International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop
Wireless Network using QOS-Aware Distributed Architecture
Miss. Shraddha V. Pawar
1
, Prof. Sachin P. Patil
2
1
Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
2
Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta.
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - The WiMAX and LTE are two wireless radio data
transmission technologies based on IEEE 802.16 designed to
ensure broadband wireless access. This paper considers the
problem of detecting rogue node in WiMAX networks. A rogue
node is an attacker node that duplicates a legitimate node. It
may lead to disturbance in service. In this paper we have
proposed an efficient technique for secure data transmission to
ensure the security and integrity of the data packet in the
WiMAX network. We have used an ECDH algorithm for
ensuring secure data transmission.
Key Words: Rogue Node, Distributed Security, Elliptic
Curve Diffie Hellman Algorithm(ECDH), Worldwide
Interoperable for Microwave Access(WiMAX).
1. INTRODUCTION
Vehicular communications have received a great
deal of attention in recent years due to the demand for
multimedia applications during travel and for improvements
in safety. Safety applications often require fast message
exchanges but do not use much bandwidth. On the other
hand, multimedia services require high bandwidth for
vehicular users. Hence, to provide mobile broadband services
at a vehicular speed of up to 350 km/h. Worldwide
interoperable for Microwave Access (WiMAX) and Long-
Term Evolution (LTE) are considered the best technologies
for vehicular networks. WiMAX and LTE are Fourth-
Generation (4G) wireless technologies that have well-defined
quality of service (QoS) and security architectures.
WiMAX and LTE resemble each other in some key
aspects, including operating frequency spectrum, high
capacity, mobility, strong QoS mechanisms, and strong
security with a similar key hierarchy from the core network
to the access network. However WiMAX and LTE also differ
from each other in certain aspects, as they have evolved from
different origins. LTE has evolved from 3rd Generation
Partnership Projects (3GPP): thus, the LTE network has to
support the existing 3G users' connectivity, but there is no
such constraint for WiMAX. Particularly, on the security
aspect, the WiMAX authentication process uses Extensive
Authentication Protocol Tunneled. Maintaining QoS
requirements of a specific application has become a
significant topic and priority is to maximize the QoS
experienced by the user. QoS is the ability of a network to
provide premier service to some fraction of total network
traffic over specific underlying technologies. QoS metrics are
delay, jitter (delay variation), service availability, bandwidth,
throughput, packet loss rate. Metrics are used to indicate
performance of particular scheme employed. QoS can be
achieved by resource reservation (Integrated services),
prioritization (differentiated services).
2. EASE OF USE
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that
supports QoS-aware and safe multimedia services for
vehicular networks is mandatory for service providers. The
main cause for the MAC layer security threats in 4G vehicular
networks is due to certain unprotected MAC management
messages between Mobile station (MS) and Base Station (BS).
When the control messages are in plain text, the
attackers/intruders can easily spoof, modify, and reply those
control messages for the intended receiver node. The
severity of the security threats may vary based on the
modification of those control messages. Similarly, the
attackers may send the continuous false packets
unnecessarily to the receiving node for the water torture
attacks. Many research efforts have been published on MAC
layer security threats in both WiMAX and LTE networks and
a few of them discussed the implementation of IPSec security
for WiMAX networks.
In multihop WiMAX, once the user is registered with
the home network the security layer may use three levels of
protections for the MAC management messages, i.e., No
protection, CMAC, and Encrypted by AES-CCM. As a
consequence of adding the encryption support for MAC
messages, some of the security threats discussed no longer
exist for multihop WiMAX. However, one of the security
threats such as rogue RN attack is exists that adds a rouge
node/Fake node in network and creates big threaten to the
4G multihop wireless networks. Such attack causes network
QoS gets degraded. So there is a need for strong security
mechanisms and strict authentication methods to overcome
the existing security threats in 4G multihop. But enhancing
security should not degrade network QoS.
Hence we proposed Elliptic Curve Diffie-Hellman
(ECDH) protocol that has proven security strength and low
overhead for 4G wireless networks. ECDH is competitor to
RSA public key algorithm and has very good security. ECDH
consumes less power and suitable for 4G wireless networks.