and
Wireless Sensor Networks
Mobile ad hoc Network is a collection of autonomous nodes that communicate without
using pre-existing infrastructure. In the last decade, mobile ad hoc networks(MANETs) have
emerged as a major next generation wirelessnetworking technology. However, MANETs are
vulnerable tovarious attacks at all layers, including in particular the networklayer, because the
design of most MANET routing protocolsassumes that there is no malicious intruder node in the
network.In this direction, as a first step, we aim for a thorough survey of state of art in
Authentication is to be carried out to classify main types of attackat the network layer, and
review intrusion detectionand protection mechanisms that have been proposed in theliterature.
Routing is undoubtedly the most studied aspect of the ad hoc networks. Yet, many issues
remain open which deserve appropriate handling such as robust security solutions for routings,
routing protocol scalability, efficient routing mechanisms and QoS support. And these issues are
also equally pivotal in the domain of Integration of MANETs with other wired networks, thus
forming a heterogeneous or hybrid ad hoc network. Hybrid ad hoc wireless network is a
promising networkarchitecture that incorporates ad hoc network with aninfrastructure network
including base stations [1]. We aim at proposing secure, trusted and energy efficient routing
protocols to integrate MANET with Internet or any other Wired Network which extends the
capabilities of the network.
A special case of MANETs is a Wireless Sensor Network, one of the mostpromising
technologies that have applications like security and tactical surveillance in military or hostile
environments, weather monitoring, distributed computing, fault detection and diagnosis in
machinery, large bridges and tall structures, detecting ambient conditions such as temperature,
movement, sound, light etc [2]. Although Wireless Sensor Networks(WSNs) have appealing
features (e.g., low installation cost,unattended network operation), due to the lack of a physical
lineof defense (i.e., there are no gateways or switches to monitorthe information flow), the
security of such networks is a bigconcern, especially for the applications where confidentiality
hasprime importance [3]. Therefore, in order to operate WSNs in asecure way, any kind of
intrusions should be detected beforeattackers can harm the network (i.e., sensor nodes)
andinformation destination (i.e., data sink or base station).Energy consumption of the nodes is an
important issue froma system design point of view. WSNs consume energy throughsensing the
surrounding phenomena, processing the sensedinformation and transmitting the resultant data.
Therefore, thesensor nodes need to spend the least amount of energy as possible tospare enough
energy for the crucial operations of the WSN. We aim at proposing energy efficient routing
protocols for the WSNs that ensure secure transmission of data to sink and secure aggregation of
data at sink nodes thus increasing the network lifetime and data integrity. We also aim at
carrying out research towards development of cross-layer approach based mechanisms for
efficient utilization of spectrum leading to cognition in the network operations. This will enhance
the overall network efficiency and lifetime of the network nodes.
Research Objectives
The major open research challenges in the field of Mobile Ad hoc Networks and Wireless Sensor
Networks to be addressed as part of the research work are identified below based on in depth
study and analysis of state of art in these fields.
 In integration of MANETs with wired networks, several security, efficiency and
scalability issues need to be considered in heterogeneous environment. Various attacks
are possible in this kind of heterogeneous networks, such as: denial of service, wormhole
attack, black hole attack, hello flood attacks, Forged Gateway, Replay Attacks, Route
Poisoning, etc [4].
 We aim to propose mutual trust based energy efficient routing protocol for heterogeneous
networks. We also aim to implement an efficient and robust intrusion detection
mechanism to deal with malicious behaviors of mobile nodes.
 In WSN, one of the difficult problems is existence of sinkhole attack, and selective
forwarding [5,6]. The attacker diverts the traffic to an unknown sink (sinkhole problem)
[5] and discards the packets that should be delivered to the base station (BS). We aim to
propose routing protocol WSNs that effectively overcome the sinkhole attack based on
agent based mutual trust among nodes [7], link quality and adaptive load balancing.
 In WSNs, the sensor nodes have limited power, processing and memory resources. The
life time of sensor nodes plays a very pivotal role in life time of the network, thus routing
protocols need to be designed keeping in view the energy consumption in nodes by
protocol [8]. We aim to propose a routing protocol which improves the network life time
by using adaptive load balancing, and bio inspired approach to avoid overloading at
certain nodes causing network partition.
 In a WSN, the sensor nodes communicate using multi-hop connectivity. The
communication range of a node decreases dynamically with the change in environmental
conditions. When the communication range of a particular node is less than the distance
to its nearest active neighbor node, it cannot transmit any data to its neighbor nodes.
Consequently, the node becomes dumb [9-11]. In such a scenario, it is required to
reestablish connectivity among all the nodes in the network. The connectivity reestablishment algorithms in presence of dumb nodes exist in literature. We aim to carry
out an exhaustive survey of these algorithms and prepare a comparison framework to
identify limitations and scope of research in this problem.
 Sensor-cloud has been perceived as a potential paradigm for executing wireless sensor
based applications. In sensor-cloud, the underlying sensor network is highly
heterogeneousin terms of the hardware, sensing and communicationability, and other
configuration issues. Thus, the transmissionfrom the underlying networks to the cloud is
challenging andinduces research interest.The recent work in this area can be found in [1215]. The architecture of such a network is given below. We aim to explore in this area of
newest interest in field of WSN and Cloud computing.
Fig: Network Architecture of Sensor – Cloud
 The sensor cloud network architecture, the sensed data is stored in cloud. But there are
major concerns about the privacy of data stored on cloud servers [16]. While encryption
of data provides sufficient protection, it is challenging to support rich querying
functionality, such as string matching, over the encrypted data. We aim to carry out an
extensive survey on the state of art in this field and develop a comparison framework to
extract the research challenges and address few of them.
Research Methodology
We aim to do an extensive survey of literature and state of art in the field of Integrated Internet
and MANET, Wireless Sensor Networks with focus on energy efficient and secure routing,
integration of WSN and Cloud Computing to achieve clear understanding of the problem
domain. We aim to build comparison frameworks in each of the above outlined area and address
the shortcomings, and improve the performance of the existing strategies by suitable
enhancements to them. We aim to simulate our work using well known simulators, such as NS-2,
NS-3, and GloMoSim etc.
Conclusion
In this synopsis, we have identified prominent issues and challenges in MANETs, WSN and
Integration of WSN with Cloud. The major issues attracting the researchers in this domain are
due to characteristics of MANET and WSN such as limited resources, wireless transmissions,
security threats, etc. We have surveyed and identified the major challenges that need to be
addressed to improve network life time, secure communication and data transmission among
sensor nodes, sink nodes, and base stations connecting to cloud servers. In the event of storing
sensed data over cloud, major concerns are about security of such data. We aim to survey a few
state of art strategies in this domain and build a framework of comparison of such strategies. We
aim to simulate our work on the de facto networking simulators such as NS-2, NS-3, and
GloMoSim.
List of Publications.
1. Mohammed Asrar Ahmed, Khaleel Ur Rahman Khan: Trust Based Secure Gateway
Discovery Mechanism for Integrated Internet and MANET. ICDCIT 2013: 103-114
2. Khaleel Ur Rahman Khan, Rafi U. Zaman, A. Venugopal Reddy, Mohammed Asrar
Ahmed: Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the
Internet. ICDCN 2009: 377-388
3. Khan, K. ; Asrar Ahmed MD. ; Reddy, A.V. ; Zaman, R.U., A hybrid architecture for
integrating Mobile ad hoc network and the internet using Fixed and Mobile Gateways
Wireless Days, 2008. WD '08. 1st IFIP, DOI: 10.1109/WD.2008.4812876,
Publication Year: 2008 , Page(s): 1 - 5
Bibliography
1. M. Mahmoud and X. Shen, ‘‘FESCIM: Fair, Efficient, Secure Cooperation Incentive
Mechanism for Hybrid Ad Hoc Networks,’’ IEEE Trans. Mobile Computer, vol. 11, no.
5, pp. 753-766, May 2012.
2. HakimaChaouchi, Jean-Marie Bonnin, “Wireless sensor networks: a survey on recent
developments and potential synergies”, Journal of Supercomputing, 1-48, April 2013
3. D. Djenouri, L. Khelladi and A.N. Badache. “A Survey of Security Issues in Mobile Ad
Hoc and Sensor Networks”, Communications Surveys & Tutorials, IEEE, Vol. 7, Issue
4, pp. 2--28, Fourth Quarter 2005.
4. Bin Xie , “Heterogeneous Wireless Networks – Networking Protocol to Security”, VDM
Verlag Dr. Muller
5. Yenumula Reddy, “Detecting Sinkhole Attacks by Observing the Quality of Link in
Wireless Sensor Networks”, International Conference on Wireless Networks, ICWN
2009, July 13-16, 2009, Las Vegas Nevada, USA.
6. Yenumula Reddy, S. Srivathsan, “Game theory model for selective forward attacks in
wireless sensor networks”, MED '09 Proceedings of the 2009 17th Mediterranean
Conference on Control and Automation.
7. Yenumula B. Reddy, RastkoSelmic, “Agent-based Trust Calculation in Wireless Sensor
Networks”, SENSORCOMM 2011, ISBN: 978-1-61208-144-1, p334-339.
8. SudipMisra, Sanjay K. Dhurandher, Mohammad S. Obaidat, “An ant swarm-inspired
energy-aware routing protocol for wireless ad-hoc networks”, The Journal of Systems
and Software 83 (2010), 2188-2199
9. Pushpendukar, SudipMisra,“Detouring dynamic routing holes in stationary wireless
sensor networks in the presence of temporarily misbehaving nodes”, International Journal
of Communication Systems, June 2015, DOI: 10.1002/dac.3009.
10. Arijit Roy, Puspendukar, SudipMisra,“Detection of Dumb Nodes in a Stationary Wireless
Sensor Network”, 2014 Annual IEEE India Conference (INDICON), 978-1-4799-53646/14
11. Pushpendukar, Arijit Roy, SudipMisra, “Energy-Efficient Connectivity Re-establishment
in WSN in the Presence of Dumb Nodes”, IEEE ICC 2015 - Workshop on Smart
Communication Protocols and Algorithms (SCPA 2015)
12. Subhadeep Sarkar, SudipMisra, “ Energy Efficient Data Transmission in Sensor Cloud” ,
2015 Applications and Innovations in Mobile Computing (AIMoC),
13. SudipMisra, et al, “Optimal Gateway Selection in Sensor-Cloud Framework for Health
Monitoring”, IET Wireless Sensor Systems · June 2014
14. A. Alamri, W. S. Ansari, M. M. Hassan, M. S. Hossain, A. Alelaiwi, and M. A. Hossain,
“A Survey on Sensor-Cloud: Architecture, Applications, and Approaches,” International
Journal of Distributed Sensor Networks, vol. 2013, pp. 1–18, 2013.
15. S. K. Dash, J. P. Sahoo, S. Mohapatra, and S. P. Pati, “Sensor-Cloud: Assimilation of
Wireless Sensor Network and the Cloud,” Advances in Computer Science and
Information Technology. Networks and Communications, vol. 84, pp. 455–464, 2012.
16. BruhadeshwarBezawada, et al, “Privacy Preserving String Matching for Cloud
Computing”, 35th IEEE International Conference on Distributed Computing Systems
(ICDCS), 2015.