ID240 - Mobile Fickle Key (MFK) Protocol ...

7 downloads 17 Views 338KB Size Report
This protocol utilizes pre-installed certificate to secure the ... type, radio-propagation model, network interface type, MAC type, interface queue type, Link ...

An International Multi-Disciplinary Graduate Conference of Terengganu (GraCe 2016)

ID240 - Mobile Fickle Key (MFK) Protocol Implementation For Manet 1

Shahadan Saad1, Farahah Kussenan2, Ahmad Firdaus Ahmad Fadzil3 [email protected], [email protected], [email protected]

Abstract: There are many types of network that can be seen in this new era of technology. One of the networks that have been widely used in most of the country is Mobile Ad Hoc Network. This type of protocol is an infrastructure-less protocol which consist the connection between mobile devices to send and receive data. However, due to the features that is wireless network and can be attack by malicious attack such as Denial of Service attacks, Wormhole attacks and Man-in-the-Middle attack, a key management protocol has been create to overcome this problem. A Simple Key Management Protocol has been designed to send protected data with symmetric shared key. However, there is several changes need to do in this protocol such that to improve the delay process of transmitting key. Therefore, Mobile Fickle Key protocol has been created to solve the problem. This protocol is created based on simulation model that consist of information gathering, planning, framework formulation, testing and documentation. A Network Simulator 2 simulation environment has been used to test this type of key management protocol. Keywords: Key Management scheme, MANET, Simulation environment

INTRODUCTION Mobile Ad Hoc Network (MANET) is a wireless network that included only mobile node without hub and server [2]. Moreover, the topology of this network is dynamic due to the connectivity of the network may have various way and new node can be added freely during the process of connecting [1]. MANET can be known as a platform for emergency such that during hurricane where a wired network might not working. Next, it can also be used in military operation to transmit data in secure network. There are many different types of key management protocol that has been introduced to make the MANET more secure. However, in this paper, a comparison is made between Simple Key Management Protocol (SKiMPy) and Mobile Fickle Key (MFK) protocol to shows the difference of speed of sharing key in the network. The problem that occurs in SKiMPy protocol is that it has the long delay process of sharing and choosing key to request for communication [3]. It takes several times to choose the best key to share between nodes in network. The objective of this project is to design new protocol based on SKiMPy that is MFK and compare both SKiMPy and MFK protocol to show the differences. MFK protocol change the process of choosing key scheme and focus on sending and receiving data during emergency situation safely in MANET.

SKiMPy

eISBN: 978 – 967 – 13686 -3 - 3

305

An International Multi-Disciplinary Graduate Conference of Terengganu (GraCe 2016)

SKiMPy is created for MANET and has been introduced since 2005 by Matijar Puzar from Department of Informatics, University of Oslo that set up a symmetric shared key between devices. It determined the established key that is used to encrypt data and able to function effectively as it has been studied in-depth in the previous project. It has been made in two different implementations which are Standalone application and OLSR-Integrated. Manet Key Management MANET is a self-configured network and saving cost and time [1]. All nodes in this network are able to appear and removed freely which allow it to form a dynamic topology. Each nodes in MANET can act as router or host without any control center. It has bandwidth-constrained and variable capacity link as the node in the network that join with multiple wireless links can be heterogeneous in nature [4]. Devices that utilize this network are laptop, tablet, PC and smart phone. Therefore, it has a limitation of power due to all the mobile devices battery has limited rate of life. This network is also susceptible to both internal and external attack due to it lacks of administration center and infrastructure-less nature. Man-in-the-Middle (MITM), Data Traffic, HELLO Flood, Sybil and session hijacking attack [5] are some of the example attacks in MANET. Key management in MANET ensures secure transfers of data by decrypting and encrypting a messages using technique such as cryptography. There are four types of key management scheme can be used for MANET to authenticate the node which are Self-organized Public key management, Group-based key management, Parallel key management and Mobility Based key management METHODOLOGY This paper is based on the implementation of SKiMPy for MANET produced by P. Matija [3]. The article discusses the implementation of SKiMPy that allowed a communication for emergency and rescue situation. This protocol utilizes pre-installed certificate to secure the transmission of data third party intervention. Mobility Based key management scheme [6] shows the way of the key management scheme work to secure the communication of nodes in MANET. It categorized nodes that available in the network to two categories that is ‘weak’ and ‘strong’ node where the ‘weak’ nodes perform a minimum rekeyed interval while the ‘strong’ nodes perform a maximum rekeyed interval. This paper therefore proposes the implementation of SKiMPy using Mobility Based key management scheme to introduce MFK protocol. FINDINGS MFK protocol is a key management protocol that is used in MANET to provide safety and secure network infrastructure between authorized nodes and prevent form malicious attack. It calculates the Receive Signal Strength (RSS) of node to determine the ‘strong’ and ‘weak’ node so that it can connect to authenticated node. This protocol can secure more in the transmission data for rescue and emergency network such as military, police, fire department and medical centre that contain very sensitive data in MANET. To obtain the comparison between the first implementation of SKiMPy and MFK protocol, a simulation environment has been set up for both of the protocol in Network Simulator 2 (ns2) software with the use of TCL script. To set MANET environment, a specific features need to be added in the script that is shown in Table 1 and Table 2 below that consist of channel type, radio-propagation model, network interface type, MAC type, interface queue type, Link eISBN: 978 – 967 – 13686 -3 - 3

306

An International Multi-Disciplinary Graduate Conference of Terengganu (GraCe 2016)

Layer type, antenna model, maximum packet in queue length, number of mobile node used, routing protocol, and time of simulation end. The sizes of the simulation area tested are 500 x 500 and 1000 x 1000 square field while; the number of node tested is 10 and 20 nodes. Table 1. MANET features with 10 nodes Channel Type Radio-Propagation Model Network Interface Type MAC Type Link Layer Type Antenna Model Maximum Packet in Queue Length (ifq) Number of Mobile Node Routing Protocol Time of Simulation End

Channel/Wireless Channel Propagation/Two Ray Ground Physical/Wireless Physical Queue/Drop Tail/Primary Queue Link Layer Antenna/Omni Antenna 50 10 AODV 150

Table 2. MANET features with 20 nodes Channel Type Radio-Propagation Model Network Interface Type MAC Type Link Layer Type Antenna Model Maximum Packet in Queue Length (ifq) Number of Mobile Node Routing Protocol Time of Simulation End

Channel/Wireless Channel Propagation/Two Ray Ground Physical/Wireless Physical Queue/Drop Tail/Primary Queue Link Layer Antenna/Omni Antenna 50 20 AODV 150

MFK protocol is slightly different than SKiMPy because it uses RSS calculation to determine ‘strong’ and ‘weak’ signal of node and has better performance than SKiMPy due to less delay time of authentication. The algorithm to calculate he signal for connection is: RSS = Nw * Ѳ * Stx RSS is used to calculate the signal strength of each of the node in the network where, Nw refer to wavelength of node, Ѳ is the channel gain and Stx refer to signal power of transmitter. This calculation shows the detection of strong node in the network to join the nodes and make connection between them. Based on the simulation test that has been conducted, MFK protocol detect and connect the ‘strong’ key faster than SKiMPy protocol as shown in Figure 2 and Figure 3 where the speed of connection between nodes in those protocol are different based on 500 x 500 and 1000 x 1000 parameter area.

eISBN: 978 – 967 – 13686 -3 - 3

307

An International Multi-Disciplinary Graduate Conference of Terengganu (GraCe 2016)

Figure 2. Comparison of speed based on parameter for MFK protocol

Figure 3. Comparison of speed based on parameter for SKiMPy protocol The results for securing of the nodes in the network in these two protocol also can be shown based on Table 3 below that compare both of the key with the valid certificate, detection of attacker node and time delay.

eISBN: 978 – 967 – 13686 -3 - 3

308

An International Multi-Disciplinary Graduate Conference of Terengganu (GraCe 2016)

Table 3. Difference betweem SkiMPy and MFK protocol Features SKiMPy Valid Certificate Installed by trusted authority Detection of attacker node Determine the time of key (worst key is the attacker node) Time Delay Long time delay

MFK Installed by trusted authority Detect using calculation of strength signal Short time delay

CONCLUSIONS The aim of this project is to compare the previous implementation of SKiMPy protocol and MFK protocol in order to protect MANET from being attack and able to make secure connection in the network. MFK protocol is created based on previous SKiMPy protocol and used RSS calculation to reduce the delay time occur in previous SKiMPy. Based on the test that has been made, there are several things that is not covered in this project. Firstly, is test MFK protocol using OLSR-Integrated that using OLSR-daemon in Linux platform since one of the implementation of previous SKiMPy is OLSR-integrated. Lastly, MFK protocol should compare to other key management protocol so that the better performance among the key management protocol can be chosen. REFERENCES [1] [2] [3] [4] [5]

[6]

Aditya Bakshi, A. A. (2013). Significance of Mobile AD- HOC Networks. Tomoyuki Ohta, T. H. (2011). Self-Organizing Real-Time Service Dissemination and Collection Using Mobile Agents for Mobile Ad Hoc Networks. Matija Puzar, J. A. (2005). SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. Pardeep Kumar, P. P. (2013). A Mobile Object-based Secret Key Distribution Scheme for Wireless Sensor Networks. Aniruddha Bhattacharyya, A. B. (2011). Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques.I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350. B. Madhusudhanan, S. C. (2015). Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks .R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.

eISBN: 978 – 967 – 13686 -3 - 3

309