Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
INTRUSION DETECTION SYSTEMS IN MOBILE AD-HOC NETWORS Anas A. Al-Roubaiey Implementation and Performance Evaluation of Adaptive ACKnowledgment (AACK)
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Ad Hoc Wireless Routing COS 461: Computer Networks
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Mobile Routing protocols MANET
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Wireless Access Research Congestion Avoidance in Source Routed Ad-Hoc Networks Bryan Hogan, Michael Barry, Ronan Skehill, Sean McGrath
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Ad Hoc Routing: The AODV and DSR Protocols Jonathan Sevy Geometric and Intelligent Computing Lab Drexel University
Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An OLSR implementation, experience, and future design issues.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
TCP and MAC interplay in Wireless Ad Hoc Networks
A comparison of Ad-Hoc Routing Protocols
ODMRP Enhancement.
Mobile and Wireless Networking
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A High-Throughput Path Metric for Multi-Hop Wireless Routing
ITIS 6010/8010 Wireless Network Security
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Presentation transcript:

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin Lai, Mary Baker Stanford U.

Appeared at MOBICOM in 2000 Authors: Kevin Lai, Mary Baker – faculty, now at HP Labs Authors: Sergio Marti, TJ Giuli are still PhD students.

The Problem A node may agree to forward data but fail to do so when required Reasons: Overloaded machine Broken hardware / buggy code malicious

The Problem How to Identify Misbehaving nodes? What to do about them? Only forward through trusted nodes Kick miscreants out of the routing network Add intelligence to end stations to learn & route around them

Assumptions Bidirectional communication (though not necessarily symmetric) Promiscuous mode is available (no per- hop encryption)

DSR route discovery (a)Sender broadcasts route request (b)Intermediate nodes stamp & forward request (c)Destination sends a (source routed) reply containing path

DSR route maintenance End station selects shortest known path to destination If a requested link is broken, the neighbor link sends an alert to the source, which must restart route discovery (unless it has another route in cache)

Proposed Solution 2 new programs: Watchdog – listens for connection status Pathrater – avoids broken paths

Watchdog Each node runs in promiscuous mode. Uses path knowledge from source routing Save relayed packets in cache Listens to its neighbors forwarding its packets if packets not relayed by next hop, increment error counter if error count exceeds threshold, mark node as misbehaving

Watchdog Weaknesses Ambiguous collisions – collision at “A” keeps “A” from knowing whether “B” relayed the frame Rx collisions -- “A” can't detect collisions at “C” limited power -- “A” can't tell if signal too weak to reach “C” False misbehavior -- “B” could spoof or incorrectly send error notifications Collusion -- “B” and “C” could appear to function, but not forward packets from each other Partial dropping -- “B” drops packets at a rate lower than “A”'s thresholds

PathRater Each node in network is rated based on feedback from Watchdog Path metric = MEAN{ all nodes in path } ┌ Node metric = │ -100 (misbehaving nodes), │ 0 <= N <= 0.80 └ N = x (200mS segments w/ successful transmits) x (unreachable events) It takes >33 minutes to recover from a false error!

Simulation ns MAC model 50 wireless nodes Communications pattern found in previous paper (Random waypoint model) Source nodes moving at <20 m/s (FAST! -- 72kph/45Mph) small number of CBR traffic streams 200 second simulation length (no error recovery) varying percentage of misbehaving nodes

Results (throughput)

Result analysis DSR mods do not help throughput w/o misbehaving nodes? (95% thruput) All mods enabled has best throughput Pathrater alone does not help throughput

Routing Overhead Similar overhead except SRR Mobility only matters to SRR

False Positives No throughput impact detected Not clear how many false positives detected, relation w/ # of miscreants Some false positives are due to genuine error cases (high drop/collision rates)

Open Questions Is there benefit to any DSR mods w/o misbehaving nodes? (95% thruput) How is throughput measured --- does it only include data? What is network loading? Probably too low to be significant. Simulations 200 seconds, false error recovery 2000 seconds Effect of # of nodes? Active talkers?

Future Work Optimise watchdog thresholds for errors Include explicitly trusted nodes Integrate pathrater with TCP feedback TCP/FTP load testing Does pathrater/watchdog impact latency

Conclusions Passive detection of misbehaving nodes increases throughput in the presense of miscreants with manageable overhead Battery usage still a concern w/ overhead