شماره ركورد :
997149
عنوان مقاله :
بهبود پروتكل AODV جهت مقابله با حملات كرم‌چاله در شبكه‌هاي اقتضايي
عنوان به زبان ديگر :
Modified AODV Routing Protocol in Order to Defend Wormhole Attacks
پديد آورندگان :
محمدي، فريد دانشگاه تهران - پرديس بين المللي كيش , قرايي، حسين پژوهشگاه ارتباطات و فناوري اطلاعات، تهران
تعداد صفحه :
12
از صفحه :
109
تا صفحه :
120
كليدواژه :
شبكه MANET , حمله كرم چاله , پروتكل مسيريابي AODV , ns-2
چكيده فارسي :
حمله كرم چاله يك نوع حمله فعال مي‌باشد كه در لايه سوم شبكه از شبكه‌هاي اقتضايي رخ مي‌دهد. در اين حمله مهاجمين با متقاعد كردن گره فرستنده براي ارسال اطلاعات از يك مسير جعلي كه كوتاه‌تر و سريع‌تر از مسير عادي به نظر مي‌رسد، سعي دارند ارسال بسته‌ها از تونل ايجاد شده انجام شود تا بتوانند، حملات آناليز ترافيك، انكار سرويس، رها كردن بسته‌ها و يا جلوراني انتخابي را انجام دهند. هر پروتكلي كه از مقياس كم‌ترين تاخير و كم-ترين تعداد گام براي مسيريابي استفاده كند، در برابر اين حمله آسيب پذير است.در اين مقاله يك راه‌كار جديد براي مقابله با حملات كرم چاله ارائه مي-دهيم. در راه‌حل پيشنهادي هر گره داراي يك وزن است و مجموع وزن‌ها در شبكه برابر صد خواهد بود. هرگاه گره‌اي قصد ارسال ترافيك به گره ديگر را داشته باشد، در بسته RREQ حداقل وزن درخواستي براي ايجاد ارتباط را بيان مي‌كند. گره فرستنده با توجه به اهميت داده‌هايي كه ارسال خواهد كرد مشخص مي‌كند كه مجموع وزن گره‌هاي شركت كننده، در فرايند كشف مسير بايد چقدر باشد. روش پيشنهادي را MAODV نامگذاري مي‌كنيم. روش فوق به صورت نرم‌افزاري بوده و با توجه به اين‌كه از تكنيك رمزنگاري استفاده نخواهيم كرد،پيش‌بيني مي‌كنيم سربار كمتري نسبت به ساير تكنيك‌ها داشته باشيم، و همچنين به علت عدم استفاده از الگوريتم‌هاي سخت، توان گره‌ها كه اتفاقا محدود است، كمتر صرف محاسبات خواهد شد.كارايي الگوريتم پيشنهادي را در محيط ns-2 نشان داده خواهد شد.
چكيده لاتين :
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If the source chooses this fake route, malicious nodes have the option of sniff, modify, selectively forward packets or them. Existing solution defends wormhole attacks, such as SECTOR, Packet Leashes, DelPHI, directional antenna. These solutions require special hardware or strict synchronized clocks or cause message overhead, or generate false-positive alarms. A novel approach MAODV: Modified AODV is proposed to defend wormhole attacks, launched in AODV. The proposed approach is based on weight per hop. Each node in network has its own weight, given by administration due to trusty power capability. Sum of weight will not be exceeded from 100. Whenever a source node wants to send a traffic to destination, puts its minimum weight in RREQ packet to constitute the route. The destination node is selected in the route that its weight is close to destination announcement weight. Since no special hardware and no encryption techniques are used, it is likely to have less overhead and delay, compared to other techniques. The proposed wormhole defend mechanism is discussed in detail. Our proposed system does not require any synchronized clocks or special hardware to defend wormhole attacks. In our proposed system some parameters will be added to AODV routing protocol and make it more secure against wormhole attacks. We will name this new protocol as MAODV. In the first place, there is a master node in network, which weighs 100 (weighs of whole network). Whenever a node attends to enter the network, sends a join message to nearest neighbor. After receiving the message, master node will share its weights with the node requester, and sends the weight to this node requester. This process and weight sharing will be repeated after any requests to join a network, and total weight of network is not exceeded from 100. In our proposed method, each path which is created between source and destination, has a particular weight and this weight equals to intermediate node weights being added to each other. In MAODV whenever a source node wants to send RREQ packet, it adds the minimum weight to constitute route. After receiving RREQ packets, each intermediate node increases its weight beside increasing hop count. Each intermediate node does the same action, as far as destination node receives, RREQ packet among the received RREQ, one of them will be selected which its weight is the same as minimum requested weight by source, or slightly more than that. For instance, consider fig 1 which has 14 nodes. Assuming the node weights are equal for each node and its 7. As mentioned, the weight of whole network is tantamount to 100. Example 1: consider fig. 1 in which node A sends RREQ to node B. At first, node A checks its cache table to see whether there is a route between A and B, or not. If the answer is positive, it starts to send data. If the answer is negative, it sets up RREQ as follow: which means: A: source, B: destination, 1: hop count, 7: constitute path weight, 25: request weight, []: intermediate nodes. Each node which receives RREQ will check if it is the destination or not. If it wasn’t: 1. Increase hop count, 2. puts its weight to constitute path weight, 3. Adds its address as an intermediate node. an‎d then broadcasts RREQ packet to the neighbors. In this example node A sends RREQ to X and C, which are legitimate neighbor of A. When X receives the packet, modifies it as: and forwards it to its neighbors on the other hand node. C modifies packet as: and forwards it to its neighbor D. This action will be repeated until B gets two RREQ - and - among the received RREQ, B will be selected which its weight is the same as minimum requested weight by A, or slightly more than that, so the first route will be chosen by B. node B setup RREP packet as which means: A: source, B: destination, 1: back path weight, 4: hop count, 25: request weight, 7: constitute path weight, [E,D,C]: intermediate nodes. The effectiveness of the propose mechanism is evaluated using ns2 network simulator. The simulator's outcome demonstrates that PDR in MAODV rose by 5% up to 8% in presence of two malicious nodes, compared to PDR in AODV routing protocol. The average delay point to point in MAODV is more than AODV, but on the other hand, it is less than SAODV due to not using encryption.
سال انتشار :
1395
عنوان نشريه :
پردازش علائم و داده ها
فايل PDF :
7329095
عنوان نشريه :
پردازش علائم و داده ها
لينک به اين مدرک :
بازگشت