Mobi-Herald: Alert Propagation for MANETs*

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
1-1 Topology Control. 1-2 What’s topology control?
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
SybilCast: Broadcast on the Open Airwaves SETH GILBERT, CHAODONG ZHENG National University of Singapore.
Ad Hoc Wireless Routing COS 461: Computer Networks
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Presented by Fei Huang Virginia Tech April 4, 2007.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks Chun-Chieh Huang, Ruay-shiung Chang and Ming-Huang Guo National Dong-Hwa.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
Linda Briesemeister, José Joaquin Garcia-Lunes- Aceves, Hamid R. Sadjadpour, José Meseguer, Mark-Oliver Stehr, Carolyn Talcott DARPA PI Meeting August.
Trusted Router and Collaborative Attacks Bharat Bhargava.
Speaker: Ju-Mei Li Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks Abdulrahman H. Altalhi and Golden G. Richard Computer.
Modeling Incentives for Collaboration in Mobile Ad Hoc Networks
Analysis the performance of vehicles ad hoc network simulation based
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
MZR: A Multicast Protocol based on Zone Routing
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
ECE 544 Protocol Design Project 2016
What is Mobile Network? Why is it called Ad Hoc?
Outline Introduction Routing in Mobile Ad Hoc Networks
Ad-hoc Transport Layer Protocol (ATCP)
ODMRP Enhancement.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Fault-Tolerant Routing
Ad hoc Routing Protocols
William Stallings Data and Computer Communications
Batch Forwarding in Wireless Sensor Networks (WSNs)
Introduction There are many situations in which we might use replicated data Let’s look at another, different one And design a system to work well in that.
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Congestion Control (from Chapter 05)
Vehicular Ad-hoc Networks
Cross-layer DTN Task Scheduling in Disaster Recovery
Protocols.
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Header Store & Haul Improving Mobile Ad-Hoc Network Connectivity through Repeated Controlled Flooding Thesis Presentation Robert Tyson Thedinger Department.
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Protocols.
Presentation transcript:

Mobi-Herald: Alert Propagation for MANETs* Wenbo He, Ying Huang, Klara Nahrstedt, Whay C. Lee (Motorola) wenbohe@uiuc.edu, huang23@uiuc.edu, klara@cs.uiuc.edu, Whay.Lee@motorola.com Illinois Center for Wireless Systems Problem: How to trigger the defense against malicious attacks in the mobile ad hoc network after malicious behavior is detected locally?  Mobility Assisted Alert Propagation System Architecture: Design Goals: Efficiency (2) Reliability (3) Suppression of fake alert messages (4) Robustness (5) End-to-end delay of alert propagation Mobility-assisted epidemic routing: A mobile node retransmits a message periodically - An example (1) t=t0 (2) t=t0+T (3) t=t0+2T (4) t=t0+3T Quorum-based Verification: Resist malicious slander attacks. Assuming k is the number of collusive slanders, a node does not actively forward the received alert message before it received Q (Q>k) copies of the alert message. Alert propagation management: Balance reliability and efficiency A parameter “Times-to-send (TTS)” is attached in the message header, which indicates how many times an alert should be retransmitted by a mobile herald. Large TTS  large message overhead Small TTS  Small coverage of message delivery Balance end-to-end delay of alert propagation and efficiency Period of alert propagation “T” Large T  large end-to-end delay Small TTS  less efficiency of retransmissions Simulation Results: We simulate Mobi-herald alert propagation protocol under Random Waypoint mobility pattern. (1) Message overhead: (2) Coverage of message delivery (3) The protocol can successfully suppress fake alert messages generated by slanderers, if the number of collusive slanders is less than k. (4) Mobi-herald protocol achieves reasonable end-to-end alert propagation delay. * This work is supported by Motorola, and a patent is filled by Motorola