MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
By Md Emran Mazumder Ottawa University Student no:
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Centre for Wireless Communications University of Oulu, Finland
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Wireless Sensor Network Security Anuj Nagar CS 590.
SECURITY PROBLEMS PERTAINING TO E-CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS. P. Balagangadhar Rao INDIA
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Wireless Ad-Hoc Networks
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security in Wireless Sensor Networks by Toni Farley.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Trusted Router and Collaborative Attacks Bharat Bhargava.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Presented by Edith Ngai MPhil Term 3 Presentation
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
A Vehicular Ad Hoc Network Intrusion Detection System Based on BUSNets
Presentation transcript:

MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI

MANET A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange information. Each node is willing to forward data to other nodes. Does not rely on fixed infrastructure.

FEATURES Autonomous terminal: A node may function as both host and a router. Distributed Operations: since there is no fixed network the control and management operations are distributed among the terminals. Multi-hop routing: packets should be delivered via one or more nodes..

Contd.. Dynamic network topology: As the network change rapidly, the mobile nodes dynamically establish routing among themselves i.e. they form their own network Fluctuating link capacity: One end-to-end path can be shared by several sessions. Light-weight terminal: The MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage.

PROBLEMS IN MANET: Routing Security and Reliability Quality of Service Internetworking Power Consumption

SECURITY A major issue in Mobile ad-hoc network is “SECURITY”. Two approaches in protecting mobile ad- hoc networks  Reactive approach: Seeks to detect security threats and react accordingly.  Proactive approach: Attempts to prevent an attacker from launching attacks through various cryptographic techniques

ISSUES Secure Multicasting Secure routing Privacy-aware Routing Key management Intrusion detection System

Contd.. Secure multicasting: Is a communication method where a single data packet can be transmitted from a sender and replicated to a set of receivers. Secure routing: Most MANET routing protocols are vulnerable to attacks that can freeze the whole network. Need some solutions that work even if some nodes compromised.

Contd.. Privacy-aware Routing: Building routing protocols that prevent intermediate nodes from performing traffic analysis. Schemes for minimizing size of crypto- tags( digital signatures) are needed. Key Management  security goals in MANET are mainly achieved through trusted Certificate Authority (CA)  compromised CA can easily damage the entire network.

Contd.. Intrusion detection and response schemes: Anomaly detection is difficult in MANETs (ex: types of attacks and their source). collaborative IDS schemes are needed.

GOALS Authentication Confidentiality Integrity Non-repudiation Availability Detection and Isolation

Authentication: A node must know the identity of the peer node it is communicating with. Without authentication, an attacker could gain sensitive information and interfere with other nodes Confidentiality: Ensures certain information is never disclosed to unauthorized entities. Integrity: Message being transmitted is never corrupted.

Contd.. Non-Repudiation: The sender cannot later deny sending the information and the receiver cannot deny the reception. Availability: Nodes should be available for communication at all times. A node need continue to provide services despite attacks. E.g.: Key management service. Detection and Isolation: Require the protocol can identify misbehaving nodes and render them unable to interfere with routing.

IDS-MANET IDS: Intrusion detection System which is used to detect and report the malicious activity in ad hoc networks. Ex: Detecting critical nodes using IDS Intrusion Detection System (IDS) can collect and analyze audit data for the entire network. Critical node is a node whose failure or malicious behavior disconnects or significantly degrades the performance of the network.

Contd.. Packets may be dropped due to network congestion or because a malicious node is not faithfully executing a routing algorithm. Researchers have proposed a number of collaborative IDS systems. Some of the schemes are neighbor- monitoring, trust-building, and cluster- based voting schemes which are used to detect and report the malicious activity in ad hoc networks.

CONCLUSION The research on MANET security is still in its early stage. MANET is easily vulnerable to security attacks than wired networks.

REFERENCES nds02.pdf nds02.pdf e=2292&context=postprints e=2292&context=postprints itical-Nodes-MANET.pdf itical-Nodes-MANET.pdf

QUESTIONS? 1. What is fabrication attack and what is the mechanism to detect whether fabrication attack occurred or not during transmission between the nodes? An attack that generates false routing messages is called fabrication attack. Watch-dogs are used to detect the fabrication attack.

2. Two types of attacks, active attack and passive attacks are discussed in the paper for ad hoc routing protocol and also mentioned about recent research on wormhole attack. What kind of attack is this? The mobile devices use a radio channel to send information, the malicious nodes can eavesdrop the packets, tunnel them to another location in the network, and retransmit them. This generates a false scenario that the original sender is in the neighborhood of the remote location. The tunneling procedure forms a worm hole.

3. As you mentioned in the report, the routers are free to move randomly and organize them arbitrarily thus, the routers topology may change rapidly and unpredictably in MANET. Then, how to identify whether the node is trusted one or not? Since there is no fixed infrastructure we cannot define whether the node is trusted or untrusted before the formation of network. For this reason we need security to prevent attacks from untrusted nodes.

THANK U