A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

5

Click here to load reader

Transcript of A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

Page 1: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

A Survivability Strategy in Mobile Networkby Key Distribution and Cross-layer protocol

Anu ChaudharyDepartment of informationTechnologyAKJ Institute of TechnologyandManagement, GZB(INDIA)

K.K GautamDepartment of ComputerScience & TechnologyPhonics Group ofInstitutions, Roorkee(INDIA)

Nirbhay AhlawatDepartment of ComputerScience & TechnologyPhonics Group ofInstitutions, Roorkee(INDIA)

Abstract:The capability to provide network service evenunder a significant network system elementdisruption is the backbone for the survival ofnetwork technology in today’s world, keepingthis view in mind, the present paper highlightscryptosystem and Cross-Layer Protocol. Aglobal initial key distribution method based onpublic key certificate chain shall be presented.And also present a method for survivabilitystrategy in mobile network.

Keywords:Survivability, Mobile Network, Key DistributionCross-layer protocol

Introduction:Network survivability is considered to cope withincreasing demand for reliable network system.Network survivability is an essential aspect ofreliable communication service. Survivabilityconsists not only of robustness against failureoccurring due to natural faults. In mobilenetworks infrastructure element such as basestation (BS), and base station Controller (BSC),wired links, and mobile switch centre(MSC), areemployed to provide and maintain essentialservices, hence the operation interruption of anetwork component affects overall or partialnetwork services . wireless access network have

unique characteristics to support mobile userswhich can result in different survivability andsecurity aspect [1]. There for wirelesssurvivability strategies must be designed toimprove the service available rate of the networkcomponent system [1-2].Due to the mobility if node, the networktopology is highly dynamic and all traffic suffersfrom frequent path breaks. The survivability ofrouting protocols of such networks must be ableto perform efficiently and effectively. In thispaper we propose a solution on traditionalsurvivability strategy in mobile network.Survivability is a critical requirement for reliableservices in any network. This paper highlightsthe challenge of providing Survivability.Over the years, cross-layer designs ,which lettwo or more protocols from non-adjacent layersfunction in concert, have become very popular.since these tend to sacrifice generality forperformance improvements. The two modularity,which provides flexibility in protocol update andspecialization. which uses the specificities of anetwork to improve performance.Cross-layer designs may be best understood byexplain in their opposite-layered scheme. Thelatter prevent communication between non-

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

45 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 2: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

adjacent layers in the protocol stack and limitinteractions between two adjacent layers tofunction calls and returns. Cross-layer protocolsviolate these principles and use informationavailable at two or more levels in the stack toimprove the network performance and/or lifetime.At one extreme, the multiplication of cross-layerinteractions within a protocol stack can lead to“spaghetti” designs, whereby the modification ofone aspect in a protocol may have unforeseenconsequences within many protocols.Mobile user authentication is very necessarywhen a mobile user wants to request serviceprovided by the service providers survivable(SPS) in the visited domains. For the survivablethe designing of an authentication survivabilityprotocol (ASP) suitable for the mobile network.In this paper we present a survivability strategyin mobile networks method. by use of keydistributionA network could be as simple a forum held in acity between people , where people use theopportunity of being communicate with eachother, they use a network by use of keydistribution has the potential for setup thesurvivability . Fundamental to distributemechanics is the effect of measurement on astate. If some property of a general state ismeasured, it collapses to an eigenstate of theproperty and cannot be ‘rebislt’ in to the originalstate. Information can be encoded in to a generalquantum state (GQS).

In this way GQS defined by key distributionsystem. This paper is a survey of the issues,challenges and proposed research directions insurvivability mobile network (SMN) resultingfrom our participation in the key distributionmethod and cross-layer protocol for survivablemobile network information set up.

Survivability:-

Traditional security research is primarily focusedon the detection and prevention of intrusion andattacks rather than on continued correctoperation while under attack. Fault tolerance isusually concerned with redundancy that isrequired to detect and correct up to a givennumber of naturally occurring faults. Nature isnot malicious, and conventional failure modelmake significant assumptions, in particular,assuming faults to be independent and random.the presence of intelligent adversarial attacks canprotocol vulnerability often become

more important considerations in the presence ofan adversary.

There are a number of definitions ofsurvivability. The one we use here is from theSoftware Engineering Institute, whichemphasizes timeliness, survivability under attackand failure, and that detection of attack is a vitalcapability.Survivability is the capability of a system tofulfill its mission in a timely manner. Even in thepresence of attacks or failures. Survivability goesdemon security and fault. Tolerance of focus ondelivery of essential service even when system isentered or experience failures. And rapidrecovery of full service when conditionsimprove. Unlike traditional security measuresthat require central control and adminarstive,survivability address highly distributedunbounded network environment that lackcentral control and unified security policies.

The Three Rs: Resistance, Recognition, andRecoveryThe focus of survivability is on delivery ofessential services and preservation of essentialassets. Essential service and asserts are thosesystem capabilities that are critical o fulfillingmission objectives. Survivability depends onthree key capabilities: resistance, recognition,and recovery. Resistance is the capability todetect attacks as they occur and to evaluate theextent of damage and compromise. Recovery, ahallmark of survivability is the capability tomaintain essential service and asserts duringattacks, limit the extent of damage, and restorefull service following attack.We further extend this definition to require thatsurvivability system be able to quicklyincorporate lesion learned from failure, evolve,and adapt to emerging threats. We call thissurvivability feature refinement.We can classify survivable mobile wirelessnetworking requirement into four categoriesbased on [3]: (i) resistance requirement; (ii)recognition requirement; (iii) recoveryrequirements; and (iv) refinement requirement.We can also describe a requirement definitionprocess [4]. This includes the definition ofsystem and survivability requirement, legitimateand intruder usage requirement, developmentrequirement, operation requirement, andevolution requirement. Essential service must beidentified and specified for the penetration,exploration, and exploitation phases of theattack.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

46 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 3: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

The approach has guided this work and isrecommended for more detailed requirementanalyses for future mobile wireless network.Ultimately, there are two distinct aspects ofsurvivability that apply at all networking layers.

Information access requirement:

Does the user have access to the information orservice required to complete the task in thepresence of failure or attack? For e. g. it ispossible to replicate service or information andprovide them locally when the network getspartitioned? End – to- end communicationshould not be mandated in these cases.

End- to- end communication requirement:

On the other hand there are interactiveapplication , inter- personal communication suchas voice calls, or dynamically generatedinformation such as current sensor data, whichrequire true end – to – end connectivity . Doexisting session survive? Can the user create newsession to reach the intended communicationend- point even in the presence of failures andattacks? This requires that the communicationend – point themselves survive and that thecommunication end – points themselves surviveand that the adversary must not be able topermantely partition the network. Furthermore,the adversary must not be able to permantelydisable access to required services such asauthentication, naming, resource discovery, orrouting.

Mobile Network Survivability:Existing work on survivability in the context ofcellular telephone networks concentratesprimarily on infrastructure survivability (for e.g.see the outage index metrics and does notconsider adversarial attacks[5-6]. However, theyoffer some insight on quantifying survivabilityand the role of network management tools.Networks are vulnerable during upgrades,especially those involving software [7] .Furthermore, rapid evolution leads to learning –cure problems as well as – over – concentrationleads or service into single points of failure. Thisproblem is exacerbated by deficits in networkmanagement tools to operate and maintainincreasingly complex system.Architectural improvement applicable to mobileinclude the use of redundant networks .

Base Station:In more environment, a cell that Is geographicalregion unit is geographical region unite iscovered by the radio frequency of a base station.Each call is controlled by a BS which has a fixedconnection to a BSC (or RNC). In mobilenetwork infrastructure element such as basestation controller (BSC), wired links and mobileswitch centre (MSC) are employed to provideand maintain essential service,. Hence theoperation interruption of a network componentaffects overall or partial network services.

A radiation antenna is classified as omnidirectional and directional with anommnidirectional antenna, a single frequencyspreads out in all directions of 360 coverage. Acell is directional antenna with each different setchannel.System State of Base Station:The BS system, including antenna parts , cannotprovide partial or whole service function forcoverage cell when single or more fatal failuresoccur in the BS system . in this paper, weconsider that system failures are caused by keydistribution method. For example by interruptsequence mishandling, overall system operationfalls into failure state because of unanticipatedhandled interruption to a component of thesystem.

Key distribution frame work:In mobile computing environment , when amobile host moves to the visited domain it needsto be authenticated by the current domain beforegaining the service of the provider in the domain.If the mobile host requires the current visiteddomain to provide service it will need a sharedkey with current domain authentication server.An effective method is using the hybridauthentication server. An effective method isusing the hybrid authentication method includingshared key cryptographic (PKC) system. PKCcan verify the identity of the owner of a publickey certificate can verify the identity of theowner of a public key and avoid the attack ofimpersonation. It is impossible to take singlepublic key certificate (SPKC) authority todisseminate the PKC in the interrupt .so a sableHierarchical Public key distribution (HPKD)framework is presented. According to the scaleof the mobile users, the number of the layer ofthe framework can be decided. Figure 1 is anexample of framework. The top level node S A1is the root of the survivability certificate

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

47 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 4: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

authorities (SCA). These are n levels CA node inthe hierarchical tree.

Fig Frame work of Key Distributionure-1

The distributing process of public key certificate(PKC) is described as follows:

(1) SCA1 Sends PK1, SC2 to SCA2;(2) SCA2 Sends PK1||PK2, SC2||SC3 to

SCA3;(3) SCA3

SendsPK1||PK2||PK3,SC2||SC3||SC4 toSCA4

::

(n-1) SCAn-1 sends PK1 ||PK2||…||PKn-1,SC2||SC3||SC4||….SCn

(n) SCAn Sends PK1||PK2||…||PKn-1 ||PKn,SC2||SC3||SC4|……After the distributing process is performance the

AS and user gain a certificate chain respectively.

A network is connected if these are a pathbetween every pair of nodes. And a network isbiconnected if the toss of any one link leaves thenetwork connected. by key distributedframework it is clear that if user is linked bySCA1 then it is to important that every nodeconnected by each other.

Cross-Layer Protocol:

It is repeatedly argued that layered architecturesare not suitable for mobile networks. to illustratethis point ,researchers usually present what they

call across-layer design proposal .cross-layerdesign refers to protocol design done by activelyexploiting the dependence between protocolsgain .this is unlike layering, where the protocolsat the different layers are designs independently.Protocols can be designed by respecting therules of the reference architecture.

In a layer architecture, this would meansdesigning protocols such that a higher-layerprotocol only makes use of the services at thesevice is being provide.

Physical cross-layer module:A key concept at the physical cross-layer is thecapacity of survivability region. whichcharacterizes a tradeoff between achievablecapacities at different links for survivability.Consider a network with A, B and CL as the linkgain,power,noise,respectly. Denote Dl as theinterference coefficient from link k1 to the linkk2.assume that each node has a power boudgetXmax. thus the power control with a physicalCross-layer module interference model may beformulated as

max ∑¥n

¥ is dual variable. ¥ play a key role incoordinating the survivability networking layerdemand and layer supply.n-capicity region at the physical cross-layer

n=log (1+SINR) for every k2 ϵ E

SINR=AB/∑AB+CL for every L ϵ E

Because of interference, the power controlproblem is a non convex optimization proble thatis present physical cross-layer module[9]capacity approximitly.Conclusion:In this paper, we have proposed a scheme formobile service use of BS system and keydistribution and Cross-layer protocol.. The keydistribution takes full in to account and thecertificate chain is transferred in clear text,impeders can observe the home SCA controlsAnd cross-layer protocol for many mobile host.When the mobile host gets to visited domain, itmay get a survivability scheme.

Reference:(1) D.Tipper, S. Rammaswamy, and

T. Dahiberg,”pcs network survivability”in proc. IEEE WCNC, new or leans LA,sep 1999, invited paper.

SCA1

1SCA2

SCA3

SCAn

SCA2

SCA3

a1

SCA4 SCA1

SCAn

UserSCA

SCA3

SCAn

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

48 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 5: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol

(2) D. Samfat, R. molva, N. Asokan,“Untraceability in mobilke Network”Proceeding of Mobi COM’95, Berkely,November 1995.

(3) R.J.Ellison,D.A.Ficher,R.C.Linger,H.F.Lipson,T.Longstaff and N.R. Mead,“Survivable Network Systems;AnEmerging Discipline,” Tech. ReportCMU/SEI-97-TR-013 and ESC-TR=97-013,CarnegieMellonUniversity,softwareEngineering, Institute ,Nov,1997.

(4) J.Kabara , P. Krishna Murthy, and D.Tipper, “Information auuurance inwireless network”. In proc. IEEEworkshop on DIREN’02.

(5) U. Varshney A.P Snow and A.D.Malloy, “Designing Survivable wirelessand mobile network” in proc. IEEEWCNC’99, neworeleans, LA, Sep.1994, pp.30-34.

(6) Zhang Bin, Wujing-Xing Proc. Of thefeb.2003 ICCNMC’03 IEEE.

(7) Sangjoon Park, Jiyoung Song,Byunaggi Kim, IEEE Trans of Veh.Tech. Vol. 55 pp 328-339.

(8) Ashotosh Dutta , James Burns , K.Daniel Wong, Ravi jain, Ken YoungTelcordia Technologies, 445 SouthStreet, Morristown, NJ 07960 pp 1-6

(9) Sangjoon Park , Jiyoung song, andByunggi Kim, Member, IEEE “ASurvivability Strategy in MobileNetworks. IEEE TRANSACTION ONTECHNOLOGY, VOL. 55,NO.328-340.

(10) JunYun, Zongpeng Li,Wei Yu,andBaochun Li,IEEE JOURNAL ONSELECTED AREA INCOMMUNICATIONS,VOL,24,NO,11,NOVEMBER2006.

.AUTHORS PROFILE

Authors Profile ..Anu Chaudhary is the Head of theDepartment in Inforation of Technoogy & Management,Gzb and completed his PHD from Gurukul KangariUniversity,Haridwar (India). Prof Anu is basically workingin the area of mobile network.

K K Gautam is a Director in

the Phonics Group of Institutions, Roorkee (India). Prof

Gautam has completed his PhD in ComputerEngineering Department. He has a teaching experience ofmore than 20 years and also has many research paper in thefield of network security and currently he is working in thearea of mobile network and wireless network.

Nirbhay Ahlawat is the Astt.Prof. in thedepartment of Computer science in Phonics Group ofInstitutions,Roorkee and completed his M.tech From SubhartiUniversity,Meerut (India).He is also a research scholar andpresently working in the field of Network Security.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 4, April 2014

49 http://sites.google.com/site/ijcsis/ ISSN 1947-5500