Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad Hoc Networks Ravindra Vaishampayan Department of Computer Science University of California Santa Cruz, CA 95064, U.S.A. Advisor:
Intrusion Detection for Black Hole and Gray Hole in MANETs.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
CSR: Cooperative Source Routing Using Virtual MISO in Wireless Ad hoc Networks IEEE WCNC 2011 Yang Guan, Yao Xiao, Chien-Chung Shen and Leonard Cimini.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
DETECTION OF WORMHOLE ATTACK IN MANET
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Trusted Router and Collaborative Attacks Bharat Bhargava.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Packet Leashes: Defense Against Wormhole Attacks
Classification of various Attacks.
Internet Networking recitation #4
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India

Neelima Gupta, Dept. of Computer Sc., University of Delhi ATTACKS on Routing Protocols in AD-HOC NETWORKS Black Hole Wormhole Rushing Attack Many more Attacks

Neelima Gupta, Dept. of Computer Sc., University of Delhi Black Hole Attack: M RREQ RREP RREQ S D

Neelima Gupta, Dept. of Computer Sc., University of Delhi Worm Hole Attack: Malicious nodes eavesdrops the packets, tunnel them to another location in the network and retransmit them at the other end. M1M1 M2M2 S D

Neelima Gupta, Dept. of Computer Sc., University of Delhi Rushing Attack Forward ROUTE Requests more quickly than legitimate nodes can do so, increase the probability that routes that include the attacker will be discovered, Attack against all currently proposed on-demand ad hoc network routing protocols.

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Attacks Informal definition: “Collaborative attacks (CA) occur when more than one attacker synchronize their actions to disturb a target network”

Neelima Gupta, Dept. of Computer Sc., University of Delhi Different Models of Collaborative Attack Collaborative Black hole attack Collaborative Black hole and Wormhole attack Collaborative Black hole and Rushing Attack

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black Hole Attack S M D 5 M1 3

Neelima Gupta, Dept. of Computer Sc., University of Delhi S M D 5 M1 3 RREQ RREP RREQ

Neelima Gupta, Dept. of Computer Sc., University of Delhi S BH D 5 BH1 3 Collaborative Black Hole Attack (cont.)

Neelima Gupta, Dept. of Computer Sc., University of Delhi S BH D 5 BH 1 3 Collaborative Black Hole Attack (cont.)

Existing Approaches Cross Validation from neighbours (especially Next Hop Neighbours) will fail Neelima Gupta, Dept. of Computer Sc., University of Delhi

Dr. Neelima Gupta, Dept. of Computer Sc., University of Delhi S M D 5 M1 3 RREQ RREP RREQ

Neelima Gupta, Dept. of Computer Sc., University of Delhi S BH D 5 BH 1 3 Collaborative Black Hole Attack (cont.)

Existing Approaches Neighbour monitoring M1 will escape Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Wormhole attack S WH 2 c4 a1 c1 D WH 1 c3 c2 BH 1 RREQ RREP Out-of-Band Channel a3 a2 RREQ RREP RREQ RREP

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black hole and Wormhole attack (cont.) S WH 2 c4 a1 c1 D WH 1 c3 c2 BH 1 a3 a2

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black hole and Rushing Attack S c4 a1 c1 D a3 R1 c3 c2 BH 1 a2 b2

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black hole and Rushing Attack (cont.) S c4 a1 c1 D R1 c3 c2 BH 1 RREQ RREP a3 a2 RREQ RREP b2 RREQ RREP RREQ RREP

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black hole and Rushing Attack (cont.) S c4 a1 c1 D R1 c3 c2 BH 1 a3 a2 b2

Neelima Gupta, Dept. of Computer Sc., University of Delhi Current Proposed Solutions to handle collaborative black hole attack Collacorative Monitoring: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, A Patcha and A Mishra, Proceedings of RAWCON ’03 Recursive Validation: Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard. Prevention of Cooperative Black Hole Attack in wireless Ad-Hoc Networks, Intl Conference on wireless netwroks, 2003

Neelima Gupta, Dept. of Computer Sc., University of Delhi Collaborative Black Hole Attack S D M2 W W M1

Neelima Gupta, Dept. of Computer Sc., University of Delhi Consider this scenario- S D M2 W1 W RREQ RREP M1 Tell W1 to monitor M1

Neelima Gupta, Dept. of Computer Sc., University of Delhi Case 1: M1 itself drops packets S D M2 W W Data Packets M1 Buffer of sent packets to M1 Packets are not forwarded; M1 is Malicious

Neelima Gupta, Dept. of Computer Sc., University of Delhi Case 2: M1 forwards but does not inform watchdog to monitor M2 S D M2 W W Data Packets M1 Buffer of sent packets to M1 Overhear the packets but does not know the next hop id; increments SUSPECT_NODE counter ->M1 is Malicious Does not send SEND_DATA signal

Neelima Gupta, Dept. of Computer Sc., University of Delhi Case 3: M1 forwards and informs but M2 drops..will be caught by W2 S D M2 w1 w2 Data Packets M1 Buffer of sent packets to M1

Neelima Gupta, Dept. of Computer Sc., University of Delhi S D M2 WW M1 Buffer of sent packets to M1 Packets are not forwarded; M2 is Malicious SEND_DATA signal

Neelima Gupta, Dept. of Computer Sc., University of Delhi Analysis Problem with this appraoch ◦ Monitoring is done during data transmission => loss of data packets. The current solutions does not specify if and how the lost data is re-transmitted Solution : Some dummy packets may be sent before sending the data packets.

S 2 1 D M W W Data Packets M does not have a route to D, so forward to 3 (not in route) Data Packets 3 NULL or NON-NULL Node Neighbor List : M Neighbor List : 3 W

Neelima Gupta, Dept. of Computer Sc., University of Delhi Another Problem ◦ Malicious Nodes acting together can alternately drop packets to keep their individual SUSPECT_NODE counter less than SUSPECT_THRESHOLD, each time a route is established through them. ◦ Malicious nodes would not be detected. ◦ Data packets are permanently lost.

Neelima Gupta, Dept. of Computer Sc., University of Delhi Recursive neighbor validation D S B3 C2 A2 A1 B1 C3 C1 B2 A3 A4 B4 C4 B5 RREQ RREP Intermediate Node, IN Next Hop Node, NHN RREP

Neelima Gupta, Dept. of Computer Sc., University of Delhi Current Proposed Solution to handle collaborative attack Weichao Wang, Bharat Bhargava, Yi Lu, and Xiaoxin Wu. Defending against wormhole attacks in mobile ad hoc networks. In Wiley Journal Wireless Communications and Mobile Computing (WCMC), volume 6, pages 483 –503. Wiley, 2006.

Neelima Gupta, Dept. of Computer Sc., University of Delhi Monitoring / characterizing Defense Classification No anomaly anomaly Negligible anomaly Attack handled Attack detected

Challenges Two much of overhead in monitoring even if no attack is present. in isolating the malicious nodes recursively. We propose: 1. Get a count of the packets received from the destination. 2. If the count is less than a threshold then monitor. 3. If a node drops more than a certain threshold, declare it to be malicious. If more than one node drops packet, their sum is compared against the threshold. If greater, both the nodes are delcared to be malicious Neelima Gupta, Dept. of Computer Sc., University of Delhi

NEED TO THINK DIFFERENTLY Neelima Gupta, Dept. of Computer Sc., University of Delhi

Thank You!!!