Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Intrusion Detection for Black Hole and Gray Hole in MANETs.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Ad Hoc Wireless Routing COS 461: Computer Networks
Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, MobiCom 2000.

Overview Introduction Node misbehavior on routing Proposed approach from the paper Watchdog Pathrater Simulation results Conclusion & comments

Ad-Hoc Network A collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. Lack of infrastructure Distributed peer-to-peer mode of operations Multi-hop Routing Applications Military communication Rescue missions in times of natural disasters

Vulnerabilities Vulnerabilities of wireless links Changing topology Absence of infrastructure Nodes may be physically controlled by the attacker

Research areas in security Key establishment Secure routing Selfishness Intrusion Detection Secure sensor networks Lightweight cryptographic protocols

Node Misbehavior Ad hoc networks maximize total network throughput by using all available nodes for routing and forwarding. A node may misbehave by agreeing to forward the packet and then failing to do so due to overloaded, selfish, malicious or broken Misbehaving nodes can be a significant problem

Contemporary Solutions Forward packets only through nodes that share a prior trust relationship. Require key distribution Trust nodes can still be overloaded, broken or compromised Untrusted nodes may be well behaved Isolate the misbehaving from the network. Would add significant complexity to protocols whose behavior must be very well defined

Proposed Approach Install extra facilities in the network to detect and mitigate routing misbehavior. Make only minimal changes to the underlying routing algorithm. Introduce two extensions to the Dynamic Source Routing Protocol (DSR) Watchdog Pathrater

Definitions & Assumptions Neighbor A node that is within wireless transmission range of another node Neighborhood All the nodes that are within wireless transmission range of a node Links between the nodes are bi-directional Nodes are in promiscuous mode operation Malicious node does not work in group

Dynamic Source Routing (DSR) on-demand Route paths are discovered at the time a source sends a packet to a destination for which the source has no path Route Request Message Route Reply Message Generate when the route request reach the destination Or when an intermediate node which contains in its route cache an unexpired route to the destination Route Error Handle link breaks

DSR (Route Request) S D

DSR (Route Reply) S D

Two extensions on DSR Watchdog Detects misbehaving nodes by overhearing transmission Pathrater Avoids routing packets through misbehavior nodes SABD C

Watchdog Maintain a buffer of recently sent packets Compare each overheard packet with the packet in the buffer to see if there is a match If a packet remained for longer than timeout, increments a failure tally for the node responsible If the tally exceeds a threshold, the node is determined to be misbehaving and the source will be notified

Watchdog Advantages Can detect misbehavior at the forwarding level Disadvantages Might not detect in presence of Ambiguous collisions Receiver collisions Limited transmission power Others

Ambiguous Collisions The ambiguous problem prevents node A from overhearing transmission from B S AB D

Receiver Collision Node S can only tell this whether node A sends the packet to node B, but it cannot tell if B receives it S AB D

Limited Transmission Power Misbehaving node can control its transmission power to circumvent the watchdog S AB D

Other disadvantages False Misbehavior When nodes falsely report other nodes as misbehaving Collusion Multiple nodes in collusion can mount a more sophisticated attack Partial Dropping A node can circumvent the watchdog by dropping packets at a lower rate than the threshold

Pathrater Each node maintains a rating for every other node it knows about in the network It calculates a path metric by averaging the node ratings in the path The metric gives a comparison of the overall reliability of different paths If there are multiple paths to the same destination, it choose the path with the highest metric

Methodology Berkeleys Network Simulator (ns) with wireless extensions made by the CMU Monarch project Simulate 50 nodes Moving speed: m/s Pause time: 0s or 60s % of compromised node: 0 – 40% in 5% increments

Metrics of Evaluation Throughput % of sent data packets actually received by the intended destinations Overhead Ratio of routing-related transmissions to data transmissions False Positive Impact of watchdog false positive on network throughput

Simulation Extensions Watchdog (WD) Pathrater (PR) Route request (SRR) 4 combinations by extensions WD=ON, PR=ON, SRR=ON WD=ON, PR=ON, SRR=OFF WD=OFF, PR=ON, SRR=OFF WD=OFF, PR=OFF, SRR=OFF

Simulation Each metric includes two graphs of simulation results for two separate pause times (0s, 60s) Simulate two different node mobility patterns using 4 different pseudo-random number generator seeds Seeds determine which nodes misbehave Plot the average of the 8 simulations

Network Throughput (0s pause time)

Network Throughput (60s pause time)

Routing Overhead (0s pause time)

Routing Overhead (60s pause time)

Effects of False Detection (0s pause time)

Effects of False Detection (60s pause time)

Conclusion Ad hoc networks are vulnerable to nodes that misbehave when routing packets Proposed two possible extensions to DSR to mitigate the effects of routing misbehavior Simulation evaluates that the 2 techniques increases throughput by 17% in network with moderate mobility, while increase ratio of overhead to data transmission from 9% to 17% increases throughput by 27% in network with extreme mobility, while increase ratio of overhead to data transmission from 12% to 24%

Comments Work does not mention about how the threshold value is calculated - it is one of the important factor in detecting malicious nodes. If malicious nodes work in a group then it is difficult to identify them Paper does not address other attacks such as Mac attack, False route request and reply messages that bring down throughput in ad-hoc network

Thank you!