Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure Routing in Ad Hoc Wireless Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Authors: Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra,
Mobile IP 순천향대학교 전산학과 문종식
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
DETECTION OF WORMHOLE ATTACK IN MANET
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Outline Introduction Routing in Mobile Ad Hoc Networks
Lei Chen and Wendi B. Heinzelman , University of Rochester
Network Components.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Other Routing Protocols
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering

 Objective  Abstract  Introduction  Problem definition  Literature survey  Proposed System  Advantges and Limitations  Future Work  Conclusion  References

 The main purpose of this paper is to establish secure routing in mobile ad hoc networks.  An effective de-centralised algorithm against malicious attacks  FACES algorithm is based on trust establishment of friends for secure routing in ad-hoc networks.  Friend rating scheme is a continuous process. Authentication of nodes by posing challenges.

 Uses Challenges to establish security is an algorithm  The scheme proposed has been drawn from a network of friends in real life scenarios.  The algorithm is divided into four stages, viz. Challenge Your Neighbour, Rate Friends, Share Friends and Route through Friends.  One of the major advantages of this scheme is that the nodes do not need to promiscuously listen to the traffic passing through their neighbours.  The information about the malicious nodes is gathered effectively by using Challenges, which reduces the overhead on networks.

 Mobile Ad Hoc Network (MANET)  Challenges in MANETs  Attacks in MANETs  Goals of any Secure Routing

 Collection of mobile nodes forming a temporary network  No centralized administration or standard support services  Each Host is an independent router  Self-configuring infrastructure less network of mobile devices connected by wireless links  No need for existing infrastructure

 Easier to Tap  Limited Capacity  Dynamic Nature  Susceptible to Attacks

 Passive attacks: No change in data content. Intruder is not detected  Active attacks: Intruder can affect the communication by modifying the data, misleading the nodes in the network.

 MANETs are vulnerable to attacks because of their structure less property.  Due to this dynamic topology they are prone to active and passive attacks.  Prevention against these attacks, enabling secure routing is a primary need in mobile Ad Hoc networks.

 DMR Security enhancement through multiple path transmission in ad hoc networks by T.Haniotakis, S. Tragoudas, and C. Kalapodas  TMR Security in mobile ad-hoc networks using soft encryption and trust based multipath routing by P. Narula, S.K.Dhurandher, S. Misra, and I. Woungang  MTMR Multi-path and message trust-based secure routing in ad hoc networks by S. K. Dhurandher and V. Mehra

 FACES algorithm divided into 4 stages  Challenge Your Neighbour  Rate Friends periodic  Share Friends  Route Through Friends - on Deman d  Establishment of friend networks in MANET

 Each node incorporates its neighbours in UL initially  Node A picks B &performs share friends stage  B sends either its FL / UL  A picks 1 node which it can reach on its own,C  2 ways to reach C  A initiates challenge & encrypts with pub key of C (pub key of A)  B forwards it to C, C decrypts, respond to challenge &encrypt with pubic key of A  C Computes c^d mod n and sends the result to the two paths.  A receives result from 2 routes, compares & if same, add B to FL(A)

 Three classes of ratings for each node in FL  Data Rating (DR)  Friend Rating (FR)  Net Rating (NR)

 Periodic process  Use control packet FREQ  After friend sharing, challenges are initiated for those nodes which were not in FL.  If a node is already in the friend list the node updates its FL.  After friend sharing, a node start data session/sit idle

 When a node wants to transmit data, it initiates Route request message within the network also sends the no: of data packets  Source node Evaluates route reply messages from networks with public key of destination  Routes data through best possible route & waits for an acknowledgement of the no: of data packets received by destination  If no: of packets sent= received, then data rating of nodes included in transmission will be increased

 If packets are dropped/no acknowledgement from destination source initiates sequential challenge  Result of sequential challenge ->misbehaving nodes(removed from FL & added to QL )  If all nodes completes sequential challenge successfully ->data loss due to unintended behaviour, initiates packets from destination  On receiving packets, source evaluate that packets loss occurred at which all nodes, decreases rating of those nodes

 Military communication devices or police communication devices.  Bank communications across secure networks.

 Challenge based authentication helps to isolate malicious node with ease  Continuous rating of friends helps to secure networks which are dynamic  Packet delivery ratio is less for less number of nodes.  Multiple path discovery for friend rating is time consuming.

 Comparison of FACES protocol with Aradine, ARAN can be investigated to improve the performance.  An algorithm to increase packet sending ratio as a feedback mechanism will help increase PDR.

 Challenge based authentication helps to isolate malicious nodes with ease.  Continuous rating of friends helps secure ad hoc mobile networks which are dynamic.

 [ 1] Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, and Pravina Dhurandher,”FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security inMANETs systems”, ieee systems journal, vol. 5, no. 2, june  [2] D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems. Pacific Grove,CA: Brooks/Cole, Thomson,  [3] T.Haniotakis, S. Tragoudas, and C. Kalapodas,“Security enhancement through multiple pathtransmission in ad hoc networks,”in 2004 IEEE Int. Conf. Communications, Jun. 2004, vol. 7, pp  [4] P. Narula, S. K. Dhurandher, S. Misra, and I. Woungang, “Security in mobile ad-hoc networksusing soft encryption and trust based multipath routing,”Sci. Direct Comput. Commun., vol. 31,pp. 760– 769,  [5] S. K. Dhurandher and V. Mehra,“Multi-path and message trust-based secure routing in ad hocnetworks,” in Proc. Int. Conf. Advances in Computing, Control and TelecommunicationTechnologies (ACT 2009), Trivandrum, India, Dec. 28 – 29, 2009, pp. 189 – 194.

Questions?