Presentation is loading. Please wait.

Presentation is loading. Please wait.

Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE.

Similar presentations


Presentation on theme: "Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE."— Presentation transcript:

1 Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE

2 Outline  Basic knowledge  Mobile Ad Hoc Networks (MANET)  Ad hoc On Demand Distance Vector (AODV) protocol  MANET  Rushing attack  Blackhole attack  Neighbor attack  Jellyfish attack  Summary  Reference 22011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE

3 Mobile Ad Hoc Networks (MANET)  Def. A self-configuring infrastructureless network of mobile devices connected by wireless links.  Characteristic  Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently.  Each device must forward traffic unrelated to its own use, and therefore be a router. 32011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE

4 Ad hoc On Demand Distance Vector (AODV) protocol  On Demand routing.  Distance Vector.  Hello messages.  Route discovery.  Sequence number. 2011/12/740-7695-2552-0/06 $20.00 © 2006 IEEE

5 Ad hoc On Demand Distance Vector (AODV) protocol (cont.)  Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE5

6 Ad hoc On Demand Distance Vector (AODV) protocol (cont.)  Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE6

7 Ad hoc On Demand Distance Vector (AODV) protocol (cont.)  Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE7

8 Ad hoc On Demand Distance Vector (AODV) protocol (cont.)  Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE8

9 Ad hoc On Demand Distance Vector (AODV) protocol (cont.)  Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE9

10 Rushing attack  By skipping some of the routing processes, can quickly forward these packets and make other router discard the normally-process packets.  Cause the attacker is able to gain access to the forwarding group. 2011/12/7100-7695-2552-0/06 $20.00 © 2006 IEEE

11 Rushing attack (cont.)  Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE11

12 Blackhole attack  Using rushing attack at first.  Drops all of data packets it receives.  Cause very low packet delivery ratio. 2011/12/7120-7695-2552-0/06 $20.00 © 2006 IEEE

13 Blackhole attack(cont.)  Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE13

14 Jellyfish attack  Using rushing attack at first.  Delays data packets unnecessarily for some amount of time before forwarding them.  Results in significantly high end-to-end delay and delay jitter. 2011/12/7140-7695-2552-0/06 $20.00 © 2006 IEEE

15 Jellyfish attack(cont.)  Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE15

16 Jellyfish attack(cont.)  Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE16

17 Neighbor attack  Using rushing attack at first.  Attacker simply forwards the packet without recording its ID in the packet.  Resulting in a disrupted route. 2011/12/7170-7695-2552-0/06 $20.00 © 2006 IEEE

18 Summary  Protocols that use the duplicate suppression mechanism such as ODMRP, ADMR are very vulnerable to rushing attacks.  Jellyfish attacks do not affect the packet delivery ratio or the throughput of a multicast group, but they severely increase the packet end-to-end delay and delay jitter.  The operations of blackhole attacks and neighbor attacks are different, they both cause the same degree of damage to the performance of a multicast group in terms of packer loss rate. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE18

19 Reference  [1]http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber =1628395 [1]http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber =1628395  [2]http://en.wikipedia.org/wiki/Mobile_ad_hoc_network [2]http://en.wikipedia.org/wiki/Mobile_ad_hoc_network  [3]http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_p rotocols [3]http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_p rotocols  [4]http://users.crhc.illinois.edu/yihchun/pubs/wise03.pdf [4]http://users.crhc.illinois.edu/yihchun/pubs/wise03.pdf  [5]http://www.cs.jhu.edu/~cs647/aodv.pdf [5]http://www.cs.jhu.edu/~cs647/aodv.pdf 192011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE


Download ppt "Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE."

Similar presentations


Ads by Google