Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Business Data Communications Packetizing and Framing.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Mobility assisted routing CS 218 F2008 Ad hoc mobility generally harmful Can mobility help in routing? –Mobility induced distributed route/directory tree.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Towards efficient traffic-analysis resistant anonymity networks Stevens Le Blond David Choffnes Wenxuan Zhou Peter Druschel Hitesh Ballani Paul Francis.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad-Hoc Networks (MANET)
Progress Report Wireless Routing By Edward Mulimba.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Ad Hoc Networks Routing
Secure Routing in Ad Hoc Wireless Networks
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Network Topologies.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Dynamic Network Emulation Security Analysis for Application Layer Protocols.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Visualisation and Analysis of Real Time Application Behaviour in a Simulated Network (!Temporal Databases  K. Maciunas) Evan Bourlotos Supervisors Cheryl.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Ad Hoc Routing: The AODV and DSR Protocols Jonathan Sevy Geometric and Intelligent Computing Lab Drexel University
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks Hochoong Cho, Sang-Ho Lee Mobile Telecommunication Research Division, ETRI, KOREA Younghwan.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
Anonymous Communications in Mobile Ad Hoc Networks Yanchao Zhang, Wei Liu, Wenjing Lou Presenter: Bo Wu.
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-Hoc Network Utilizing an Anonymity System By Ian Cavitt.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Communication in heterogeneous ad hoc grid Shan Natarajan.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier March 20, 2003.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
QoS in Mobile IP by Preethi Tiwari Chaitanya Deshpande.
2/10/2016 Mobile Ad hoc Networks COE 549 Routing Protocols III Tarek Sheltami KFUPM CCSE COE
Grid: Scalable Ad-Hoc Wireless Networking Douglas De Couto
Verein Konstantin Melnik Svetlana
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Matt Hornbrook James Beams
MOBILE AD-HOC NETWORKS
Fisheye Routing protocol
ROUTING IN MOBILE AD-HOC NETWORKS
Cost to defeat the N-1 Attack
RFC 1058 & RFC 2453 Routing Information Protocol
Mesh QoS: Multiple Simultaneous Routes
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Mobi-Herald: Alert Propagation for MANETs*
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol

Purpose Current anonymity systems tend to sacrifice at least on of the following, low latency, high bandwidth, or resistance to traffic analysis MANETs particularly weak to TA Depending on the network TA can be particularly damaging as well APNs can lend strength to where an anonymity system is weak

Two General Effect for All MANETs Increase Cost of Traffic Analysis Make Network Topology Closer to Overlay ObfuscateTraffic Fairly general will give more details soon

Network Topology and Traffic Analysis Theoretical TopologyActual Topology

Topologies with Addition of APN Theoretical TopologyActual Topology

Obfuscate Traffic Can mean several things

Obfuscate Traffic Because the APN doesn’t need to send real data there are a few options These vary heavily based on routing protocol used Can send fake response back to nodes whose message is routed through it Can send a second fake packet routed differently than original to obfuscate destination Reasons for using the dummy node for these are its local resources can be dedicated to generation of dummy messages Also depending on the routing protocol used a dummy node can thwart certain local attackers

References A Survey on Anonymous Routing Protocols in MANET Shino et al Towards Efficient Traffic-analysis Resistant Anonymity Networks Le Blond et al