Download presentation
Presentation is loading. Please wait.
1
Secure Routing in Ad Hoc Wireless Networks 11.03.2005
2
Requirements of a Secure Routing Protocol Detection of malicious nodes Detection of malicious nodes Guarantee of correct route discovery Guarantee of correct route discovery Confidentiality of network topology Confidentiality of network topology Stability against attacks Stability against attacks
3
AODV Ad-hoc On-demand Distance Vector Protocol Ad-hoc On-demand Distance Vector Protocol Source node broadcasts RouteRequest Source node broadcasts RouteRequest Intermediate nodes forward it Intermediate nodes forward it If node has a route to destination, it initiates RouteReply If node has a route to destination, it initiates RouteReply
4
SAR Security-aware Ad hoc Routing protocol Security-aware Ad hoc Routing protocol Enables different levels of security Enables different levels of security Level of trust as a metric Level of trust as a metric Each packet is associated with a security level Each packet is associated with a security level Intermediate nodes are associated with security levels Intermediate nodes are associated with security levels Different keys for different levels of security Different keys for different levels of security
5
SAR
6
SEAD Secure Efficient Ad hoc Distance vector routing protocol Secure Efficient Ad hoc Distance vector routing protocol Distance Vector Routing Distance Vector Routing –The metric used for routing is hop-count –Periodic and/or triggered updates –DSDV (Highly Dynamic Destination-Sequenced Distance-Vector Routing) uses sequence numbers –DSDV-SQ (DSDV for sequence numbers) Assumes upper bound for the metric used Assumes upper bound for the metric used
7
SEAD One-Way Hash Function One-Way Hash Function –Used for authentication –Generates a one-way hash chain Avoids looping Avoids looping Easily implement with slight modifications Easily implement with slight modifications
8
ARAN Authenticated Routing for Ad hoc Networks routing protocol Authenticated Routing for Ad hoc Networks routing protocol Based on cryptographic certificates Based on cryptographic certificates Defeats all identified attacks on the network layer Defeats all identified attacks on the network layer Issue of certificates: Issue of certificates: –There exists a trusted server –Doesn’t specify any specific key distribution algorithm
9
ARAN End-to-end route authentication: End-to-end route authentication: –Ensures that the correct destination is reached by the packets –RouteRequest and RouteReply packets encrypted at each node
10
Security-Aware AODV Protocol RouteRequest packets only sent when data packets arrive at node for transmission RouteRequest packets only sent when data packets arrive at node for transmission Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack) Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack) AODV = Ad-hoc On-demand Distance Vector Protocol
11
Security-Aware AODV Protocol Solutions: Solutions: –Restrict the intermediate nodes from originating RouteReply –FurtherRouteRequest AODV = Ad-hoc On-demand Distance Vector Protocol
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.