CSMCSM: Client-Server Model for Comprehensive Security in MANETs

CSMCSM: Client-Server Model for Comprehensive Security in MANETs

Hatem Mahmoud Salama, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, Khaled Mahmoud Badran
Copyright: © 2021 |Pages: 21
DOI: 10.4018/IJISP.2021010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
Article Preview
Top

1. Introduction

A critical MANET is a MANET that contains one or more critical node. By definition a critical node is a node whose malicious behaviour interrupts the underlying MANET (A.Karygiannis et al, 2006) (Shivashankar et al, 2012). Consequently such network will fail to achieve its mission which may be also critical in military or disaster recovery applications. Typically, they consist of a set of servers where one of them is elected as a leader and a set of core-based clients where that core is materialized by a gateway. The entire security of such MANETs is complex, labor and multi-disciplinary. In fact, there are some papers that study the consensus of the network servers only (M.Henrique et al, 2012) (M.Toulouse et al, 2016) (A.Geetha et al, 2016), however, that approach does not take into consideration the failure of some clients, consequently results in higher false positive values than the ground truth. On the other hand, some other researchers concentrate only (A.Mitrokotsa et al, 2013) (A.Khannous et al, 2014) (M.Toulouse et al, 2015) on the MANET clients, however, that approach does not take into account the Byzantine servers, and it results in higher false positive values than the reality. Unfortunately, there is no a single model that covers simultaneously the two sides (servers and clients) of a critical MANET.

This paper presents CSMCSM or shortly (CSM)2 as a formal model that studies for the first time the security of both sides of critical MANETs. For such model the following aspects are pointed out.

  • 1.

    iThe Client Server Model (CSM) is a distributed system model that works by describing how servers provide services, management and control to service requesters that are represented as clients. In MANETs secured communication is most important, because of their wireless medium, resource limitation and dynamic topology. They are more prone to dangerous security attacks that come from either insiders (Byzantine) or outsiders (traditional).

  • 2.

    (CSM)2 is Raft-based that employs the Raft (D.Ongaro et al, 2013) as a secure consensus algorithm.

  • 3.

    In designing Raft, researchers Ongaro and Ousterhout applied specific techniques to improve understandability of the formal consensus concept. From the names of the two researchers the algorithm name (Tangaroa) is formed (C.Copeland et al, 2014) has presented Tangaroa as an extension of Raft. The Byzantine fault tolerant, BFT, approach given by Tangaroa is used to mitigate higher false positive values.

  • 4.

    The decision trees generated by C4.5 can be used for classification. C4.5 which is often referred to as a statistical classifier. In 2011, authors of the Weka(R.Bouckaert et al, 2013) machine learning software described the C4.5 algorithm as “a landmark decision tree program”. A C4.5 tree classifier (H.Chauhan et al,2013) is integrated with Tangaroa (that works as a BFT system) to solve the problem of higher false positive values. Here the failed consensus cases, only, are considered suspected and are passed to the decision tree. Thus the C4.5 tree classifier extends Tangaroa to allow more accurate results.

  • 5.

    As Application Needs MANET Simulation “ANMS” software is the heart of (CSM)2. It simulates the typical attacks integrates with Tangaroa to enable it to avoid high false positives and it passes the attack features to the decision tree classifier. In other words ANMS acts as an umbrella for both server and client sides, consequently integrates smoothly BFT Tangaroa and C4.5 (J48 tree classifier).

  • 6.

    ANMS has the advantage of MANET energy saving since it does not pass all the operational cases to the classifier to test them, only the cases that failed in reaching consensus are passed to be categorized by the classifier.

(CSM)2 is prototyped and its performance is evaluated. The prototype has the following contributions:

  • 1.

    Handling comprehensive security of both servers and clients i.e. of known and unknown MANET participants.

  • 2.

    Capability of energy saving to elongate the life time of the underlying MANET.

  • 3.

    High accuracy by minimizing both false positives and false negatives.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing