International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 Performance Analysis of Networks in Net-Centric Warfare (NCW) Niranjan Gupta T M,Student, Mtech 2nd Year, Dept. of ECE, RVCE, Bengaluru, J Jayanthi, Senior principal Scientist, ALD, CSIR- NAL, Bengaluru, and Dr. M Bharathi, Associate Prof, Dept. of ECE, RVCE Bengaluru Abstract: Network-Centric Warfare (NCW) is composed of integrated system-of-systems that can extend the capabilities across all the platforms on the network to pursue the maximum efficiency in mission execution. It allows war fighter’s to take full advantage of all available information. A topography consisting of totally 34 nodes including firewall node has been considered. It is divided into three networks. The three networks are representative of army, military and the navy networks. It is common now a days to communicate through messages. The sending and receiving message between networks is prone for security issues as our data can be accessed by everyone within that network. In order to provide security for the messages in the network of networks, the “Message-Digest”, and PRNG (Pseudo code Random Number Generator) algorithms are used. Index Terms: Net-Centric Warfare (NCW), NCO, MD5, PRNG, MANETS, AODV, NS2. I. INTRODUCTION The modern warfare is strongly focused on the informationabout enemy status and activities. It calls for new and more sophisticated communication systems, which assurances fast and secure way of exchanging data during Network-Centric Warfare. Net-Centric or Network Centric refers to contributing as a part of a continuously changing, complex community of people, devices, information and services interconnected by a communication networks to achieve maximum benefits of resources available and their significances for better synchronization of events. The overall military system architecture provides MANET (Mobile Ad-hoc NETwork) for a military communication networks, at the lowest levels of command. The essential features of Ad-hoc networks intended for use in net-centric environments are: A. Network decentralization: Each node in Ad-hoc network can perform the services as well as participate in the data transfer to the recipient. B. Ability for the dynamic topology changes: Network nodes are independent from each other and can arbitrarily change its location, and with their mutual relations. C. Radio links usage: It rejects the need to develop telecommunications infrastructure. R S. Publication, [email protected] Page 607 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 D. High network reliability: In the case of failures of any network components, other nodes in the network can automatically take over their roles. E. Good scalability (ease of expansion): Nodes joining the network that accomplish certain safetyrequirements are able to realize services almost immediately. The authentication is based on the identity of a node. The node in the network has to prove that it is genuine. In many Network applications the identity of participating entities or nodes is simply determined by their names or addresses. Many of the High levelapplications willuse mainly names for authenticating, because address lists are much harder to create, understand, and to maintain than name lists. When a node wants to spoof the identity of some other node, it is enough to change the mapping between its low level address and its high level name. An attacker can fake the name of someone by modifying the association of his address from his own name to the name he wants to impersonate. Once an attacker has done that, an authenticator can no longer distinguish between the true and fake entity. In-order to provide the security to the messages in the network we are proposing the system which is combining the concept of MD5 (Message digest algorithm) and PRNG (Pseudo Code Random Generator) algorithms. These algorithms are the most efficient algorithms they can be used individually to provide the message security in the network, but by combining these two algorithms the data exchange will be more secured. The rest of the paper is organised as follows. The section 2 will provide the survey about NCO (Net-Centric Operations), MD5 and AODV. In section 3 actual working of the MD5 is described along with the PRNG operation. The simulation results are discussed in the section 4 followed by the Conclusion. II. BACKGROUND WORK Network-Centric Operations provide a force with access to a new, previously unreachable region of the information domain. The ability to operate in this region provides war fighters with a new type of information advantage. This advantage is enabled by the dramatic improvements in information sharing made possible by networking. With this information advantage, a warfighting force can achieve dramatically improved shared situational awareness and knowledge. The term “network-centric” originated from the DOD network centric warfare (NCW), now commonly called network centric operations (NCO). NCO is an emerging theory of war that seeks to translate an information advantage into a competitive war fighting strategy through the robust networking of well informed, geographically-dispersed forces allowing new forms of warfighting organizational behaviour. NCO’s basic tenets include: • Utilizing technological advantages to support war fighters in the battlefield • Networking all systems used by armed forces • Achieving shared awareness of the battlefield amongst all members of the armed forces R S. Publication, [email protected] Page 608 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 MD5: MD5 is one of the most widely used hash functions in the information era although its security is suspect. It compresses a piece of information with plain code and random length into 128 bits value by hash algorithm, which is called information distract. MD5 algorithm is irreversible and cannot recover the original plain code information from information abstraction, thus it is always believed safe. Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and other wireless ad hoc networks.The AODV Routing protocol uses an on-demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets. It employs destination sequence numbers to identify the most recent path. AODV offers quick adaptation to dynamic link conditions, low processing and memory overhead, low memory utilization, and determines unicast routes to destinations within Adhoc network. III. METHODOLOGY/ ALGORITHMS Most frequently used message digest algorithm is the 128 bit MD5 algorithm Developed by Ron Rivest of the MIT Laboratory for Computer Science and RSA Data Security.The algorithmwith a reference implementation was published as Internet RFC 1321 in April 1992, and was placed into the public domain at that time. MD5 is an algorithm which: Takes an input of any length, outputs a message digest of a fixed length (128-bit, 32 characters) .MD5 uses the same algorithm every time. Hence it will always generate the same message digest for the same string (data). The algorithm is described through the following five steps: Step 1. Append Padding Bits The message is "padded" (extended) so that its length (in bits) is congruent to 448, modulo 512. That is, the message is extended so that it is just 64 bits shy of being a multiple of 512 bits long. Fig.3.1 MD5 Transform Operation R S. Publication, [email protected] Page 609 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 Padding is always performed, even if the length of the message is already congruent to 448, modulo 512. Padding is performed as follows: a single "1" bit is appended to the message, and then "0" bits are appended so that the length in bits of the padded message becomes congruent to 448, modulo 512. In all, at least one bit and at most 512 bits are appended. Step 2. Append Length A 64-bit representation of b (the length of the message before the padding bits were added) is appended to the result of the previous step. In the unlikely event that b is greater than 2^64, then only the low-order 64 bits of b are used. (These bits are appended as two 32-bit words and appended low-order word first in accordance with the previous conventions.) At this point the resulting message (after padding with bits and with b) has a length that is an exact multiple of 512 bits. Equivalently, this message has a length that is an exact multiple of 16 (32-bit) words. Let M [0 ... N-1] denote the words of the resulting message, where N is a multiple of 16. Step 3. Initialize MD Buffer A four-word buffer (A,B,C,D) is used to compute the message digest. Here each of A, B, C, D is a 32-bit register. These registers are initialized to the following values in hexadecimal, low-order bytes first): Word A: 01 23 45 67 Word B: 89 ab cd ef Word C: fe dc ba 98 Word D: 76 54 32 10 Step 4. Process Message in 16-Word Blocks Here, first define four auxiliary functions that each take as input three 32-bit words and produce as output one 32-bit word. F(X,Y,Z) = XY v not(X) Z G(X,Y,Z) = XZ v Y not(Z) H(X,Y,Z) = X xor Y xor Z I(X,Y,Z) = Y xor (X v not(Z)) In each bit position F acts as a conditional: if X then Y else Z. The function F could have been defined using + instead of v since XY and not(X)Z will never have 1’s in the same bit position.) It is interesting to note that if the bits of X, Y, and Z are independent and unbiased, the each bit of F(X,Y,Z) will be independent and unbiased. The functions G, H, and I are similar to the function F, in that they act in "bitwise parallel" to produce their output from the bits of X, Y, and Z, in such a manner that if the corresponding bits of X, Y, and Z are independent and unbiased, then each bit of G(X,Y,Z), H(X,Y,Z), and I(X,Y,Z) will be independent and unbiased. Note that the function H is the bit-wise "xor" or "parity" function of its inputs. Step 5. Output The message digest produced as output is A, B, C, and D. That is, we begin with the loworder byte of A, and end with the high-order byte of D. R S. Publication, [email protected] Page 610 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 Pseudo code random number generator: A Pseudo Random Number Generator (PRNG), also known as a Deterministic Random Bit Generator (DRBG), is an algorithm for generating a sequence of numbers that approximates the properties of random numbers. The sequence is not truly random in that it is completely determined by a relatively small set of initial values, called the PRNG's state, which includes a truly random seed. Although sequences that are closer to truly random can be generated using hardware random number generators, pseudorandom numbers are important in practice for their speed in number generation and their reproducibility, and they are thus central in applications such as simulations (e.g., of physical systems with the Monte Carlo method), in cryptography, and in procedural generation. Good statistical properties are a central requirement for the output of a PRNG, and common classes of suitable algorithms include linear congruently generators, lagged Fibonacci generators, and linear feedback shift registers. Cryptographic applications requirethe output also to be unpredictable, and moreelaborate designs, which do not inherit the linearity of simpler solutions, are needed. PRNGs work by keeping an internal state. Typically this is a seed and a key, which are kept secret. If consumer requests random data, a cryptographic algorithm will operates on the seed and the key to produce pseudo-random output. The operation of the PRNG is shown in Figure 3.2. The internal state is then updated so that the next request does not produce the same data as the previous. INPUT: (Key, Seed), OUTPUT: random-data,(Key',Seed'), random-data = F (Key, Seed), Key’ = F (Key, Seed+1), Seed’ = F(Key', Seed), return random-data. Where F is a Cryptographic function. Figure.3.2 PRNG Operation PRNGs are more commonly used in experimentation: they are algorithms that generate batches of numbers that share key properties with actual random numbers. They are in common use largely because they can be easily built-in and implemented quickly by computer programs. A sequence developed by a PRNG can also be replicated if one knows the seed. IV. SIMULATION RESULTS The simulations have been performed using network simulator NS-2. The network simulator ns-2 is a discrete event simulation software for network simulations which means it simulates events such as sending, receiving, forwarding packets. The ns-allinone2.34 supports simulation for routing protocols. R S. Publication, [email protected] Page 611 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 To exchange an information insulation of the nodes is important. The selection of the nodes is left to the user. The user has to choose a proper node for sender and receiver. Note that the node from the same group cannot establish a communication. The figure 4.1 shows the selection of the proper source and the destination nodes. Fig 4.1 Selection of Source and Destination Node Fig 4.2 A view of the net-centric network The figure 4.2 shows the topography of the networks in net-centric warfare. The topography consists of totally 34 nodes including firewall node and it is divided into three networks. The three networks are considered as army, military and the navy networks. Fig 4.3 The generation of Keys for all the nodes The MD5 will generate the key for each node. The key generated for each and every node are different as shown in the figure 4.3 R S. Publication, [email protected] Page 612 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 The network routing protocol AODV will first broadcasts a request for connection to all the nodes in a network and then chooses the nearest path to the destination from the routing table entries. Fig 4.4 Transfer of packets from source to Destination Once the path is selected from the routing table it starts transmitting the packets through the firewall as shown in the figure 4.4. The transmission path is indicated with the purple colour to the nodes that are passing the packets. The green colour node indicates the sender node and the yellow colour indicates the destination node. If the sender packets are lost before reaching the destination then it will choose another nearest path to transmit the packets. Fig 4.5 Firewall found an Attacker and drops its packets If the firewall finds an attacker in the network, firewall node is indicated with blue colour circle. The attacker is indicated with the red colour circle.In the figure 4.5 node 6 is an attacker. When firewall/Centric node receives the packets from node 6(attacker) it verifies its IP address.If it is foundto be a spoof of the other node then it will indicate as an Attacker and it will drop the packets sent from node 6 and forwards only the authenticated sender packets to destination. V. CONCLUSION In this paper the analysis of Net-Centric and operations of it are studied& analysed. The major goal of the project was to provide asecurity to the networks. The security is provided R S. Publication, [email protected] Page 613 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 by MD (Message Digest) 5 method which will generate a 32bit wide code for each node. Message packet to the destination is forwarded only when the node is authorized. The firewall or centric node is used to provide authentication. The AODV is used as a network routing protocol for the communication. REFERENCES [1] Harvey Reed, Fred Stein “Net-Centric Conversations: The Unit of Work for Network Centric Warfare and Network Centric Operations”, Military Communication Conference, 2006 MILCOM 2006. IEEE Conference, 23-25th Oct 2006. [2] Shi Fu-li, Lei Yong-lin, Zhu Yi-fan “A Military Communication Super network Structure Model for Net-centric environment”, International Conference on Computational and Information Sciences(ICCIS), Chengdu, 17-19 Dec. 2010 [3] RafalBrys, JacekPszczolkowski, MiroslawRuszkowski, “Mechanisms of Ad-hoc networks supporting Network Centric Warfare”, Communication and Information Systems Conference (MCC), Military, Gdnask, Central Europe, Conference 8-9 Oct 2012. [4] SreekanthAnyapu, G. Aparna, R. Manognya, D. Ravi Kumar “Message Security through Digital Signature Generation and Message Digest Algorithm”, IJETAE Volume 3, Issue 3, March 2013. [5] C. Perkins, E. Belding-Royer, S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, Network Working Group, July 2003 [6] R. Rivest, “The MD5 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992 [7] Jing Peng, Liang Han, Guanghong Gong and Lingyu Liu, “Network Topology Based on Information Security for Network Centric Warfare Simulation”, Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on (Volume:6 ), Chengdu, China, DOC- 20-22 Aug. 2010 [8] A.Hedayati, M N.Fesharaki, M. Tavanpour, S. Saberi, AB.Hedayati “A Comparison of Rerouting Methods in Network Centric Environments Based on Swarm Topology”, Internatioal Symposium on Telecommunications IEEE 2008. [9] Latha Kant, Kenneth Y, O. Younis, D. Shallcross, K. Sinkar, A. McAuley, K. Manousakis, K. Chang and Charles Graff, “Network Science Based Approaches to Design and Analyse MANETs”, Military Communications, IEEE Communications Magazine, Nov 2008. [10] Jack L. Burbank, Philip F. Chimento, Brian K. Haberman, and William T. Kasch, “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology”, Net-centric Military Comm, IEEE Communications Magazine, Nov 2006 [11] Amine Chigani and James D. Arthur, “The Implications of Network-Centric Software Systems on Software Architecture: A Critical Evaluation”, Winston-Salem, N. Carolina, USA, ACMSE 2007, March 23-24, 2007. R S. Publication, [email protected] Page 614 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 [12] Mr.Harjit Singh, Er. Gurpinder Singh, “Wireless Networking Security (“Secured-Nim”: Blocking Misbehaving Users In Anonymizing Networks”), IJARCSSE ISSN: 2277 128XVolume 3, Issue 5, May 2013. [13] Network Centric or Net-Centric Warfare http://en.wikipedia.org/wiki/Network-centric_ warfare [14] Information on Ad hoc Networks http://en.wikipedia.org/wiki/Ad_hoc [15] Ad hoc on Demand Distance Vector Routing http://en.wikipedia.org/wiki/Ad_hoc_OnDemand_Distance_Vector_Routing [16] Message Digest Algorithm version 5 (MD 5) http://en.wikipedia.org/wiki/MD5 [17] Pseudo Random Number (PRNG)http://en.wikipedia.org/wiki/Pseudorandom_number_generator Generator [18] PRNG Mechanism http://www.cryptosys.net/rng_algorithms.html [19] David S. AlBerts, John J. Garstka, Frederick P. Stein, “Network Centric Warfare Developing and Leveraging Information Superiority”, 2nd Edition (Revised), Aug 1999. [20] DjamelDjneouri, AbdelouahidDerhab and NadjibBadache, “Ad hoc Networks Routing Protocols and Mobility”, IAJIT vol 3 No. 2, April 2006. [21] S. D. Khatawkar, K. K. Pandyaji, R. M. Patil, V. M. Sali and U. L. Kulkarni, “Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs”, IPCSIT vol.35(2012) IACSIT Press, Singapore, 2012. [22] Network Simulator:http://www.isi.edu/nsnam/ns/ [23] Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on Selected Areas in Communications (Volume:24 , Issue: 2 ), Pp: 370 – 380, Feb 2006 [24] ShenHai-Wei, Li Jin-ping, “A High-Speed and Long-Period Combined Pseudo-random Number Generator”, Second International Symposium on Computational Intelligence and Design, ISCID '09 (Volume:1 ), Changsha, Pp: 112 – 114, 12-14 Dec. 2009 [25] Morshed M.M, Ko F.I.S, Dongwook Lim, Rahman M.H, MazumderM.R.R, Ghosh J, “Performance evaluation of DSDV and AODV routing protocols in Mobile Ad-hoc Networks”, 4th International Conference on New Trends in Information Science and Service Science (NISS), Gyeongju, Pp: 399 – 403, 11-13 May 2010 [26] B.Thanikaivel, B. Pranisa, “Fast and Secure Data Transmission in MANET”, International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA, 2012. [27] Latha Kant, Kenneth Y, O. Younis, D. Shallcross, K. Sinkar, A. McAuley, K. Manousakis, K. Chang and Charles Graff, “Network Science Based Approaches to Design R S. Publication, [email protected] Page 615 International Journal of Advanced Scientific and Technical Research Available online on http://www.rspublication.com/ijst/index.html Issue 4 volume 3, May-June 2014 ISSN 2249-9954 and Analyse MANETs”, Military Communications, IEEE Communications Magazine, Nov 2008 [28] Jack L. Burbank, Philip F. Chimento, Brian K. Haberman, and William T. Kasch, “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology”, Net-centric Military Comm, IEEE Communications Magazine, Nov 2006 [29] Naqvi S.I, Akram A, “Pseudo-random key generation for secure HMAC-MD5”, IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011, Xi'an, Pp: 573 – 577, 27-29 May 2011 [30] Mary Cindy Ah Kioon, ZhaoShun Wang and Shubra Deb Das, “Security Analysis of MD5 algorithm in Password Storage”, Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA-13),Atlantis Press, Paris, France2013 APPENDIX: ABBREVATIONS AODV: Adhoc On Demand Distance Vector DOD: Department of Defence DRBG: Deterministic Random Bit Generator MANET: Mobile Adhoc NETwork MD5: Message Digest 5 MDA: Message Digest Algorithm NCO: Net-Centric Operations NCW: Net-Centric Warfare NS 2: Network Simulator 2 PRNG: Pseudo Random Number Generator R S. Publication, [email protected] Page 616
© Copyright 2024 ExpyDoc