1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
Routing Security in Ad Hoc Networks
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Secure Routing in Ad Hoc Wireless Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
A Standard Measure of Mobility for Evaluating Mobile Ad Hoc Network Performance By Joseph Charboneau Karthik Raman.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
TAODV: A Trusted AODV Routing Protocol for MANET
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
What is Mobile Network? Why is it called Ad Hoc?
Chapter 5 The Network Layer.
by Saltanat Mashirova & Afshin Mahini
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

1 MANETS – An overview

2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing malicious faults Multipath & Multichannel routing

3 Model and Definitions Definition 1 : Model of an ad hoc network Let V be a finite state system with state space S. The elements of V are mobile nodes: -- each node is a probabilistic finite state machine A mobile ad hoc network is a random process: G = { ( G 1, S 1 ), {( G 2, S 2 ), … … {( G T, S T ) } where the G 1 = ( V, N t ) are graphs with node set V and S t  S, subject to the following constraints:

4 Model and Definitions Markov constraint – given ( G t, S t ) the next state ( G t+1, S t+1 ) is independent of all previous states ( G 1, S ! ) … … ( G t-1, S t-1 ) Mobility constraint –The transitional probabilities Pr [( G t+1, S t+1 ) | ( G t, S t )] are independent of time t. The distribution  generated by these is called the mobility distribution.

5 Model and Definitions Medium constraint The communication medium is –is promiscuous –has limited bandwidth –is bidirectional

6 Model and Definitions Definition 2 : Simulatability G is simulatable if there is an efficient algorithm  that simulates G, that is generates samples ( G* 1, S* 1 ), …, {( G* t, S* t ) such that Pr[( G* 1, S* 1 ), …, {( G* t, S* t )] = Pr[( G 1, S 1 ), …, {( G t, S t )]

7 Model and Definitions Definition 3 : Route A route R ( s,d ) with source s and destination d is a list of nodes of G that start at s and end at d through which packets are forwarded. The nodes need not know the list, not even their successor on the list!

8 Model and Definitions Definition 3 : Adversary Let  be a family of subsets V’ of V. We call  an Adversary Structure. The adversary Adv = Adv  selects a subset V’ of V and can corrupt all its nodes during the lifetime of the system. These nodes are called c orrupted or faulty. Adv is called a  - adversary..

9 Model and Definitions Definition 3 : Adversary -- continued The adversary Adv may be passive or active. A passive adversary eavesdrops on the network communication. An active adversary uses the corrupted nodes to prevent the normal functioning of the network.

10 Model and Definitions Definition 3 : Adversary -- continued The Byzantine threats model For this model  = { V’  V | | V’ | ≤ k } for some threshold k. In this case the adversary can corrupt up to k nodes.

11 Mobility models The Random Walk model Nodes move in turns Each node at the beginning of its turn selects at random: –a value v for its velocity –a value  for its direction, and –a value t for the duration of the turn. –Alternatively instead of t a value d for the distance to be traveled is selected. Problem: Brownian motion

12 Mobility models The Random Waypoint model An extension of the Random Walk model. Each node at the beginning of its turn first moves to a new position selected at random in the unit square. Problem: This addresses the Brownian motion, but now Nodes congregate to the centre of the unit square. Solution: Wrap around the parallel edges of the square to get a torus: now nodes can cross over boundaries.

13 Mobility models The Random Waypoint model Problem: There is an speed decay for the nodes. Solution: Use special distribution of nodes at start time, minimum speed and warm up period. Problem: Abrupt changes in node direction at the beginning of turns.

14 Mobility models The Random Direction model An extension of the Random Waypoint model. Each node at the beginning of its turn first –chooses -- see the Notes for a more control between the deterministic and random movement of nodes

15 Mobility models Group models Group behavior is simulated by using a common reference point. As the reference point moves, the nodes move along with it.

16 Mobility models Nomadic group model Nodes move randomly around the common reference point.

17 Mobility models Target group model The common reference point is used as a target.

18 Mobility models Hybrid models The movement of the common reference point is simulated by using one of the first three non group models. All these models are Markovian

19 Mobility models Ad Hoc Network simulators Discussion on (and toy implementation?) of: –ns2 –OPNETR modeler –GLoMoSim

20 Routing algorithms Definition Routing = ( Pathfinder, Communication ) Pathfinder is a distributive algorithm that takes as input G, s,d and generates a path  that links s,d. Path i nformation  xi is then distributed to all nodes on the path –With source-centric* routing, the source gets the complete path (from neighbor lists). –With network-centric* routing the path information is distributed among the nodes of  (as distance vectors) See later for definitions

21 Routing algorithms Communication is a distributed algorithm on . On input data to s : – s broadcasts pkt [ s ] = ( header [ s ], data ), –If x i  s,d on  receives pkt [ x j ], it verifies it, and if correct computes and broadcasts: pkt [ x j ] = ( header [ x j ], data ). –If d receives pkt [ x k ], it verifies it, and if correct outputs data. header [ x ] contains information about the path  known to x. From this information, and from the local path information distributed by Pathfinder, any neighbor y of x can determine whether it is on , and if so, it computes header [y] and broadcasts pkt [ y ]. Eventually, if s,d are linked in G, data will be delivered to the destination d.

22 Routing algorithms Definition Routing is reliable if: –when Adv is passive, on input G, s,d : any data input to s will be delivered to d. Routing will tolerate , if it is reliable in the presence of any active  - adversary.

23 Routing algorithms Definition Routing updates Route settling

24 Routing algorithms Definition There are two types of routing: network-centric and source-centric. With network-centric routing the routing effort is distributed within the network –discussion on tables and vectors. With source-centric routing most of the effort is done by the source, with the other nodes restricted to relaying packets and usually making only minor checks.

25 Routing algorithms Discussion on basic source-centric routing algorithms: –DSDV, AODV, WRP, etc (Tina Suen) Discussion on basic network-centric routing algorithms –DSR etc

26 Security issues for routing algorithms From a security point of view network-centric routing requires substantial cooperation between nodes and strong trust relations. These algorithms are therefore more vulnerable to malicious faults Source centric routing lessens the dependency on node cooperation and therefore is less vulnerable to malicious attacks.

27 Security associations and PKIs Crypto mechanisms are used to support the basic security requirements for ad hoc networks. Whether secret key or public key systems are used security associations must be established between the nodes of the network. One way is to use an external PKI Other ways to be discussed in class.