CS 495 Advanced Networking David R. Choffnes, Spring 2005 Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly.

Slides:



Advertisements
Similar presentations
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
Advertisements

Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.
A Survey of Secure Wireless Ad Hoc Routing
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Improving TCP Performance over MANETs by Exploiting Cross-Layer Information Awareness Xin Yu NYU Presented by: David Choffnes.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Coping with Communication Gray Zones in IEEE b based Ad hoc Networks, H. Lundgren, E. Nordström, and C. Tschudin Anne Saaranen.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Challenge: Securing Routing Protocols Adrian Perrig
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Low-Rate TCP Denial of Service Defense Johnny Tsao Petros Efstathopoulos Tutor: Guang Yang UCLA 2003.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Power saving technique for multi-hop ad hoc wireless networks.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
CprE D.Q.1 Random Thoughts on MobiCom 2004.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
SRI International 1 A Simulation Comparison of TBRPF, OLSR, and AODV Richard Ogier SRI International July 2002.
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois Slightly revised version of slides used for.
Advanced Communication Network Joint Throughput Optimization for Wireless Mesh Networks R 戴智斌 R 蔡永斌 Xiang-Yang.
Implementation of Collection Tree Protocol in QualNet
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Ad Hoc Network.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Sharp Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
Random and Uninformed Summary Impressions (or, how Victor finally found something I could talk about) Scott Shenker.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
Realistic Mobility Models for Vehicular Ad hoc Network (VANET) Simulations ITST 高弘毅 洪佳瑜 蔣克欽.
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
The Impact of Multihop Wireless Channel on TCP Performance
Study of performance of regular TCP in MANETs (using simulator).
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Motion-Aware Routing in Vehicular Ad-hoc Networks
Achieving Resilient Routing in the Internet
Outline The spoofing problem Approaches to handle spoofing
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

CS 495 Advanced Networking David R. Choffnes, Spring 2005 Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly (EPFL & Rice) Appears in: MobiCom ’04 Presented by: David R. Choffnes

2 Outline Ranting More Ranting Zombies Ranting

3 JellyFish Attacks Requires a closed-loop protocol, like TCP –But we’ve already discussed paper detailing how TCP doesn’t work well for ad hoc networks –How do protocol-compliant attacks work on cross- layer protocols? Not specific to ad-hoc networks –E.g., periodic dropping –It would be nice to compare performance against wired networks in these cases Can actually help the system when it is overloaded!

4 Methodology: Attacks without Solutions Exploring impact of attacks without considering solutions lessens validity of results Authors do not consider more interesting scenarios such as hybrid environments (more than one TCP implementation) Even though nodes are protocol compliant, anomalous complete TCP collapse or significant reduction in performance is not hard to detect Seems to rely too much on cross-layer independence

5 Misbehavior Diagnosis PACK limitations –Power management not likely in highly mobile scenarios –Directional antennae not widely deployed yet, not necessarily true that they will be anytime Diagnosis time: order of seconds –No results back up the claim –How does this change with different routing protocols?

6 Modeling and Simulation Mean route lifetime: 10s –Why not look at a range of mean lifetimes corresponding to real scenarios? Simulation environment –Open field of 1.2 square miles! –200 nodes moving randomly! (Shaun of the Dead) –Maximum velocity of 10 m/s (Most people can’t run much faster than 3 m/s, esp. with a computer in hand, browsing the Web or using FTP) –Receive range of 250m is ridiculously unrealistic

7 More issues with Experiments To what realistic scenario does the network traffic correspond? Figure 16: large radio range inhibits fairness measurement, but the authors do not consider reducing the radio range Only one routing protocol evaluated –How does JF impact AODV? –How about location-based routing protocols? –Cross-layer reliable delivery protocols?

8 Finally… This is NOT the Internet –These are mobile scenarios, where all computers are relatively close to each other and in an open field –Malicious attacker cannot simply hide behind a bush –No doubt there are techniques to locate the JF attacker and physically remove her from the network