Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
A Survey of Secure Wireless Ad Hoc Routing
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Ad Hoc Wireless Routing COS 461: Computer Networks
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
Security of Routing Protocols in Ad Hoc Wireless Networks presented by Reza Curtmola – Advanced Topics in Wireless Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Ad Hoc Network.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/ /06 $20.00 © 2006 IEEE.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Classification of various Attacks.
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
by Saltanat Mashirova & Afshin Mahini
Mobile ad hoc networking: imperatives and challenges
Subject Name: Computer Networks - II Subject Code: 10CS64
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija, Croatia 資工所碩一 陸家鈞 1/31

outline – Abstract – Introduction – Routing Protocols – Security Attacks On Routing Protocols – Classification Of DOS Attack Detection Scheme – Conclusion 2/31

Abstract The mobile ad-hoc networks (MANET) are multi-hop wireless network. It is dynamically formed amongst groups of mobile users having wireless network. 3/31

Abstract In MANET, nodes are limited resources like bandwidth, battery power and storage space. MANET is vulnerable of different types of DoS attack in which packets are not transfer to the next node. 4/31

Introduction The mobile ad-hoc networks (MANET) It has different characteristics such as lack of centralized administration, distributed cooperation, changing topology and requires no existing infrastructure. Without router or access point wireless clients connect directly together. 5/31

Routing Protocols General categories of routing protocols: Proactive Routing Protocol: Reactive Routing Protocol: Hybrid Routing Protocol: 6/31

1. Proactive (table-driven) Routing Protocol a)Mobile nodes periodically broadcast their routing information to the next node. b)Each node needs to maintain the records of the adjacent and reachable nodes c)Nodes have to evaluate their neighborhood as per the network topology change. 7/31

2. Reactive (On-demand) Routing Protocol If a node wants to send packet to another node then the protocol searches for the route in on demand and establish the connection in order to transmit and receive the packet. 8/31

3. Hybrid Routing Protocol: combines the advantages of proactive routing and reactive routing  gathering unfamiliar routing information  maintain the routing information when network topology changes. 9/31

Security Attacks On Routing Protocols General attack types are threats against network layers that function for the routing mechanism of the mobile ad hoc networks. There are two basic types of attacks in mobile ad hoc networks: Passive attacks Active attacks 10/31

Passive attacks: This type of attack does not disrupt the normal operation of the network. Detection of passive attacks is difficult to identify because the network operation is normal. Passive attacks are eavesdropping, traffic analysis and monitoring. Active attacks: an attacker actively participates and disrupts the normal operation of the network services. It degrades the network performance. Forms of active attacks are jamming, spoofing, modification, replaying and Denial of Service (DoS). 11/31

Attacks on MANET: 1.Denial of Service Attacks 2.Black hole attack 3.Cooperative Black hole attack 4.Gray hole attack 5.Flooding Attack 6.Worm hole Attack 7.Jamming attack 8.DDoS attack 9.Rushing attack 10.JellyFish attack 12/31

1. Denial of Service Attacks: The goal of Denial of Service (DoS) attacks is to prevent availability of networks services from their legitimate users DoS attack has different scenarios. 1.Attack memory, storage, CPU of the service provider  Sends an executable flooding packet 2.Attack energy resources  Sends a bogus packet to a node with the intension 3.Attack bandwidth  Located between multiple communicating nodes and waste the bandwidths and disrupt the connectivity 13/31

2.Black hole attack: The malicious node can attract all packets by pretending shortest route to the destination. It drops all traffic destined for that node when traffic is received by it. The effect of this attack completely degrades the performance of the network 14/31

3. Cooperative Black hole attack: It is a type of black hole attack when multiple black hole nodes are acting in a coordinated manner with each other: e.g.black hole node B1 cooperates with another black hole node B2 in the next hop. 15/31

4. Gray hole attack: Gray hole attack is a variation of black hole attack, where some nodes switch their states from black hole to honest intermittently and vice versa. Detection of gray hole attack is harder because nodes can drop packets partially not only due to its malicious nature but also due to congestion. DS Attacker 16/31

5. Flooding Attack: Attacker selects many IP addresses which are from outside of the networks. Attacker sends Route Request (RREQ) message with such IP address. 17/31

6. Worm hole Attack: Worm hole link attack records the wireless data, forward this data and replays the packet through worm hole link. It will not show the true picture of the network and there is effect on the decisions. 18/31

7. Jamming attack: The objective of jammer is to interfere with legitimate wireless communication and to degrade the overall network performance.  Constant jammer  Deceptive jammer  Radom jammer  Reactive jammer 19/31

8. DDoS attack: DDoS attack consists of two phases  Deployment phase: an attacker installs a tool in the vulnerable nodes.  Attack phase: an attacker coordinates a attack against a victim by flooding the unwanted data 20/31

9. Rushing attack: The attack consists, for the adversary, in quickly forwarding its Route Request messages when a route discovery is initiated. If the Route Requests that first reach the target’s neighbors are those of the attacker, then any discovered route includes the attacker. S D Attacker 21/31

10. JellyFish attack: JellyFish attack is following the routing and forwarding protocol specification. This is passive type of attack which is difficult to detect. It is responsive to the network conditions like delay and packet drop rate. DS Attacker 22/31

10. JellyFish attack: Behavior of JellyFish attacks are JellyFish Recorder Attack:  reorder packets JellyFish Periodic Dropping Attack:  drop all packets JellyFish Delay Variance Attack:  randomly delays packets 23/31

Classification Of DOS Attack Detection Scheme 24/31

Black hole attack Solution / Security Mechanism 25/31

Cooperative Black hole attack Solution / Security Mechanism 26/31

Gray hole attack Flooding attack Solution / Security Mechanism 27/31

Jamming attack Solution / Security Mechanism Worm hole attack Solution / Security Mechanism 28/31

Distributed Dos attack Solution / Security Mechanism JellyFish attack Solution / Security Mechanism Rushing attack Solution / Security Mechanism 29/31

Contribution&Improvement Contribution – Explain the routing protocols on MANET – Explain attacks on MANET – List the solutions and reference resources of attacks. Improvement – More graphical example – Detail about solution 30/31

Conclusion This type of attack may lead to degrade the performance of the network. There is need to develop efficient security mechanism and secure routing protocols for avoiding different types of attacks. And we must encrypt the data what we sent over the network to reduce the chance of packet eavesdropping 31/31