* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Secure and Efficient Routing in Heterogeneous Mobile Ad hoc
Survey
Document related concepts
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Airborne Networking wikipedia , lookup
Transcript
Secure and Efficient Routing in Heterogeneous Mobile Ad hoc Networks and Wireless Sensor Networks Mobile ad hoc Network is a collection of autonomous nodes that communicate without using pre-existing infrastructure. In the last decade, mobile ad hoc networks(MANETs) have emerged as a major next generation wirelessnetworking technology. However, MANETs are vulnerable tovarious attacks at all layers, including in particular the networklayer, because the design of most MANET routing protocolsassumes that there is no malicious intruder node in the network.In this direction, as a first step, we aim for a thorough survey of state of art in Authentication is to be carried out to classify main types of attackat the network layer, and review intrusion detectionand protection mechanisms that have been proposed in theliterature. Routing is undoubtedly the most studied aspect of the ad hoc networks. Yet, many issues remain open which deserve appropriate handling such as robust security solutions for routings, routing protocol scalability, efficient routing mechanisms and QoS support. And these issues are also equally pivotal in the domain of Integration of MANETs with other wired networks, thus forming a heterogeneous or hybrid ad hoc network. Hybrid ad hoc wireless network is a promising networkarchitecture that incorporates ad hoc network with aninfrastructure network including base stations [1]. We aim at proposing secure, trusted and energy efficient routing protocols to integrate MANET with Internet or any other Wired Network which extends the capabilities of the network. A special case of MANETs is a Wireless Sensor Network, one of the mostpromising technologies that have applications like security and tactical surveillance in military or hostile environments, weather monitoring, distributed computing, fault detection and diagnosis in machinery, large bridges and tall structures, detecting ambient conditions such as temperature, movement, sound, light etc [2]. Although Wireless Sensor Networks(WSNs) have appealing features (e.g., low installation cost,unattended network operation), due to the lack of a physical lineof defense (i.e., there are no gateways or switches to monitorthe information flow), the security of such networks is a bigconcern, especially for the applications where confidentiality hasprime importance [3]. Therefore, in order to operate WSNs in asecure way, any kind of intrusions should be detected beforeattackers can harm the network (i.e., sensor nodes) andinformation destination (i.e., data sink or base station).Energy consumption of the nodes is an important issue froma system design point of view. WSNs consume energy throughsensing the surrounding phenomena, processing the sensedinformation and transmitting the resultant data. Therefore, thesensor nodes need to spend the least amount of energy as possible tospare enough energy for the crucial operations of the WSN. We aim at proposing energy efficient routing protocols for the WSNs that ensure secure transmission of data to sink and secure aggregation of data at sink nodes thus increasing the network lifetime and data integrity. We also aim at carrying out research towards development of cross-layer approach based mechanisms for efficient utilization of spectrum leading to cognition in the network operations. This will enhance the overall network efficiency and lifetime of the network nodes. Research Objectives The major open research challenges in the field of Mobile Ad hoc Networks and Wireless Sensor Networks to be addressed as part of the research work are identified below based on in depth study and analysis of state of art in these fields. In integration of MANETs with wired networks, several security, efficiency and scalability issues need to be considered in heterogeneous environment. Various attacks are possible in this kind of heterogeneous networks, such as: denial of service, wormhole attack, black hole attack, hello flood attacks, Forged Gateway, Replay Attacks, Route Poisoning, etc [4]. We aim to propose mutual trust based energy efficient routing protocol for heterogeneous networks. We also aim to implement an efficient and robust intrusion detection mechanism to deal with malicious behaviors of mobile nodes. In WSN, one of the difficult problems is existence of sinkhole attack, and selective forwarding [5,6]. The attacker diverts the traffic to an unknown sink (sinkhole problem) [5] and discards the packets that should be delivered to the base station (BS). We aim to propose routing protocol WSNs that effectively overcome the sinkhole attack based on agent based mutual trust among nodes [7], link quality and adaptive load balancing. In WSNs, the sensor nodes have limited power, processing and memory resources. The life time of sensor nodes plays a very pivotal role in life time of the network, thus routing protocols need to be designed keeping in view the energy consumption in nodes by protocol [8]. We aim to propose a routing protocol which improves the network life time by using adaptive load balancing, and bio inspired approach to avoid overloading at certain nodes causing network partition. In a WSN, the sensor nodes communicate using multi-hop connectivity. The communication range of a node decreases dynamically with the change in environmental conditions. When the communication range of a particular node is less than the distance to its nearest active neighbor node, it cannot transmit any data to its neighbor nodes. Consequently, the node becomes dumb [9-11]. In such a scenario, it is required to reestablish connectivity among all the nodes in the network. The connectivity reestablishment algorithms in presence of dumb nodes exist in literature. We aim to carry out an exhaustive survey of these algorithms and prepare a comparison framework to identify limitations and scope of research in this problem. Sensor-cloud has been perceived as a potential paradigm for executing wireless sensor based applications. In sensor-cloud, the underlying sensor network is highly heterogeneousin terms of the hardware, sensing and communicationability, and other configuration issues. Thus, the transmissionfrom the underlying networks to the cloud is challenging andinduces research interest.The recent work in this area can be found in [1215]. The architecture of such a network is given below. We aim to explore in this area of newest interest in field of WSN and Cloud computing. Fig: Network Architecture of Sensor – Cloud The sensor cloud network architecture, the sensed data is stored in cloud. But there are major concerns about the privacy of data stored on cloud servers [16]. While encryption of data provides sufficient protection, it is challenging to support rich querying functionality, such as string matching, over the encrypted data. We aim to carry out an extensive survey on the state of art in this field and develop a comparison framework to extract the research challenges and address few of them. Research Methodology We aim to do an extensive survey of literature and state of art in the field of Integrated Internet and MANET, Wireless Sensor Networks with focus on energy efficient and secure routing, integration of WSN and Cloud Computing to achieve clear understanding of the problem domain. We aim to build comparison frameworks in each of the above outlined area and address the shortcomings, and improve the performance of the existing strategies by suitable enhancements to them. We aim to simulate our work using well known simulators, such as NS-2, NS-3, and GloMoSim etc. Conclusion In this synopsis, we have identified prominent issues and challenges in MANETs, WSN and Integration of WSN with Cloud. The major issues attracting the researchers in this domain are due to characteristics of MANET and WSN such as limited resources, wireless transmissions, security threats, etc. We have surveyed and identified the major challenges that need to be addressed to improve network life time, secure communication and data transmission among sensor nodes, sink nodes, and base stations connecting to cloud servers. In the event of storing sensed data over cloud, major concerns are about security of such data. We aim to survey a few state of art strategies in this domain and build a framework of comparison of such strategies. We aim to simulate our work on the de facto networking simulators such as NS-2, NS-3, and GloMoSim. List of Publications. 1. Mohammed Asrar Ahmed, Khaleel Ur Rahman Khan: Trust Based Secure Gateway Discovery Mechanism for Integrated Internet and MANET. ICDCIT 2013: 103-114 2. Khaleel Ur Rahman Khan, Rafi U. Zaman, A. Venugopal Reddy, Mohammed Asrar Ahmed: Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the Internet. ICDCN 2009: 377-388 3. Khan, K. ; Asrar Ahmed MD. ; Reddy, A.V. ; Zaman, R.U., A hybrid architecture for integrating Mobile ad hoc network and the internet using Fixed and Mobile Gateways Wireless Days, 2008. WD '08. 1st IFIP, DOI: 10.1109/WD.2008.4812876, Publication Year: 2008 , Page(s): 1 - 5 Bibliography 1. M. Mahmoud and X. Shen, ‘‘FESCIM: Fair, Efficient, Secure Cooperation Incentive Mechanism for Hybrid Ad Hoc Networks,’’ IEEE Trans. Mobile Computer, vol. 11, no. 5, pp. 753-766, May 2012. 2. HakimaChaouchi, Jean-Marie Bonnin, “Wireless sensor networks: a survey on recent developments and potential synergies”, Journal of Supercomputing, 1-48, April 2013 3. D. Djenouri, L. Khelladi and A.N. Badache. “A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks”, Communications Surveys & Tutorials, IEEE, Vol. 7, Issue 4, pp. 2--28, Fourth Quarter 2005. 4. Bin Xie , “Heterogeneous Wireless Networks – Networking Protocol to Security”, VDM Verlag Dr. Muller 5. Yenumula Reddy, “Detecting Sinkhole Attacks by Observing the Quality of Link in Wireless Sensor Networks”, International Conference on Wireless Networks, ICWN 2009, July 13-16, 2009, Las Vegas Nevada, USA. 6. Yenumula Reddy, S. Srivathsan, “Game theory model for selective forward attacks in wireless sensor networks”, MED '09 Proceedings of the 2009 17th Mediterranean Conference on Control and Automation. 7. Yenumula B. Reddy, RastkoSelmic, “Agent-based Trust Calculation in Wireless Sensor Networks”, SENSORCOMM 2011, ISBN: 978-1-61208-144-1, p334-339. 8. SudipMisra, Sanjay K. Dhurandher, Mohammad S. Obaidat, “An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks”, The Journal of Systems and Software 83 (2010), 2188-2199 9. Pushpendukar, SudipMisra,“Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes”, International Journal of Communication Systems, June 2015, DOI: 10.1002/dac.3009. 10. Arijit Roy, Puspendukar, SudipMisra,“Detection of Dumb Nodes in a Stationary Wireless Sensor Network”, 2014 Annual IEEE India Conference (INDICON), 978-1-4799-53646/14 11. Pushpendukar, Arijit Roy, SudipMisra, “Energy-Efficient Connectivity Re-establishment in WSN in the Presence of Dumb Nodes”, IEEE ICC 2015 - Workshop on Smart Communication Protocols and Algorithms (SCPA 2015) 12. Subhadeep Sarkar, SudipMisra, “ Energy Efficient Data Transmission in Sensor Cloud” , 2015 Applications and Innovations in Mobile Computing (AIMoC), 13. SudipMisra, et al, “Optimal Gateway Selection in Sensor-Cloud Framework for Health Monitoring”, IET Wireless Sensor Systems · June 2014 14. A. Alamri, W. S. Ansari, M. M. Hassan, M. S. Hossain, A. Alelaiwi, and M. A. Hossain, “A Survey on Sensor-Cloud: Architecture, Applications, and Approaches,” International Journal of Distributed Sensor Networks, vol. 2013, pp. 1–18, 2013. 15. S. K. Dash, J. P. Sahoo, S. Mohapatra, and S. P. Pati, “Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud,” Advances in Computer Science and Information Technology. Networks and Communications, vol. 84, pp. 455–464, 2012. 16. BruhadeshwarBezawada, et al, “Privacy Preserving String Matching for Cloud Computing”, 35th IEEE International Conference on Distributed Computing Systems (ICDCS), 2015.