ITIS 6010/8010 Wireless Network Security

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
A Survey of Secure Wireless Ad Hoc Routing
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
On Security Study of Two Distance Vector Routing Protocols for Ad Hoc Networks Weichao Wang, Yi Lu, Bharat Bhargava CERIAS and Department of Computer Sciences.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Boundary detection in sensor networks for phenomenon classification GROUP MEMBERS : AKSHAY BALASUBRAMANIAN NANDAKUMAR P VENUGOPAL SATISH RAMASWAMI SALEM.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Trusted Router and Collaborative Attacks Bharat Bhargava.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Mobile and Wireless Networking
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
A Survey of Secure Wireless Ad Hoc Routing
Routing.
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Cross-layer Analysis for detecting Wireless Misbehavior
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang

Attacks on routing protocols for ad hoc networks Passive attacks Ignoring the protocol operations: data forwarding and route processing Limited impacts Active attacks Introduce false routing information False distance vector False destination sequence numbers False RERR Malicious flooding

Comparison b/w security features of reactive and proactive protocols Preparation time for attack Flexibility of attacks: time, target, method Trace back and attacker identification Overhead to conduct attacks Propagation of false routes Detection of false routes

Misuse of AODV Goals Atomic misuse Compound misuse Route disruption Route invasion Node isolation Resource consumption Atomic misuse Drop Modify and forward Forge reply Active forge Compound misuse

Different combinations of AODV packet and atomic misuse Compound misuse

Mitigating Routing Misbehaviors Extensions to DSR Watchdog Monitor whether neighbors forward the packets Maintain a counter for each neighbor Determine whether neighbors are misbehaving by comparing the counter to a threshold

Attacks to watchdog Collision at the watchdog (A does not hear B) Collision at the remote receiver (A hear B, but C does not get the packet) Frame good nodes Cheat the watchdog by controlling transmission power or directional antenna Collusive attacks

Pathrater Each node maintains a rating for other nodes Increase rating of nodes on active path periodically A misbehaved node is rated as a large negative value Calculate a path rating based on node rating (suit the source routing method)

Simulation results When 40% nodes are selfish, the delivery ratio will increase 17% Overhead of the routing protocol and Power consumption overhead Eavesdropping Longer path More route request

SAODV Proposed by researchers in NOKIA Handle import authorization: does a router accept an incoming routing update? Handle export authorization: does a router reply to a request Every node can only generate routing information about itself Dealing with both the unchanged part and changed part in the routing packets

Difference b/w data packet and routing packets Provided features A node can generate routing information only about itself Source authentication: the node is the one that it claims to be Integrity Difference b/w data packet and routing packets Intermediate nodes do not need to know the contents of a data packet Not for the routing packets: the nodes need to update their routing tables The contents of the routing packets may be changed (e.g. hop count)

Therefore, protecting the mutable and non-mutable parts in routing packets is different Assumption Every node has a public/private key pair and a certificate for the public key Use digital signature to authenticate non-mutable part, and hash chain to protect the hop-count

SAODV uses hash chains to authenticate the hop count in RREQ and RREP The source will set x=seed, top-hash = h^(max) (seed). Both x and top-hash will be sent in RREQ Every intermediate node verifies whether top-hash = h^(max-hop count) (x) The Intermediate node will change x = h (x) All fields but x and the hop count are protected by the digital signature

Process the RREQ and RREP Verify the signature before updating the routing table When an intermediate node sends a RREP, it contains two signatures: the destination’s and the intermediate node’s Process the RERR Every node will sign the RERR before forwarding it Every node will verify the signature before changing the routing table The node should not update the destination sequence number

The malicious node cannot reverse the hash function