A Flow-Based Network Monitoring Framework for Wireless Mesh Networks Authors Feiyi Huang, Yang Yang, University College London Liwen He, British Telecom.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
12/09/20041 Daniela Maniezzo, UCLA Gianluca Villa, Politecnico di Milano Mario Gerla, UCLA A “Smart” MAC-Routing Protocol for WLAN Mesh Networks.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Wireless MESH network Tami Alghamdi. Mesh Architecture – Mesh access points (MAPs). – Mesh clients. – Mesh points (MPs) – MP uses its Wi-Fi interface.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
Usman Rafique NAME : USMAN RAFIQUE SUPERVISOR: Prof Rikku Jänttii.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Ch 4. Routing in WMNs Myungchul Kim
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Wireless Mesh Networks Myungchul Kim
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Seminar on Wireless Mesh Networking Presented By: Mankiran Kaur ( ) M.Tech(C.S.E)
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVING OF WIRELESS MESH NETWORKS.
Introduction Wireless devices offering IP connectivity
Ad-hoc Networks.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Mobile ad hoc networking: imperatives and challenges
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Computer Networks: Wireless Networks
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

A Flow-Based Network Monitoring Framework for Wireless Mesh Networks Authors Feiyi Huang, Yang Yang, University College London Liwen He, British Telecom Group CTO Presented by Sheetal Gupta CMSC 681 Fall 2007

Agenda Wireless Mesh Networks Vulnerabilities and Security Challenges Proposed MeshFlow Framework MeshFlow Record Structure Record Creation Record Management Record Analysis Implementation Issues Conclusion

Wireless Mesh Networks (WMN) Are an extension of wireless ad hoc and sensor networks. Has a hybrid network infrastructure with a backbone and an access network. It is a group of self- organized and self- configured mesh clients and routers interconnected via wireless links. Applications – digital home, community and neighborhood networking, enterprise networking, emergency and disaster networking.

Wireless Mesh Networks (WMN) Mesh clients can be user devices with wireless network card, like PCs laptop, PDAs and mobile phones. They have limited energy, computing power and radio range. Mesh routers are usually more powerful in terms of computation and communication capabilities and have continuous power supply. They normally are static and provide access points to supply internet connections for clients. User traffic from client is transmitted through a multihop, wireless path to its destination – client- to-client (CC), client-to-router (CR) and router-to- router(RR).

Wireless Mesh Networks (WMN) Wireless mesh backbone network is formed by ad hoc mode interconnections of mesh routers. When new or existing router joins or leaves the backbone, the network self- organizes and self-configures accordingly. In WMN, usually there is one static mesh router and a number of mesh clients that are either static or mobile.

Vulnerabilities and Challenges Security attacks can be in the physical, MAC and network layers. Physical layer – Radio frequency jamming: Attackers can generate jamming signals to interfere with communications on wireless channels. MAC layer attack – In contention based MAC protocols, a small back-off interval gives the user the advantage of gaining access to the wireless channel quickly. Another attack is continuously broadcasting busy tone signals causing other users to be in waiting status for a long period. Network layer – For reactive routing protocols like AODV, the node list in the route request (RREQ) and route reply (RREP) can be fabricated, replaced or deleted. For proactive routing protocols like OLSR, attacker can advertise a modified routing table, leading all traffic towards an intended address or to generate loops. Attacker can steal all packets, produce a sink-hole by selectively discarding packets.

Vulnerabilities and Challenges(cont.) Denial of Service (DoS) attack – Handshake messages, other access control packets in the MAC layer, routing tables and route discovery packets in the network layer can be easily falsified to exclude vital fields, include a non-existing source or destination or replace by malformed information. MAC message exchange and route discovery procedures will be suspended by these unreadable packets and tables. As a result, additional requests from other devices will not be responded to by these terminals which are struggling to resolve these packets and tables. DoS attack can be achieved more easily by flooding attacks – ICMP flooding, synchronize packet in TCP flooding and UDP flooding. In WMN flooding is more damaging because of weaker network devices.

MeshFlow Framework All these performance degradations will be reflected in the network traffic change. By monitoring the traffic change situation, an attack can be actively monitored. In a WMN the concept of network traffic flow is extended and defined as MeshFlow. The MeshFlow framework is designed to generate, transmit and analyze MeshFlow records.

MeshFlow Framework(cont.) MeshFlow record is a special kind of packet and contains a summary of the properties of packets passing through a mesh router. Fields included are source and destination addresses, next-hop address, number of bytes, packets, transport protocols and previous transmission delay summation. MeshFlow Creation - On each mesh router, part of the memory is separated to construct a MeshFlow cache dedicated to MeshFlow record creation and maintenance. When a packet travels through the router, its transmission information is extracted and comprises a MeshFlow record. If 2 packets have the same source, destination, next- hop address and the same transport protocol, their transmission information is aggregated into one record by aggregating the number of packets, bytes and delay duration.

MeshFlow Framework (cont.) MeshFlow Management - When a MeshFlow record is created it is stamped to indicate starting time of the record. An aging mechanism is implemented to calculate the overall active duration of the record. The records are then exported to a dedicated collector and analyzer and permanently deleted from the MeshFlow cache.

MeshFlow Framework (cont.) MeshFlow analysis – After exporting the records from all routers to the collector, an entire network picture can be constructed. User monitoring – When a packet travels through a multi-hop path consisting of mesh routers, records are created on each router. On aggregating records, the complete transportation path of a packet can be derived, including source, destination and all intermediate routers. So a comprehensive investigation of each traffic flow is achieved. Router monitoring – When records are aggregated based on mesh routers, traffic transported on each of its channels can be illustrated clearly.

MeshFlow Framework (cont.) MeshFlow analysis (cont.) Security Protection – An attack scenario leads to abnormal traffic. These can be detected by analyzing the MeshFlow records and matching with attack signatures. For example, in a flooding attack there is burst traffic toward the same destination. In MAC abuse there will be no successful transmissions for that access network. Protection can be achieved by further action like letting the flood-generating router block the corresponding attack traffic. Application and Service Monitoring – Different network applications usually are performed by separate transport protocols. MeshFlow records can be aggregated for each application at each router. Inappropriate resource utilization is reallocated to balance different applications performed on each router.

Implementation Issues Unavoidably the MeshFlow framework induces extra overhead on the network. Careful designing to suit specific network scenarios is required. Two static parameters must be determined. MeshFlow record structure – Different fields are used for different monitoring and analysis. It is not necessary to generate a complete record for every scenario. Collection method – Three methods possible. Dedicated cable line – Each router had a dedicated cable line Distributed antenna – The MeshFlow collector has antennas deployed around the entire backbone network. Multi-hop relaying – Records are exported as normal packet transmissions via multi-hop router-to-router wireless links, finally reaching the collector.

Implementation Issues (cont.) Two dynamic parameters must be determined Packet sampling rate – For each incoming packet at a router, information is either extracted immediately or ignored, depending on sampling rate. Time-based – Extract information from packets at some time intervals Packet-based – Sample one packet after ignoring a certain number Terminal-based – More frequent sampling for packets from terminals having a bad history. Exportation time interval – Idle – Export if a record is idle for a certain period. Active – if a record if active for too long Oldest –record exported when Mesh cache is heavily loaded.

Conclusion We reviewed security challenges, attacks in the physical, MAC and network layers of Wireless Mesh backbone and access Networks. We defined a new concept of MeshFlow and proposed a flow- based network monitoring framework to tackle the security issues in WMNs.

Reference “A Flow-Based Network Monitoring Framework For Wireless Mesh Networks”, Feiyi Huang, Yang Yang, University College London, Liwen He, British Telecom Group CTO

Thank you! Questions ?