A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Multicasting in Mobile Ad-Hoc Networks (MANET)
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Arsitektur Jaringan Terkini
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Intrusion Detection Techniques for Mobile Wireless Networks Authors: Yongguang Zhang, HRL Laboratories LLC, Malibu, California. Wenke Lee, College of Computing,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Chapter Overview Network Communications.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Privacy Issues in Vehicular Ad Hoc Networks.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks Yulia Ponomarchuk and Dae-Wha Seo Kyungpook National University, Republic.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Alert Aggregation in Mobile Ad-Hoc Networks By Bo Sun, Kui Wu, Udo W. Pooch.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
HYBRID ROUTING PROTOCOL FOR VANET
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Artificial Intelligence Center,
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
AD HOC NETWORKS BY: Bhagyashree Fulzele 03 Sneha Ghosh 23 Yamini Kothe 27 Namrata Nitnawre 12.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
VANET.
MOBILE AD-HOC NETWORKS
VANET.
CompTIA Security+ Study Guide (SY0-401)
Wireless Ad-Hoc Networking
Mobile ad hoc networking: imperatives and challenges
MESSAGE PROJECT CONTRIBUTION
Differences between WSN & MANET By: Dana Alotaibi.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Ad Hoc Networks Security
Intrusion Detection system
EEL 6935 Wireless Ad Hoc Networks
A Vehicular Ad Hoc Network Intrusion Detection System Based on BUSNets
Presentation transcript:

A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet

 Vehicular Ad hoc NETworks (VANETs), is a special case of Mobile Ad hoc NETworks (MANETs).  Cars as routers or nodes.  meters range.  As cars fall out of the signal range and drop out of the network

 Security challenges: -Mobility -Dynamic topology -Open wireless medium -No use of secure routing protocols because of insider attack  Properties of this method includes: IDS architecture is hierarchical and Detection algorithm can study normal behavior of network through a neural network so works intelligently

 First line of defense: intrusion prevention techniques, such as authentication and encryption  Second line of defense: Intrusion Detection,  Which determines whether unauthorized users are attempting to access, have already accessed, or have compromised the network.

 Two types IDS: monitoring based and clustering based  Monitoring: watchdog to detect misbehaving nodes and pathrater to help avoid these nodes  THE CONFIDANT: cooperation of nodes fairness in dynamic ad-hoc network  CORE:only positive reports passed unlike confidant  Clustering: head monitoring agent and detection agent  Choosing cluster heads based on connectivity, proximity, resistance to compromise accessibility, processing and storage power  UAV_MBN: UAV and MBN  ZBIDS: Zone based intrusion detection system

 A virtual mobile backbone infrastructure constructed using public buses.  Virtual infrastructure: Does not require the setup of any physical infrastructure.  can be deployed rapidly into any metropolitan environment with regular public bus service.  Mobile : the main nodes that form the BUSNet backbone are moving buses.  Backbone infrastructure : used to provide a reliable data bus for vehicles to interact with each other over a metropolitan coverage if needed.

 Three layers:  1. VANETs  2. Buses  3. Access points: road side communication infrastructure  ID technique in two categories :  1. Misuse detection: Can find known attacks effectively by signature comparing  2. Anomaly detection : Effective in finding out unknown attacks by looking for anomaly means any deviation from normal behavior. But gives more false alarm  Anomaly detection main parts: Feature selection, model of normal behavior and comparison (Explain all of them)  Feature selection : features from routing control messages and data packets. Bus collects the data and transfers to access points

Experiments During the simulation time, Attacks happened 4 times as follows: