avoiding packet dropping misbehavior in vanet using trust based ant colony optimization

25
Avoiding Packet Dropping Misbehavior in VANET Using Trust Based Ant Colony Optimization Prepared By: Kishan N. Patel CSE and IT Department SVMIT, Bharuch

Upload: kishan-patel

Post on 14-Aug-2015

111 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Avoiding Packet Dropping Misbehavior in VANET Using Trust

Based Ant Colony Optimization

Prepared By:

Kishan N. Patel

CSE and IT Department

SVMIT, Bharuch

Page 2: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 2

OUTLINES Introduction of VANET Security in VANET Security Trust Metaheuristic Approach Why Metaheuristic ? Ant Colony Optimization Literature Survey Problems Trust Based ACO Conclusion and Future work References

Page 3: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 3

INTRODUCTION OF VANET

Vehicular ad hoc network (VANET) [1] uses cars as mobile nodes in a MANET to create a mobile network.

Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).

Fig 1. Vehicular Ad hoc network [1] Cars fall out of the signal range and drop out of the network, other cars can join, by connecting

vehicles to one another form a wireless network called “Vehicular Ad Hoc Network”.

Page 4: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 4

SECURITY IN VANET

The nature of VANETs could lead to malicious attacks.o Predictable movement of nodes.

Adversaries could break the system.o Data sinkholes (black hole).o Gray hole

Security measures must be taken to avoid malicious attacks on the system

Page 5: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 5

ADVANTAGES AND DISADVANTAGESAdvantages Public Safety Traveller Information Support Air pollution emission measurement and reduction.

Disadvantages Wasted band width Increasing network congestion

Page 6: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

6

SECURITY The protection afforded to an automated information system in order to attain

the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).”

Page 7: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

7

CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY

ConfidentialityPreserving the confidentiality of information means preventing unauthorized parties from accessing the information or perhaps even being aware of the existence of the information. I.e., secrecy.

IntegrityMaintaining the integrity of information means that only authorized parties can manipulate the information and do so only in authorized ways.

AvailabilityResources are available if they are accessible by authorized parties on all appropriate occasions.

Page 8: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 8

PACKET DROPPING ATTACK

Packet dropping attacks are widespread DoS attacks on Ad hoc networks.

Fig 3. Packet dropper behavior [3] Packet dropper AODV or Packet dropping attack is the AODV under malicious attack. As shown in Figure 4 behavior of the attacker M that drops the packets sent by source A

towards destination C.

Page 9: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

9

WHAT IS TRUST?

Trust is a particular level of the subjective prob. with which an agent will perform a

particular action, before [we] can monitor such action and in a context in which it

affects [our] own action.

Trust is context-dependent, dynamic & non-monotonic.

Types of Trust

Interpersonal (agent & context specific)

Structural (system within which trust exists)

Dispositional (independent of agent & context)

Page 10: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

10

TWO TYPES OF MODELS

Trust Management models

◦ Certificate-based

◦ Reputation-based (behavior observed directly or indirectly)

◦ Recommendations: trust information shared among peers

Page 11: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

11

TRUST MANAGEMENT APPROACHES

Individual Initiative

Each agent is responsible for his own fate. Global Trust

Each peer in the system has a unique global trust value that other peers can access. Federated Trust

Management of trust-related activities across multiple and heterogeneous security domains and autonomous systems.

Deals with strategies for managing inter-domain behaviors

Page 12: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 12

METAHEURISTIC APPROACH Heuristic [2] means to find or to discover by trial and error. And meta means higher

level and metaheuristics generally perform better than simple heuristics.

There are two techniques:

1. Online metaheuristic approach

2.Offline metaheuristic approach.

The main difference between them is the moment when they are applied for solving

problem.

Metaheuristic Algorithms

1) Ant colony optimization (ACO)

2) Tabu search (TS)

3) Variable neighborhood search (VNS).

Page 13: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 13

WHY METAHEURISTIC REQUIRED ? Metaheuristics [2] are used for solving the security and routing problems in ad hoc

networks.

Security problem in the network may be due to selfish and malicious node.

Metaheuristic approach can be used for overcoming the problem.

For route optimization e.g selecting the shortest and quality route from source to

destination.

Page 14: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 14

ANT COLONY OPTIMIZATION The inspiring source of ACO [3] is the foraging behavior of real ants. This behavior enables ants to find shortest paths between food sources and their nest. While walking from food sources to the nest and vice versa, ants deposit a substance

called pheromone on the ground.

Fig 2. Ant Mechanism  [3] Once an ant has built a solution, it can retrace the same path backward and update the

pheromone trails of the used component .

Page 15: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 15

LITERATURE SURVEY

Page 16: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 16

Title Mechanism / Algorithm Purpose Methodology

TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks.[4]

TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm

To avoid trust value propagation. To minimize the number of messages been exchanged. To find the best route for delivery.

Trust value of each node is directly aped to the route and no need to propagate the trust values like other trusted protocols.

Trust Based QOS Protocol(TBQP) using Metaheuristic Genetic Algorithm for Optimizing and Securing MANET. [5]

Trust Based QOS Protocol (TBQP) Using Meta-heuristic Genetic Algorithm.

To provide QOS by selecting the fittest shortest route among the number of routes to provide optimization. Acquaintance And Authentication of packets for routing in network.

Intriguing a trust based packet delivering scheme for detecting and isolating the malignant nodes using the routing layer information. A trust weigh is maintained and a node is remunerated by decreasing or increasing the trust weigh value. If the trust weigh falls below a trust threshold, node is marked as malicious node.

Performance analysis of optimized Trust AODV using ant Algorithms. [6]

Ant colony optimization To sustain security against the dos attacks.

At agents can move freely to find destination it will update positive pheromone to the routing table. The pheromone is deposited if node is trusted.

Table 1. Survey of various Metaheuristics

Page 17: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 17

Title Mechanism / Algorithm Purpose Methodology

Ant Colony and Load Balancing Optimizations for AODV Routing Protocol. [7]

Multi-Route AODV Ant routing (MRAA)Load balancing( LBMRAA)

To reducethe routing overhead, buffer overflow, end-to-end delay andincrease the performance

Data packets are balancedover discovered paths and energy consumption is distributed across many nodes through network.

Secure Ant-Based Routing Protocol for Wireless Sensor Network. [8]

Secure Ant-Based Routing Protocol(SARP)

To provide Route security in network.

It uses two paths for data forwarding to overcome the problem of node failure and to increase the efficiency of overall network.

MANET link Performance using Ant Colony Optimization and Particle Swarm OptimizationAlgorithms. [9]

Ant colony optimization and Particle swarm optimization.

Finds the best solution over the particle’s position and velocity with the cost and minimum. End-to-end delay.

Ant Colony Optimization(ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network and PSO finds the best solution over the particle’s position and velocity with the objective of cost and minimum End-to-end delay.

AntTrust: A Novel Ant Routing Protocol forWireless Ad-hoc Network Based on Trust Between Nodes. [10]

Ant Trust Routing Protocol To increase the security of route. And malicious manipulationsof data packets.

AntTrust is located precisely in the context of the security of routing. It also facilitates malicious manipulations of data packets.

[11] [12] [13] [14] ….

Page 18: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 18

PROBLEMS IN NETWORK

Due to the openness in network topology and absence of a centralized administration in management, they are vulnerable to various attacks from malicious nodes.

The networks work well only if the nodes are trusty and behave cooperatively. Some other problem are:

1) Difficult to evaluate trustworthiness of nodes

2) Security of data transmission

3) Fails to remove malicious nodes during route discovery process and therefore doesn´t succeed to transfer all data packets.

Main Objective of Proposed System :

1) To enhance the security

2) To address the packet dropping misbehavior

3) Distinguish malicious nodes

Page 19: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 19

AUXILIARY EXAMPLE

Page 20: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 20

ATTACKER MODEL

FD

CB

H

K

A

Sourcenode

DestinationNode

Malicious node

RREQRREQ

RREQ

RREQ

RREQ

RREQ

RREP

RREP

RREP

RREQ RREQ

RREP RREP

C Malicious node

A Source node

K Destination nodePacket Dropping attack model

RREP

RREP

Page 21: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 21

TACO-TRUST BASED ANT COLONY OPTIMIZATION

T.V= Trust valueP.V= Pheromone ValueN.T= Neighbor Table

Page 22: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 22

[1] Wang, Yu, and Fan Li. "Vehicular ad hoc networks." Guide to wireless ad hoc networks. Springer London, 2009. 503-525.

[2] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.

[3] Kishan Patel, Rutvij Jhaveri,  “Isolating Packet Dropping Misbehavior in VANET using Ant Colony Optimization”, International Journal of Computer Applications (IJCA-2015), June 20  2015.

[4] Bahaa-Eldin, Ayman M. "TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks." In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 151-184. Springer Berlin Heidelberg, 2014.

[5] Zafar, Sherin, and M. K. Soni. "Trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET." InOptimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on, pp. 173-177. IEEE, 2014.

REFERENCES

Page 23: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 23

[6] Simaremare, Harris, Abdelhafid Abouaissa, Riri Fitri Sari, and Pascal Lorenz. "Performance analysis of optimized trust AODV using ant algorithm." InCommunications (ICC), 2014 IEEE International Conference on, pp. 1843-1848. IEEE, 2014.

[7] Ahmed M. Abd Elmoniem, et al. "Ant Colony and Load Balancing Optimizations for AODV Routing Protocol.

[8] Alrajeh, Nabil Ali, Mohamad Souheil Alabed, and Mohamed Shaaban Elwahiby. "Secure ant-based routing protocol for wireless sensor network." International Journal of Distributed Sensor Networks 2013 (2013).

[9] Nancharaiah, B., and B. Chandra Mohan. "MANET link performance using ant colony optimization and particle swarm optimization algorithms." InCommunications and Signal Processing (ICCSP), 2013 International Conference on, pp. 767-770. IEEE, 2013.

[10] Melchor, Carlos Aguilar, Boussad Ait Salem, Philippe Gaborit, and Karim Tamine. "AntTrust: A novel ant routing protocol for wireless ad-hoc network based on trust between nodes." In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1052-1059. IEEE, 2008.

Page 24: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 24

[11] Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques." InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.

[12] Sreelaja, N. K., and G. A. Vijayalakshmi Pai. "Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks." Applied Soft Computing 19 (2014): 68-79.

[13] Sahoo, Rashmi Ranjan, Rameswar Panda, Dhiren Kumar Behera, and Mrinal Kanti Naskar. "A trust based clustering with Ant Colony Routing in VANET." InComputing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-8. IEEE, 2012.

[14] Kaur, Harmandeep, and Ramanjit Singh. "A NOVEL APPROACH TO PREVENT BLACK HOLE ATTACK IN WIRELESS SENSOR NETWORK."

[15] Zhou, Mingxing, and Jing Liu. "A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks." Physical A: Statistical Mechanics and its Applications 410 (2014): 131-143.

[16] Lo, Chi-Chun, Chun-Chieh Huang, and Wen-Tian Liang. "Mitigating Routing Misbehavior Using Ant-Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks." IJCSNS 10, no. 5 (2010): 46.

Page 25: Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Kishan Patel M.E (I.T) En no - 130450723011 25

THANK YOU