Fault-Tolerant Routing

Slides:



Advertisements
Similar presentations
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 1 Haojin Zhu Zhaoyu Gao Mianxiong Dong Zhenfu.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Secure Routing in Ad Hoc Wireless Networks
CS 268: Ad Hoc Routing Kevin Lai Feb 20, Ad Hoc Motivation  Internet goal: decentralized control -someone still has to deploy.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
1 Meeyoung Cha and DK Lee Advisor - Sue Moon (Korea Advanced Institute of Science and Technology) IEEE INFOCOM 2005 Student Workshop Split-n-Save : Path.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois Slightly revised version of slides used for.
High-integrity Sensor Networks Mani Srivastava UCLA.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
MinJi Kim, Muriel Médard, João Barros
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign.
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
Ad hoc Routing Protocols
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Performance Analysis of the CONFIDANT Protocol
Mobi-Herald: Alert Propagation for MANETs*
Presentation transcript:

Fault-Tolerant Routing Providing Fault-Tolerant Ad-hoc Routing Service in Adversarial Environments Yuan Xue and Klara Nahrstedt Fault-Tolerant Routing Observation High Redundancy Problem Trade-off between packet delivery ratio and overhead Motivation when misbehaving nodes exist in ad hoc networks, the performance of its routing protocols will significantly degrade. Possible Approaches Isolation Authentication infrastructure Intrusion detection Toleration Route the packets in the presence of misbehaving nodes Misbehavior Assumptions Byzantine faulty behavior in routing and forwarding No denial of service attack to the MAC/physical layer www.iti.uiuc.edu I: percentage that network has a “good” path II: percentage that DSR route protocol discovers a “good” path III:percentage that DSR uses a “good” path I N F O R M A T I O N T R U S T I N S T I T U T E University of Illinois at Urbana-Champaign

Best-effort FT Routing Providing Fault-Tolerant Ad-hoc Routing Service in Adversarial Environments Yuan Xue and Klara Nahrstedt Method end-to-end performance measurement Security Assumptions Source and destination are well-behaved nodes Priori trust relationship between source and destination Strategies Assume bad, until confirmed good Assume good, until confirmed bad Assured FT routing Start with all available paths Refine the route progressively Drop unnecessary path Confirm a good path Lower bound on packet delivery ratio Upper bound on overhead Algorithm Property Best-effort FT Routing Start with the shortest path Hypothesis test Discard the bad path Proceed with next shortest path Upper Bound on false positive probability Lower Bound on packet delivery ratio www.iti.uiuc.edu I N F O R M A T I O N T R U S T I N S T I T U T E University of Illinois at Urbana-Champaign

percent of misbehaving nodes Providing Fault-Tolerant Ad-hoc Routing Service in Adversarial Environments Yuan Xue and Klara Nahrstedt Results 1.1 1 0.9 0.8 Greatly improved packet delivery ratio Controlled Overhead Packet delivery ratio 0.7 DSR AFTR BFTR Multipath 0.6 0.5 0.4 10 20 30 40 percent of misbehaving nodes Conclusion Fault tolerant routing is an efficient and effective approach to address the problem of misbehaving nodes in ad hoc networks Acknowledgement ONR MURI CU fund Professor Nitin Vaidya and Pradeep Kyasanur for their comments and helpful suggestions www.iti.uiuc.edu I N F O R M A T I O N T R U S T I N S T I T U T E University of Illinois at Urbana-Champaign