IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.

Slides:



Advertisements
Similar presentations
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Advertisements

QoS in Mobile Ad Hoc Networks
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols Yunjung Yi, Mario gerla and Taek Jin Kwon ICC 2002.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Analysis of NAT-Based Internet Connectivity for Multi-Homed On-Demand Ad Hoc Networks Engelstad, P.E. and Egeland, G. University of Oslo (UniK) / Telenor.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Modeling and Simulation Best Practices for Wireless Ad Hoc Networks L. Felipe Perrone Bucknell University Yougu Yuan Dartmouth College David M. Nicol University.
Doc.: IEEE /1019r1 Submission July 2011 MediaTek, Inc Slide 1 Supporting Large Number of STAs in ah Date: Authors:
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez A Paper Presentation of ”Multihop Sensor Network Design for Wide-Band Communications” Proceedings.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
1-1 Topology Control. 1-2 What’s topology control?
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Network Simulation Internet Technologies and Applications.
Ad Hoc Wireless Routing COS 461: Computer Networks
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Doc.: IEEE /875r1 Submission Hyun Seo Oh, ETRI July 2008 Slide 1 Radio Transmission Technology for V2V/V2I Applications Date: Authors:
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Planning and Analyzing Wireless LAN
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
Self-stabilizing energy-efficient multicast for MANETs.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Doc.: IEEE /r0 Submission November 2005 Xin Yu and Hang LiuSlide 1 Implementation and Evaluation of AODV with Proactive Route Announcements.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
TCP and MAC interplay in Wireless Ad Hoc Networks
A comparison of Ad-Hoc Routing Protocols
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Topology Control and Its Effects in Wireless Networks
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Performance Evaluation of an Integrated-service IEEE Network
SWAN – A Simulator for Wireless “Ad Hoc” Networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
DK presents Division of Computer Science, KAIST
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science Bucknell University, Lewisburg, PA, U.S.A.

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Vulnerabilities in Wireless Ad Hoc Networks It’s hard to guarantee the physical integrity of the nodes and the conditions in their surrounding environment. Communication protocols are subject to design and implementation faults.

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Motivation We need to understand the risks of the technology before we can rely on it for mission-critical applications. Risks can be quantified/estimated with computer simulation, but for that we need a model.

IEEE OpComm 2006, Berlin, Germany 18. September 2006 On-Off Attack Model

IEEE OpComm 2006, Berlin, Germany 18. September 2006 The Reboot Attack while (simulation not finished) do if Bernoulli(REBOOT PROBABILITY)==1 then t s,n ← U [t s, t s +  ] at time t s,n do: while (true) do power down and stay offline for a on sec. bootup and stay online for a off sec. end while end if end while n The periodic rebooting of node n causes the routing protocol to send out messages to re-establish routes. A physical action against the node (e.g., removing and reinstalling batteries) is able to create additional control traffic in the network. Node n is attacked

IEEE OpComm 2006, Berlin, Germany 18. September 2006 The Range Attack while (simulation not finished) do if Bernoulli(REBOOT PROBABILITY)==1 then t s,n ← U [t s, t s +  ] at time t s,n do: while (true) do decrease TX range for a on sec. restore original TX range for a off sec. end while end if end while n The periodic changes in the transmission power of node n cause the routing protocol to send out messages to update shortest routes. A physical action against the node (e.g., obstructing the node’s antenna) is able to create additional control traffic in the network. Node n is attacked

IEEE OpComm 2006, Berlin, Germany 18. September 2006 SWAN: a Simulation Tool Physical Process Terrain Model OS Model (DaSSF Runtime Kernel) Protocol Graph Host Model time memory run thread RF Channel Model read terrain features read terrain features Mobility Model read terrain features Power Consumption Model

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Network Model Physical Layer: radio sensing, bit transmission MAC Layer: retransmissions, contention Network Layer: routing algorithms Application Layer: traffic generation or “direct” execution of real application Sub-models PHY MAC NET APP RADIO PROPAGATION SUB-MODEL PHY MAC NET APP PHY MAC NET APP

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Experimental Scenario RF propagation: 2-ray ground reflection, antenna height 1.5m, tx power 15dBm, SNR threshold packet reception. Mobility: stationary; grid deployment. Traffic generation: variation of CBR; session length=60|120, destination is random for each session, CBR 3072 bytes/s for each session. Network: 36 nodes in a 6x6 regular grid (150 m spacing). Transient avoidance: statistics collected after 100 sec. Protocol stack: IEEE b PHY (message retraining modem capture, 11 Mbit/s), IEEE b MAC (DCF), ARP, IP, AODV routing (no local route repair, MAC acknowledgements, expanding ring search, active route time out of 10 sec., max two retries for RREQs). Arena size: 900 m x 900 m. Replications: 20 runs with different seeds for every random stream in the model. For all metrics estimated, we produced 95% confidence intervals.

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Reboot Attack Jitter on PDR

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Reboot Attack on End-to- End Delay

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Reboot Attack Jitter on AODV Control Packets

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Length of Attack Cycles on AODV Control Packets

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Range Attack AODV Control Packets (Jitter=0)

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Range Attack on PDR

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Effect of Range Attack on End-to- End Delay

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Summary We presented a model that is general within the category of on-off attack processes. Our experimental results quantify the effects of two simple attack models on a wireless grid using ad hoc routing (AODV).

IEEE OpComm 2006, Berlin, Germany 18. September 2006 Future Work Determine the impact of the attacks on other metrics of “network health”. We have investigated the effects on different metrics to quantify connectivity. Determine the length of the transients experienced by different metrics when there’s an attack state transition. Evaluate the impact of the attacks when the network topology is a random graph. The choice of analysis methodology will be important. Evaluate the impact of the attacks when cycle lengths are given by more complex probability distributions.