Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University Presented by Dimple Kaul CS-396 Vanderbilt University

Outline of Presentation Introduction Problem & Solution Dynamic Source Routing Extensions Simulation Results Future Work Conclusion Comments Questions

Introduction An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. –Lack of Fixed infrastructure –Distributed peer-to-peer mode of operation –Multi-hop Routing –Nodes share the same media –Relatively frequent changes in nodal constellation

Mobile Ad Hoc Networks Applications –Military and tactical communication –Rescue missions in times of natural disasters

Misbehavior in Mobile Ad Hoc Networks Misbehavior of node is one that agrees to participate in forwarding of packets but then drops packets that are routed through it Types of misbehavior: Selfish node –Save battery power & resources –Utilize resources of other nodes for own benefit –Refuse to provide resources for benefit of others Malicious node –Intend to damage the network –Will not hesitate to expend resources to cause harm –Prevent other nodes from obtaining proper service

Problem Misbehaving nodes can result into degradation of throughput

Some contemporary solutions Forwarding of packets through nodes that share pre existing trust relationship However, problems are: -Requires key distribution -Trusted nodes may be still overloaded,broken or compromised -Excludes untrusted well behaved nodes Isolate misbehaving of nodes from actual routing protocol for n/w. –Add Complexity to protocols whose behavior is well- defined

Proposed solution Introduces techniques that improve throughput in an Ad Hoc Network in the presence of “Misbehaving” nodes An extra facility in n/w to detect & mitigate routing misbehavior This will result into no change to underlying routing algorithm

Dynamic Source Routing algorithm (DSR) On demand routing Nodes maintain a route caches Route Discovery Phase –If not found in cache, broadcast a route request packet –Destination sends a route reply Route Maintenance Phase –Error packets –Link breaks –Acknowledgments

Dynamic Source Routing algorithm source destination nodes propagating RREQ dest=1,path=1 dest=1,path=2 1 dest=2,path=2 dest=1,path=3 1 dest=3,path=3 dest=1,path=2 1 dest=2,path=2 dest=1,path=5 2 1 dest=2,path=5 2 dest=5,path=5 dest=1,path=5 2 1 dest=2,path=5 2 dest=5,path= i

Extension of DSR Watchdog Detects & identifies misbehaving nodes Maintains a buffer of transmitted packets Monitors next hop node’s behavior Keeps note of number of failures SABCD “A” is in transmission range of “B” Intended direction of packet

Watchdog Weaknesses May not detect misbehaving nodes in presence of: Ambiguous Collision “A” should not immediately accuse “B” of misbehaving. It should watch “B” over a period of time Receiver Collision SABCDSABCD

Watchdog Weaknesses False misbehavior reporting –Falsely reporting that the other node is misbehaving Limit transmission power –Can be heard by previous node but not enough strong to reach destination Collusion –Two or more nodes collude an attack Partial dropping –Dropping packets at lower rate

Extension of DSR Pathrater Avoids routing packets through malicious nodes Each node maintains a rating for every other node A node is assigned as a “neutral” rating of 0.5 The rating of nodes on all actively used path increase by 0.01 at periodic intervals of 200ms The rating of nodes decrease 0.05 when a link break is detected

Pathrater (contd..) High negative numbers are assigned to nodes suspected of misbehaving nodes by Watchdog It calculates a path metric by averaging the node rating in the path If there are multiple paths, the node chooses the path with the highest metric* It increases the throughput It gives a comparison of the overall reliability of different paths Increase the ratio of overhead transmissions to data transmission

Evaluation Extensions were evaluated using following metrics: –Network Throughput: Percentage of sent data packets actually received by the intended destinations –Routing Overhead: It is the ratio of routing related transmission to data transmission in a simulation –Effects of false Positives: Watchdog can have false positive effects on network. It happens when it reports that a node is misbehaving when in fact it is not

Assumptions Some assumptions are –Links between the nodes are bi-directional –Routing protocol modified such that it has two hop information –Malicious node does not work in groups

Methodology Simulated in version of Berkeley’s Network Simulator that includes wireless extensions made by the CMU Monarch project Simulations take place in a 670 by 670 meter flat space filled with 50 wireless nodes The nodes communicate using 10 constant bit rate (CBR) node to node connections Nodes move in straight line towards the destination at uniform speed 0-20 meter/seconds(m/s) The percentage of the compromised nodes vary from 0% to 40% in 5% increments

Simulation Results Tested various combinations of different extensions: –Watchdog (WD) –Pathrater (PR) –Send (extra) route request (SRR) Using two pause times –0 second pause time :Nodes are in constant motion –60 second pause time :pause time before & in between node movement

Network Throughput Four different graphs Everything enabled Watchdog & Pathrater enabled Pathrater enabled Everything disabled

Network Throughput (contd…) Throughput Vs Fraction of Misbehaving nodes 0 sec pause time

Network Throughput (contd…) Throughput Vs Fraction of Misbehaving nodes 60 sec pause time

Network Throughput (contd…) Maximum and minimum network throughput obtained by any simulation at 40% misbehaving nodes with all features enabled

Routing Overhead Four different graphs Everything enabled Watchdog & Pathrater enabled Watchdog enabled Everything disabled

Routing Overhead (contd…) Throughput Vs Fraction of Misbehaving nodes 0 sec pause time

Routing Overhead (contd…) T hroughput Vs Fraction of Misbehaving nodes 60 sec pause time

Routing Overhead (contd…) Maximum and minimum overhead obtained by any simulation at 40% misbehaving nodes with all features enabled

Routing Overhead (contd…) Adding watchdog only adds very minor overhead

Effect of False Detection Two graphs Regular watchdog Watchdog that does not report false positives

Effect of False Detection(contd…) Throughput Vs Fraction of Misbehaving nodes 0 sec pause time

Effect of False Detection(contd…) Throughput Vs Fraction of Misbehaving nodes 60 sec pause time

Effect of False Detection(contd…) Comparison of the number of false positives between the 0 second and 60 second pause time simulations. Average taken from the simulations with all features enable

Future Work Expand on how the threshold values could be optimized Evaluate watchdog & pathrater considering latency in addition to latency Implementation of a priori trusted relationships Detection of multiple node collusion

Conclusion Ad hoc networks are vulnerable to nodes that misbehave when routing packets Simulation evaluates that the two techniques –increases throughput by 17% in network with moderate mobility, while increase ratio of overhead to data transmission from 9% to 17% –increases throughput by 27% in network with extreme mobility, while increase ratio of overhead to data transmission from 12% to 24%

Comments Work does not mention about how the threshold value is calculated - it is one of the important factor in detecting malicious nodes. If malicious nodes work in a group then it is difficult to identify them Paper does not address other attacks such as Mac attack, False route request and reply messages that bring down throughput in ad - hoc network

Questions?