A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chris Karlof and David Wagner
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Analysis of NAT-Based Internet Connectivity for Multi-Homed On-Demand Ad Hoc Networks Engelstad, P.E. and Egeland, G. University of Oslo (UniK) / Telenor.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities Jiejun Kong Mario Gerla Jiejun Kong, * Xiaoyan Hong, Yunjung Yi, Joon-Sang Park,
Secure and Anonymous Mobile Ad-hoc Routing Jiejun Kong, Mario Gerla Department of Computer Science University of California, Los Angeles August 4, 2005.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Routing Security in Ad Hoc Networks
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Multipath TCP in a Lossy ad hoc Wireless Network Medhocnet 2004 Bodrum, June 2004 Jiwei Chen, Kaixin Xu, Mario Gerla UCLA.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Energy-Efficient Protocol for Cooperative Networks.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Routing Metrics for Wireless Mesh Networks
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Routing Metrics for Wireless Mesh Networks
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MZR: A Multicast Protocol based on Zone Routing
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Vineet Mittal Should more be added here Committee Members:
MinJi Kim, Muriel Médard, João Barros
Internet Networking recitation #4
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Ad hoc Routing Protocols
Routing Metrics for Wireless Mesh Networks
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
ITIS 6010/8010 Wireless Network Security
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Adaptive Topology Control for Ad-hoc Sensor Networks
Vinay Singh Graduate school of Software Dongseo University
An Overview of Security Issues in Sensor Network
Cross-layer Analysis for detecting Wireless Misbehavior
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Presentation transcript:

A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST

Community-based secure routing protocol Analytic model Simulation Contents Introduction Problem statement Community-based secure routing protocol Analytic model Simulation Conclusions 2 CNLAB at KAIST CALAB at KAIST

1. Introduction Introduction Mobile ad hoc networks(MANETs) Vulnerable to routing attacks( especially attacks launched by non-cooperative network members ) Packet loss is common Security threats about routing have not been fully addressed 3 A new intrusion protection mechanism, community-based security Suggest the “self-healing community” From node-to-node delivery to community-to-community Solution CNLAB at KAIST

2. Problem statement Benefits RREQ flooding attack by non-cooperative members (selfish or intruded member nodes) Direct RREQ floods Non-cooperative members continuously generate RREQ RREQ rate limited & packet suppression needed 4 Indirect RREQ floods RREP & DATA packet loss Indirectly trigger more RREQ floods Excessive floods deplete network resource CNLAB at KAIST

dest source RREQ RREP 2. Problem statement (Indirect attack example) Benefits 2. Problem statement (Indirect attack example) RREQ 5 dest source RREP RREQ forwarding Can trigger more RREQ floods initiated by other good nodes RREP & DATA packet loss is common in MANET Hard to differentiate attackers from non-attackers - network dynamics? non-cooperative behaviors? CNLAB at KAIST

3. Community-based secure routing protocol Technology 3. Community-based secure routing protocol 3.1 Network assumptions Assumption 1 A node can always monitor ongoing transmissions even if the node itself is not the intended receiver 6 Assumption 2 Radio transmission is omni-directional and radio links are symmetric Assumption 3 In a network locality there are redundant network members with high probability CNLAB at KAIST

3. Community-based secure routing protocol Technology 3. Community-based secure routing protocol 3.2 Network security assumptions Assumption 1 All packet transmissions (including control, data packets and their ACKs) are protected by data origin authentication service. Every packet is authenticated and the packet sender’s identity is unforgeable 7 Assumption 2 The ad hoc nodes are equipped with hardware needed by packet leashes or Brands-Chaum protocols[6] Any pair of topological neighbors in ad hoc routing are physical neighbors CNLAB at KAIST

3. Community-based secure routing protocol Technology 3. Community-based secure routing protocol 3.3 Self-healing community (2-hop scenario) Area defined by intersection of 3 consecutive transmissions Node redundancy is common in MANET Not unusually high, need 1 “good” node inside the community area 8 Community leadership is determined by contribution Leader steps down (being taken over) if not doing its job (doesn’t forward within a timeout) Community member Community member must be in the transmission range of exactly three RREP forwarders CNLAB at KAIST

B C D Community 3. Community-based secure routing protocol Technology 3. Community-based secure routing protocol 3.3 Self-healing community (2-hop scenario) Community 9 B C D CNLAB at KAIST

dest source Communities 3. Community-based secure routing protocol Technology 3. Community-based secure routing protocol 3.4 Self-healing community (multi-hop scenario) Communities source dest 1010 The concept of “self-healing community” is applicable to multi-hop routing CNLAB at KAIST

Community around V formed upon hearing RREP Technology 3. Community-based secure routing protocol 3.4 on-demand initial configuration Community around V formed upon hearing RREP RREQ upstream 1111 V1 U V E V2 RREP EV CNLAB at KAIST

Communities (if C forwards a correct RREP) Technology 3. Community-based secure routing protocol Communities (if C forwards a correct RREP) C” 1212 Communities(C’ wins) D E B C dest source C’ CNLAB at KAIST

source dest PROBE PROBE_REP X no ACK Technology 3. Community-based secure routing protocol 3.4 reconfiguration of self-healing community (multi-hop scenario) PROBE PROBE_REP 1313 source X no ACK dest CNLAB at KAIST

4. Analytic model 4.1 mobile network model Technology Divides the network into large number n of very small tiles A node’s presence probability P at each tile is small A spatial binomial distribution B(n, p) 14 When n is large and P is small, B(n, p) is approximately a spatial Poisson distribution with rate If there are N mobile nodes roaming i.i.d The probability of exactly k nodes in an area A’ CNLAB at KAIST

4. Analytic model 4.2 Community area Aheal Technology 15 (left) maximal community 2-hop RREP nodes are Area approaching (right) minimal community 2-hop RREP nodes are Area approaching 0 CNLAB at KAIST

4. Analytic model 4.3 modeling adversarial presence Technology Θ: percentage of non-cooperative network members X: number of nodes in the forwarding community area 16 Y: number of cooperative nodes Z: number of non-cooperative nodes CNLAB at KAIST

4. Analytic model 4.4 Effectiveness of CBS routing Technology Per-hop failure prob. Of community-to-community routing is negligible with respect to network scale N 17 Per-hop success prob. Of node-to-node ad hoc routing schemes is negligible Tremendous gain EG := 1 / negligible CNLAB at KAIST

Technology 4. Analytic model 4.4 Effectiveness of CBS routing N q 18 It is even more tremendous when either network scale or non-cooperative ratio increases. CNLAB at KAIST

Alternative 4. Simulation 4.1 Performance Gap 19 CBS-AODV’s performance only drops slightly with more non-cooperative behavior CNLAB at KAIST

Alternative 4. Simulation 4.1 Mobility’s impact 20 CNLAB at KAIST

Alternative 4. Simulation 4.1 Less RREQ 21 In CBS-AODV, # of RREQ triggered is less sensitive to non-coorperative ratio CNLAB at KAIST

4. Conclusions Conclusion Conventional node-to-node routing is vulnerable to routing disruptions Excessive but protocol-compliant RREQ floods RREP / DATA packet loss 22 Analytic study approves the community design The new community-to-community secure routing is solution More optimal estimation of forwarding window & probing interval Secure and efficient key management between two communities Open challenges CNLAB at KAIST

23 Any Question? CNLAB at KAIST