Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Arsitektur Jaringan Terkini
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Wireless Mesh Networks Myungchul Kim
1 Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks Yi Zheng, Uyen Trang Nguyen and Hoang Lan Nguyen Department of Computer.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
DETECTION OF WORMHOLE ATTACK IN MANET
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Introduction Wireless devices offering IP connectivity
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Network Security Workshop, February 14, 2012

Contents Introduction Problem Statement Related Work Our Proposed Mechanism Result and Analysis Conclusion and Future Work

Wireless mesh networks (WMNs) Introduction Wireless mesh networks (WMNs) Self-organized Self-configured Self-healing Low up front costs Scalable

Overcome last-mile Internet access problems Advantages: Introduction (cont.) Overcome last-mile Internet access problems Advantages: Adapts to dynamic topology changes Distributed cooperation routing WMN applications: Community networking Disaster relief Surveillance and monitoring Vulnerabilities exist in WMNs Shared wireless medium Distributed architecture Rational : Selfish and Greedy bandwidth, QoS, resource Malicious : Deprive rights@

Network Performance Deteriorates!!! Problem Statement Two type of attacks Passive attack Active attack Denial of service (DoS) attacks Preventing legitimate users from accessing information, services or resources Gray Hole attack Also known as selective forwarding attack A variation from Black Hole attack Motivation of the attacks: Rational intentions Malicious intentions Rational : Selfish and Greedy bandwidth, QoS, resource Malicious : Deprive rights@ Network Performance Deteriorates!!!

Problem Statement (cont.) Existing security solutions Cryptographic mechanisms Public/private key exchange Not entirely applicable in WMNs Decentralized network architecture Routers physically tampered or software vulnerabilities exploited The need for non-cryptographic security mechanism arises Rational : Selfish and Greedy bandwidth, QoS, resource Malicious : Deprive rights@

Marti et al. introduce watchdog Related Work Marti et al. introduce watchdog Monitoring principle in “promiscuous” mode S. Banerjee propose an algorithm to detect and remove Black/Gray Hole attackers Splits transmission data into several blocks Introduction of prelude and postlude message Shila et al. introduce Channel Aware Detection (CAD) algorithm to detect Gray Hole attackers Consider normal losses medium access collisions bad channel quality

CAD (Channel Aware Detection) Algorithm Methodology: Channel estimation (Dynamic detection threshold) Hop-by-hop packet loss monitoring Data transmission: Split into several blocks (Ws) S|2|0 0|V0|2|0 0|V1|2|1 0|V2|2|0 1|V3|1 1 2 2 1 2 1 1 1 However… CAD algorithm will not be able to detect an attack in the event of colluding nodes WMN router nodes: Maintain packets count history with corresponding packet sequence number New packet types : PROBE Packet marking with opinion and behavior parameter PROBE-ACK PROBE replies When node forwards a packet: Buffer link layer acknowledgement (MAC-ACK) Overhears downstream traffic Since WMN-R is statically deployed, normal losses cn be estimated Channel Qlty : historical data medm accss colision) : channel busyness ratio Explain colluding situations here!

Routers have no energy constraints and have buffer of infinite size Assumptions Routers have no energy constraints and have buffer of infinite size Packet drop due to: Bad channel quality Medium access collision Presence of attackers Free from general wireless attacks: Sybil attacks Jamming (signal) attacks Colluding nodes are located next to each other Route caching to mitigate overhead Nodes have authentication methods implemented

CAD+ Algorithm Source compares the filtered irregularities with the list of sent packets Source refers the verified irregularities list to conduct final confirmation Packet Seq. No. Hash Value 1 2 … … 14 24 43 … … 46 15 33 16 … … 69 … … Hashed Received Packets Packet Seq. No. Hash Value … 14 … 46 15 50 … 34 47 35 … … … 33 … … … 45 null 46 … … 38 … … 60 17 61 35 Hashed Received Packets Introduction of three new packet types: Prelude Prelude-Notify Prelude-Ack MN monitors data packets received and forwarded by the node being monitored based on the monitoring parameters MN maintains irregularities history Retains existing features of CAD Source and Destination perform hashing on sent and received data packets respectively Destination compares the reported irregularities with the list of received packets and then replies to Source with a modified PROBE-ACK(including filtered irregularities) Destination keeps a list of monitoring nodes (MN) vs monitored nodes When MN overhears a PROBE packet sent to Destination, it forwards the list of irregularities (if applicable) towards Destination. Monitored Node Packet Seq. No. Hash Value Irregularity Type Timestamp v2 15 50 Alteration 14.9 34 47 Injection 22.8 55 35 Dropping 35.6 Irregularities which are monitored by MN2 Packet Seq. No. Hash Value … 14 … 46 15 33 … 34 24 35 … … … 33 … … ... 45 31 46 … … 38 … … 60 17 Hashed Sent Packets Count > COUNT_THRESH ? Interval > INTERVAL_THRESH? Intermediate Node Count Interval Irregularity Type v0 3 2 Alteration 6 1 Injection v2 Dropping v3 4 Verified Irregularities List Packet Seq. No. Hash Value 1 2 … … 14 24 43 … … 46 15 33 16 … … 69 … … Hashed Sent Packets Monitored Node Packet Seq. No. Hash Value Timestamp Irregularity Type v2 15 50 14.9 Alteration 34 47 22.8 45 31 35.0 Dropping 61 35 44.2 Injection Irregularities which are monitored by MN2 MNID Monitored Node MN0 v0 MN1 v1 MN2 v2 MN3 v3 Monitoring Node Vs Monitored Node Pair Source Monitored Node Next Hop Incoming Counter Outgoing Counter Next Monitoring (time) S v2 v3 5 10 34.30 Monitoring Parameters *MNx is not colluding but may not be reliable

Stealthy attacks by colluding nodes!!! Detection of Threats Threats detected (colluding nodes): Gray Hole attack Selectively drops packet Packet Injection Fabricates packet towards Destination node Packet Alteration Node alters a received packet (bit or data manipulation) Bad Mouthing Attack Framing an innocent node Stealthy attacks by colluding nodes!!!

Result and Analysis Packet delivery ratio comparison with colluding selective dropping rate. (no channel loss) Parameters Value Simulator Ns Nodes 60 Simulation Time (seconds) 500 Warm Up Period (seconds) 50 Attacker Nodes (random) 30% Source Pairs 2

Result and Analysis (cont.) Packet delivery ratio comparison with channel loss rate. Colluding selective dropping attacks present. Parameters Value Simulator Ns Nodes 60 Simulation Time (seconds) 500 Warm Up Period (seconds) 50 Channel Error Nodes (random) 30% Attacker Nodes (random) Source Pairs 2

Result and Analysis (cont.) Average detection rate of Gray Hole attackers with respect to simulation time. Parameters Value Simulator Ns Nodes 60 Simulation Time (seconds) 500 Warm Up Period (seconds) 50 Normal Channel Loss Rate 10% Channel Error Nodes (random) 30% Source Pairs 2

Conclusion and Future Work Developed a detection algorithm CAD+ which: Integrates CAD with neighborhood monitoring feature Enables detection and isolation of colluding Gray Hole attackers Detects other variation of colluding attacks: Packet alteration Packet injection Packet dropping Future Work: Investigate possibilities of mobile MN Incentives for MN to encourage cooperation Extend CAD+ to detect other network layer attacks

References Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, MobiCom ’00, pages 255–265, New York, NY, USA, 2000. Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks. In Proceedings of the World Congress on Engineering and Computer Science 2008, WCECS ’08, October 22 - 24, 2008, San Francisco, USA, Lecture Notes in Engineering and Computer Science, pages 337–342. Newswood Limited, 2008. D.M. Shila, Yu Cheng, and T. Anjali. Mitigating selective forwarding attacks with a channel-aware approach in WMNS. Wireless Communications, IEEE Transactions on, 9(5):1661 –1675, May 2010.