Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing with AODV Protocol for Mobile Ad Hoc Networks Anitha Prahladachar Tahira Farid Course: Instructor: Dr. Aggarwal.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
On Security Study of Two Distance Vector Routing Protocols for Ad Hoc Networks Weichao Wang, Yi Lu, Bharat Bhargava CERIAS and Department of Computer Sciences.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Centre for Wireless Communications University of Oulu, Finland
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Ad Hoc Network.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Packet Leashes: Defense Against Wormhole Attacks
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol for Wireless Ad Hoc Networks Presented By: Syeda Momina Tabish MIT - 7

Agenda Syeda Momina Tabish NIIT-NUST 2 Introduction Motivation Related Work Assumptions and background Proposed Approach Intrusion Detection Model (IDM) Intrusion Response Model (IRM) Experimental Setup Performance Metrics Simulation Results Conclusion & Future Work Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Introduction Syeda Momina Tabish NIIT-NUST 3 AODV -- On-demand route discovery Effective use of available bandwidth Highly scalable An ad hoc network is dynamically formed when two or more mobile hosts with wireless capability come into transmission range of each other Advantage of ad hoc networks: Can be set up ‘on-the-fly’ Requires no existing infrastructure Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Stable Enhancement in AODV 4 AODV Operation Source Destination RREQ RREP Data RERR Data

Introduction contd. Syeda Momina Tabish NIIT-NUST 5 Ad hoc network is useful in situations where geographical or terrestrial constraints demand totally distributed network system without any fixed base station. Could be in battlefields or in any other disaster situations. Wireless Ad hoc networks are highly susceptible to malicious attacks. They need harder security than conventional wired and static Internet. Intrusion prevention measures such as encryption and authentication, at times fail to identify attack, as these prevention measures cannot defend against compromised mobile nodes. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Motivation Syeda Momina Tabish NIIT-NUST 6 We need an Intrusion Detection system in the network to create another wall of defense Forms of Attack Passive eavesdropping Active interfering Leakage of secret information Data tampering Impersonation Denial of service Detection of compromised nodes is challenging due to Nodes are constantly mobile Protocols implemented are cooperative in nature Lack of fixed infrastructure and central authority No distinction between normalcy and abnormality Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Motivation contd. Syeda Momina Tabish NIIT-NUST 7 The Attacks to routing protocol can be further classified into two types. They are: External Attack: An attack caused by nodes that do not belong to the network. Internal Attack: An attack from nodes that belong to the network due to them getting compromised or captured.

Related Work Syeda Momina Tabish NIIT-NUST 8 Yonguang Zhang and Wenke Lee: presented new intrusion detection and response mechanism. The basic assumption is that the user and program activities are observable and system should be cooperative and distributed. Sergio Marti: introduced techniques that improve throughput in an ad hoc network by identifying misbehaving nodes that agree to forward the packet but never do so. Venkatraman: proposed intrusion detection agent to prevent some internal attacks on the network. Intrusion detection agent runs on all the nodes and is based on Yongguang Zhang and Wenke Lee's model. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Assumptions and Background Syeda Momina Tabish NIIT-NUST 9 Assumption When a node is within radio range of another node they are termed as neighbors. Every link between two nodes is bi-directional. Nodes are in promiscuous state. Compromised nodes do not work in teams. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Proposed Approach Identified possible internal attacks for AODV protocol and present details of Intrusion Detection Model [IDIM] and Intrusion Response Model [IRM]. The compromised nodes could cause sufficient damage by merely not cooperating. The types of malicious activities depend on the functioning of the protocol. These attacks are deterministic and can be detected by IDM and malicious nodes are isolated using IRS. Syeda Momina Tabish NIIT-NUST 10

Proposed Approach contd. Syeda Momina Tabish NIIT-NUST 11 Following are the internal attacks handled by IDM. Distributed false route request: Under this attack, a malicious node generates false route requests from different radio ranges, thereby resulting in continued wastage of channel bandwidth. They cannot be categorized as malicious nodes. Denial of service: Denial of service attack results when the network bandwidth is hijacked by the malicious node by repeatedly generating route requests. A malicious node continues to transmit control packets, as a result of which other nodes in the network can not use the resources. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Proposed Approach contd. Syeda Momina Tabish NIIT-NUST 12 Destination is Compromised: A compromised destination node does not acknowledge the route requests destined for it. This result; in re-broadcasts and increase in end-to-end routing delay. Therefore, the network throughput is severely decreased. Impersonation: It is undesirable to have a malicious node impersonating an another node while sending that control packets to create the anomaly updation in the routing table. Routing Information Disclosure: Malicious node leaks the confidential. information to unauthorized users in the network. This kind of attack is difficult to identify. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Detection Model Syeda Momina Tabish NIIT-NUST 13 Based on the model presented by Yonguang Zhang and Wenke Lee. Each node employs the detection model that utilizes the neighborhood information to detect misbehaviors of its neighbors. The IDM is present on all the nodes. Constantly monitors the behavior of its neighbors and analyzes it to detect if the neighbor has been compromised. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Handling of Internal Attacks Syeda Momina Tabish NIIT-NUST 14 Security Enhancements in AODV protocol for Wireless Ad Hoc Networks Data Collection Secure Communication Global Response Intrusion Response Model Intrusion Detection Model Mal count > Threshold Yes No

Intrusion Detection Model contd. Syeda Momina Tabish NIIT-NUST 15 The model identifies each of the aforementioned attacks as follows: Distributed false route request: A route request is generated whenever a node has to send data to the particular destination. Malicious node might generate frequent, unnecessary route requests. Malicious node generates a false route message from different radio range, it will be difficult to identify the malicious node. When the node in the network receive a number of route requests that is greater than a threshold count by a specific source for a destination in a particular time interval tinterval, the node is declared as malicious and the information is propagated in the network. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Detection Model contd. Syeda Momina Tabish NIIT-NUST 16 Denial of service: Malicious node launches the denial of service attack by transmitting false control packets and using the entire network resources. This results in deprivation of network resources for other nodes. Denial of service can be launched by transmitting false routing packets or data packets. It can be identified if a node is generating the control packets that is more than the threshold count in a particular time interval tfrequency. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Detection Model contd. Syeda Momina Tabish NIIT-NUST 17 Destination is Compromised: A destination might not be able to reply, if it is (i) not in the network (ii) overloaded (iii) it did not receive route request; or if it is (iv) malicious This attack is identified when the source does not receive the reply from the destination in a particular time interval twait. The neighbors generate probe/ hello packets to determine connectivity. If the node is in the network and does not respond to route requests destined for it, it is identified as malicious. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Detection Model contd. Syeda Momina Tabish NIIT-NUST 18 Impersonation: It can be avoided if sender encrypts the packet with its private key and other nodes decrypts with the public key of the sender. If the receiver is not able to decrypt the packet, the sender might be not the real source and hence packet will be dropped. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Response Model Syeda Momina Tabish NIIT-NUST 19 A node identifies that an another has been compromised when its malcount increases beyond the threshold value for that allegedly compromised node. In such cases, it propagates this information to the entire network by transmitting Mal packet. If other nodes also suspect that the node that has been detected as compromised, it reports its suspicion to the network and transmits ReMal packet. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Intrusion Response Model Syeda Momina Tabish NIIT-NUST 20 If two or more nodes report about a particular node, Purge packet is transmitted to isolate the malicious node from the network. All nodes that have a route through the compromised node look for newer routes. All packets received from the compromised node are dropped. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Experimental Setup Syeda Momina Tabish NIIT-NUST 21 Used the version of Berkeley’s Network Simulator (ns) for our implementation. Based on a 1500 by 300 meter flat space scattered with 50 wireless nodes. In which 10 are data sources. The nodes move randomly with random speed (the speed is uniformly distributed between 0-20 sec). The MAC layer used for the simulations is IEEE The transport protocol used for simulations is User Datagram Protocol (UDP). Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Experimental Setup contd. Syeda Momina Tabish NIIT-NUST 22 Performance Metrics: 1. Packet Delivery Fraction: This is the ratio of CBR packets delivered to that generated and is measured as throughput. 2. Routing Overhead: The number of routing packets transmitted for every data packet sent. Each hop of the routing packet is treated as a packet. They have used the normalized routing load for comparison, which is the ratio of routing packets to the data packets. 3. Average end-to-end delay: This is the average of the delays incurred by all the packets that are successfully transmitted. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Experimental Setup contd. Syeda Momina Tabish NIIT-NUST Accuracy of Predictions: Only the malicious nodes generated in the network were reported as intruders and others nodes were not claimed as malicious. In the simulation misbehaving node is one that generate false route requests or drop the route request packets that are destined for it. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Simulation Results Syeda Momina Tabish NIIT-NUST 24 Routing Load vs. Pause Time Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Simulation Results Syeda Momina Tabish NIIT-NUST 25 End to End Delay vs. Pause Time Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Simulation Results Syeda Momina Tabish NIIT-NUST 26 Packet Delivery vs. Pause time Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Conclusion & Future Work Syeda Momina Tabish NIIT-NUST 27 Proposed a security scheme to pro-actively prevent internal attacks. The results of implementation show that the overheads is marginal and has negligible effects on network performance while making the protocol robust. Working on defining more internal attacks and plan to identify solutions for them. Moreover, they plan to introduce security scheme for external attacks and incorporate those with Intrusion Detection and Response model as well. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks

Thanks Syeda Momina Tabish NIIT-NUST 28 Questions ???