Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.
A Survey of Secure Wireless Ad Hoc Routing
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Challenge: Securing Routing Protocols Adrian Perrig
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ordering in Time: A New Routing Approach for Wireless Networks Stephen Dabideen and J.J. Garcia-Luna-Aceves Department of Computer Engineering University.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
AODV and DSR Routing Protocols Under Wormhole Attack Environment
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 1 – April 5, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 3 – April 23, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Presented by Edith Ngai MPhil Term 3 Presentation
Review of A new taxonomy of routing algorithms for wireless mobile ad hoc networks: the component approach* Tim Brown *Myung Jong Lee Jianling Zheng Xuhui.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
DELAY TOLERANT NETWORK
Golden Linear Group Key Agreement Protocol
Ad-hoc Networks.
Packet Leashes: Defense Against Wormhole Attacks
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Trajectory Based Forwarding
A comparison of Ad-Hoc Routing Protocols
Secure Routing for Mobile Ad Hoc Networks (MANETs)
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Ad Hoc Networks - Performance
Ad-hoc On-demand Distance Vector
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Ad hoc Routing Protocols
Subject Name: Computer Networks - II Subject Code: 10CS64
TRUST:Team for Research in Ubiquitous Secure Technologies
AD - HOC PROJECT.
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
A Survey of Secure Wireless Ad Hoc Routing
Motion-Aware Routing in Vehicular Ad-hoc Networks
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
EEL 6935 Wireless Ad Hoc Networks
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks CSCI 6530-01 Research Methods Instructor: Dr. Joseph Giarrantano Presented by Karthik Sadasivam Date: 9/7/2004 12/2/2018

Purpose of the research To develop a new secure and efficient routing protocol ARIADNE for ad-hoc networks based upon an existing non-secure routing protocol To develop a model for the types of attacks possible in an ad-hoc network A simulation study and evaluation of the performance of the routing protocol A comparison of the performance with an existing routing protocol DSR (Dynamic Source Routing) A security analysis of ARIADNE using the developed model 12/2/2018

Background of Research Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment The ad hoc network routing protocols can be broadly classified as on-demand and proactive routing protocols The current on-demand routing protocols have been developed only for trusted environments 12/2/2018

Methods Initially a model for the types of attacks on an ad-hoc network is built The routing protocol is designed based on this attack model using symmetric key cryptography A simulation based performance evaluation is done based on ns-2 The routing protocol’s performance is compared with an on demand routing protocol DSR (Dynamic Source Routing) A security analysis is done for the new routing protocol 12/2/2018

Results of Research Secure routing - A new paradigm in routing protocols for ad hoc networks A broad classification of the several types of attacks that are possible in ad hoc networks The new routing protocol is both secure and efficient since it relies on symmetric key cryptography 12/2/2018

Conclusions Ariadne combines both security and efficiency The research also gives a broad classification of the several types of attacks that are possible in an ad hoc network Types of attacks possible How the attack might disrupt the routing Future research aims at designing more secure routing protocols which have better performance metrics 12/2/2018

Bibiliography Yih-Chun Hu, Adrian Perrig, David B. Johnson. “Ariadne:: a secure on-demand routing protocol for ad hoc networks”, Proceedings of the 8th annual international conference on Mobile computing and networking, September 2002 Yih-Chun Hu, Adrian Perrig, David B. Johnson. “Secure routing: Rushing attacks and defense in wireless ad hoc network routing protocols”, Proceedings of the 2003 ACM workshop on Wireless security, September 2003 Srdjan Capkun, Jean-Pierre Hubaux. “Secure routing: BISS: building secure routing out of an incomplete set of security associations”, Proceedings of the 2003 ACM workshop on Wireless security, September 2003 12/2/2018

Thank you! Any Questions? 12/2/2018