Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Arsitektur Jaringan Terkini
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu MMLAB, Seongil Han
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Analysis the performance of vehicles ad hoc network simulation based
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MOBILE AD-HOC NETWORKS
Internet Networking recitation #4
Ad-hoc Transport Layer Protocol (ATCP)
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
by Saltanat Mashirova & Afshin Mahini
ITIS 6010/8010 Wireless Network Security
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Computer Networks: Wireless Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Security of wireless ad-hoc networks

Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols not suitable for MANET networks? Routing protocols for MANET Nodes misbehave Routing Security Schemes

Properties of Ad-Hoc network (1) No fixed topology Each node is a router Limited energy Limited CPU and other resources Transient connectivity and availability Shared physical medium Identity different from address Physical vulnerability Lack of central administration

Properties of Ad-Hoc network (2) Where Ad hoc network –Installing an infrastructure is not possible –The network is too transient –The infrastructure was destroyed Throughput

Security Challenges Confidentiality –Encryption and access control with authentication Integrity –Also require cryptographic keys Availability Results in two fundamental problem –Trust establishment, key management and membership control –Network availability and routing security

MANET vs. Traditional Routing (1) Every node is potentially a router in a MANET, while most nodes in traditional wired networks do not route packets Topologies are dynamic in MANETs due to mobile nodes, but are relatively static in traditional networks MANET topologies tend to have many more redundant links than traditional networks

MANET vs. Traditional Routing (2) A MANET router typically has a single interface, while a traditional router has an interface for each network to which it connects Power efficiency is an issue in MANETs, while it is normally not an issue in traditional networks Low bandwidth links, high bit error rates, frequent changes in network topology, battery- powered devices with limited transmitter power

Why traditional routing protocols not suitable for MANET networks? MANETs are usually highly dynamic. No pre-existing infrastructure. No centralized administration. Dynamic topologies. Energy-constrained nodes. Limited physical security.

Routing protocols for MANET IETF MANET working group Categories –Proactive=Periodic topology updates –Reactive=On-demand driven protocol –Hierarchial Protocols –DSR (draft), FSR, DSDV, TORA, ZRP, AODV (RFC 3561), OLSR (RFC 3626), TBRPF (RFC 3684)

Nodes misbehave Overloaded Selfish Malicious broken

Solutions to misbehaving node A priori trust relationship Forsake or isolate these nodes form within the actual routing protocol for the network Install extra facilities in the network to detect and mitigate routing misbehavior

Routing Security Schemes Watchdog and Pathrater SEAD SRP

Watchdog and pathrater Two extensions to the Dynamic Source Routing (DSR) to help mitigate routing failures and attacks in ad-hoc networks Watchdog: identifies misbehaving nodes Pathrater: avoids routing packets through these nodes

DSR Route discovery Source May receive many ROUTE REPLY

DSR (cont.) Route maintenance –Handles link breaks ABSD Link break notify 1.Try another path 2.Do a route discovery B moves out of transmission range of A Link break occurred

Watchdog

Pathrater Run be each node in the network Rating for every other node Path metric If multiple paths –Highest metric

Watchdog’s weaknesses Ambiguous collisions Receiver collisions False misbehavior Partial dropping

Ambiguous/receiver collisions Ambiguous –Prevents A from overhearing transmissions from B –If repeatedly fails to detect B forwarding on packets, then A assume B misbehaving Receiver –B could be selfish or malicious (wastes resource)

False misbehavior Nodes falsely report other nodes as misbehaving ABSD PPP F 1. S mark B as misbehaving A A A 2. S wonder why received replied 1. If A drops Ack Packet 2. B detects this misbehavior and reports it to D

Partial dropping A node can circumvent the watchdog by dropping packets at a lower rate than the watchdog's configured minimum misbehavior threshold.

SEAD A routing protocol based on authenticating DSDV.

SRP

NIST BSAR

pros and cons