A Study of On-Off Attack Models for Wireless Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols Yunjung Yi, Mario gerla and Taek Jin Kwon ICC 2002.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Analysis of NAT-Based Internet Connectivity for Multi-Homed On-Demand Ad Hoc Networks Engelstad, P.E. and Egeland, G. University of Oslo (UniK) / Telenor.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Modeling and Simulation Best Practices for Wireless Ad Hoc Networks L. Felipe Perrone Bucknell University Yougu Yuan Dartmouth College David M. Nicol University.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
1-1 Topology Control. 1-2 What’s topology control?
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
Impact of Radio Irregularity on Wireless Sensor Networks
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Ad Hoc Wireless Routing COS 461: Computer Networks
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Planning and Analyzing Wireless LAN
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
Self-stabilizing energy-efficient multicast for MANETs.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Energy-aware Self-stabilizing Multicasting for MANETs Tridib Mukherjee IMPACT Lab Arizona State University impact.asu.edu.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Analysis the performance of vehicles ad hoc network simulation based
Delay-Tolerant Networks (DTNs)
SENSYS Presented by Cheolki Lee
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
TCP and MAC interplay in Wireless Ad Hoc Networks
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
CprE 458/558: Real-Time Systems
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Topology Control and Its Effects in Wireless Networks
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Abhinandan Ramaprasath, Anand Srinivasan,
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Performance Evaluation of an Integrated-service IEEE Network
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Wireless LAN Simulation IEEE MAC Protocol
SWAN – A Simulator for Wireless “Ad Hoc” Networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
<month year> <doc.: IEEE doc> January 2013
DK presents Division of Computer Science, KAIST
User Cooperation for Improving Spatial Spectral Utilization in Multhop Wireless Networks March 1, 2006 Chansu Yu 3/1/2006 NEONet 2006.
Header Store & Haul Improving Mobile Ad-Hoc Network Connectivity through Repeated Controlled Flooding Thesis Presentation Robert Tyson Thedinger Department.
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Deployment Optimization of IoT Devices through Attack Graph Analysis
Presentation transcript:

A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone <perrone@bucknell.edu> Dept. of Computer Science Bucknell University, Lewisburg, PA, U.S.A. 9 Ottobre 2006 Università di Bologna

Vulnerabilities in Wireless Ad Hoc Networks It’s hard to guarantee the physical integrity of the nodes and the conditions in their surrounding environment. Communication protocols are subject to design and implementation faults. 9 Ottobre 2006 Università di Bologna

Motivation We need to understand the risks of the technology before we can rely on it for mission-critical applications. Risks can be quantified/estimated with computer simulation, but for that we need a model. 9 Ottobre 2006 Università di Bologna

On-Off Attack Model 9 Ottobre 2006 Università di Bologna

The Reboot Attack n Node n is attacked while (simulation not finished) do if Bernoulli(REBOOT PROBABILITY)==1 then ts,n ← U [ts, ts + d] at time ts,n do: while (true) do power down and stay offline for aon sec. bootup and stay online for aoff sec. end while end if The periodic rebooting of node n causes the routing protocol to send out messages to re-establish routes. A physical action against the node (e.g., removing and reinstalling batteries) is able to create additional control traffic in the network. 9 Ottobre 2006 Università di Bologna

The Range Attack n Node n is attacked while (simulation not finished) do if Bernoulli(REBOOT PROBABILITY)==1 then ts,n ← U [ts, ts + d] at time ts,n do: while (true) do decrease TX range for aon sec. restore original TX range for aoff sec. end while end if The periodic changes in the transmission power of node n cause the routing protocol to send out messages to update shortest routes. A physical action against the node (e.g., obstructing the node’s antenna) is able to create additional control traffic in the network. 9 Ottobre 2006 Università di Bologna

SWAN: a Simulation Tool Physical Process read terrain features Power Consumption Model Protocol Graph Terrain Model Mobility Model read terrain features memory OS Model (DaSSF Runtime Kernel) time run thread Host Model read terrain features RF Channel Model 9 Ottobre 2006 Università di Bologna

RADIO PROPAGATION SUB-MODEL Network Model Sub-models Physical Layer: radio sensing, bit transmission MAC Layer: retransmissions, contention Network Layer: routing algorithms Application Layer: traffic generation or “direct” execution of real application APP APP APP NET NET NET MAC MAC MAC PHY PHY PHY RADIO PROPAGATION SUB-MODEL 9 Ottobre 2006 Università di Bologna

Experimental Scenario RF propagation: 2-ray ground reflection, antenna height 1.5m, tx power 15dBm, SNR threshold packet reception. Mobility: stationary; grid deployment. Traffic generation: variation of CBR; session length=60|120, destination is random for each session, CBR 3072 bytes/s for each session. Network: 36 nodes in a 6x6 regular grid (150 m spacing). Transient avoidance: statistics collected after 100 sec. Protocol stack: IEEE 802.11b PHY (message retraining modem capture, 11 Mbit/s), IEEE 802.11b MAC (DCF), ARP, IP, AODV routing (no local route repair, MAC acknowledgements, expanding ring search, active route time out of 10 sec., max two retries for RREQs). Arena size: 900 m x 900 m. Replications: 20 runs with different seeds for every random stream in the model. For all metrics estimated, we produced 95% confidence intervals. 9 Ottobre 2006 Università di Bologna

Effect of Reboot Attack Jitter on PDR 9 Ottobre 2006 Università di Bologna

Effect of Reboot Attack on End-to-End Delay 9 Ottobre 2006 Università di Bologna

Effect of Reboot Attack Jitter on AODV Control Packets 9 Ottobre 2006 Università di Bologna

Effect of Length of Attack Cycles on AODV Control Packets 9 Ottobre 2006 Università di Bologna

Effect of Range Attack AODV Control Packets (Jitter=0) 9 Ottobre 2006 Università di Bologna

Effect of Range Attack on PDR 9 Ottobre 2006 Università di Bologna

Effect of Range Attack on End-to-End Delay 9 Ottobre 2006 Università di Bologna

Summary We presented a model that is general within the category of on-off attack processes. Our experimental results quantify the effects of two simple attack models on a wireless grid using ad hoc routing (AODV). 9 Ottobre 2006 Università di Bologna

Future Work Determine the impact of the attacks on other metrics of “network health”. We have investigated the effects on different metrics to quantify connectivity. Determine the length of the transients experienced by different metrics when there’s an attack state transition. Evaluate the impact of the attacks when the network topology is a random graph. The choice of analysis methodology will be important. Evaluate the impact of the attacks when cycle lengths are given by more complex probability distributions. 9 Ottobre 2006 Università di Bologna