Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Ad Hoc Wireless Routing COS 461: Computer Networks
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
04/10/2015 Ad Hoc Networking Ad Hoc Networking 1GSC-9, Seoul SOURCE:ETSI (Project MESA) TITLE:Ad hoc networking AGENDA ITEM: GRSC#2 Item 5.3 CONTACT:Adrian.
Interference and Service Discovery in Multi-Hop Ad Hoc Networks Alex Varshavsky University of Toronto.
Wireless Ad-Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Jason Ernst, University of Guelph 1.  Introduction ◦ Background Information ◦ Motivation for Research / Current Problems  Proposed Solution ◦ Algorithm.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Self-stabilizing energy-efficient multicast for MANETs.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks Tzay-Farn Shih Department of Computer Science and Information.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Ad-hoc Networks.
MOBILE AD-HOC NETWORKS
Mobility in based Multihop networks
A comparison of Ad-Hoc Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
Chapter 5 The Network Layer.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
by Saltanat Mashirova & Afshin Mahini
Wireless Ad-Hoc Networking
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
A survey on Bio inspired Routing in MANETs
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon

Mobile ad hoc Network  Collection of wireless mobile nodes  Communicate without network infrastructure  or centralized administration  Offers unrestricted mobility and connectivity  Each node acts as host and router  Out-of-range nodes are routed through intermediate nodes

Wireless MANET  Security with Network  open medium  dynamic topology  distributed cooperation  constrained capability  Routing Security  “black hole” attack

“black hole” Attack Black hole attacks work by tricking other nodes in the network about their routing information.

Proposed Solutions  She, Yi, Wang, Yang – July 2013  Each node only monitors the next hop  Packet forwarded—good node!  Too many packets “dropped”— bad node!

Proposed Solutions  High collision rates can make it hard to “overhear” packet forwarding – false positives!  Algorithm adapts a “threshold” to fix this  Problem: threshold lowers under high network load → lower detection  rate → susceptible to DDoS?  How to maintain detection rate, even at high network load?

Our Solution  Another (unimplemented) solution: “Optimal Path”  Discard the first and select the second shortest path  Difficult for a black hole to determine how to make itself “second-best”  By itself, would slow down network  Perhaps as a rollover?

ns-2 Network Simulator  Ns is a discrete event simulator targeted at networking research.  Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

References    y%20in%20wireless%20adhoc.pdf  %20Mobile%20Ad%20hoc%20Networks%20(SPRINGER05).pd f  