Secure Routing in Ad Hoc Wireless Networks 11.03.2005.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
A Survey of Secure Wireless Ad Hoc Routing
Analysis of a SuperSEAD Aaron Staple Mukund Sundararajan.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Challenges of Routing in Ad-hoc Networks Chandra D Yarlagadda.
Centre for Wireless Communications University of Oulu, Finland
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Ch 6. Security in WMNs Myungchul Kim
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
The Destination Sequenced Distance Vector (DSDV) protocol
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Ad Hoc Wireless Routing Different from routing in the “wired” world Desirable properties of a wireless routing protocol –Distributed operation –Loop freedom.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Subject Name: Ad hoc networks Subject Code: 10IS841
ITIS 6010/8010 Wireless Network Security
Routing.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

Secure Routing in Ad Hoc Wireless Networks

Requirements of a Secure Routing Protocol Detection of malicious nodes Detection of malicious nodes Guarantee of correct route discovery Guarantee of correct route discovery Confidentiality of network topology Confidentiality of network topology Stability against attacks Stability against attacks

AODV Ad-hoc On-demand Distance Vector Protocol Ad-hoc On-demand Distance Vector Protocol Source node broadcasts RouteRequest Source node broadcasts RouteRequest Intermediate nodes forward it Intermediate nodes forward it If node has a route to destination, it initiates RouteReply If node has a route to destination, it initiates RouteReply

SAR Security-aware Ad hoc Routing protocol Security-aware Ad hoc Routing protocol Enables different levels of security Enables different levels of security Level of trust as a metric Level of trust as a metric Each packet is associated with a security level Each packet is associated with a security level Intermediate nodes are associated with security levels Intermediate nodes are associated with security levels Different keys for different levels of security Different keys for different levels of security

SAR

SEAD Secure Efficient Ad hoc Distance vector routing protocol Secure Efficient Ad hoc Distance vector routing protocol Distance Vector Routing Distance Vector Routing –The metric used for routing is hop-count –Periodic and/or triggered updates –DSDV (Highly Dynamic Destination-Sequenced Distance-Vector Routing) uses sequence numbers –DSDV-SQ (DSDV for sequence numbers) Assumes upper bound for the metric used Assumes upper bound for the metric used

SEAD One-Way Hash Function One-Way Hash Function –Used for authentication –Generates a one-way hash chain Avoids looping Avoids looping Easily implement with slight modifications Easily implement with slight modifications

ARAN Authenticated Routing for Ad hoc Networks routing protocol Authenticated Routing for Ad hoc Networks routing protocol Based on cryptographic certificates Based on cryptographic certificates Defeats all identified attacks on the network layer Defeats all identified attacks on the network layer Issue of certificates: Issue of certificates: –There exists a trusted server –Doesn’t specify any specific key distribution algorithm

ARAN End-to-end route authentication: End-to-end route authentication: –Ensures that the correct destination is reached by the packets –RouteRequest and RouteReply packets encrypted at each node

Security-Aware AODV Protocol RouteRequest packets only sent when data packets arrive at node for transmission RouteRequest packets only sent when data packets arrive at node for transmission Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack) Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack) AODV = Ad-hoc On-demand Distance Vector Protocol

Security-Aware AODV Protocol Solutions: Solutions: –Restrict the intermediate nodes from originating RouteReply –FurtherRouteRequest AODV = Ad-hoc On-demand Distance Vector Protocol