TAODV: A Trusted AODV Routing Protocol for MANET

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
AODV-OLSR Scalable Ad hoc Routing
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
On-demand Multipath Distance Vector Routing in Ad Hoc Networks(AOMDV)
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
by Saltanat Mashirova & Afshin Mahini
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A Survey of Secure Wireless Ad Hoc Routing
Routing.
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi Term Presentation 2004-4-27

Outline Introduction Framework of TAODV Trust model for TAODV Routing operations in TAODV Analyses and simulations Conclusion

Now Comes to: Introduction Framework of TAODV Trust model for TAODV Routing Operations in TAODV Analyses and Simulations Conclusion

Introduction Mobile Ad Hoc Network (MANET) No fixed infrastructure Multi-hop routing by cooperation of nodes in a self-organized way Nodes has high mobility Underlying medium is wireless Frequent link layer errors Vulnerable to kinds of attacks

Routing Protocols for MANET DSR: The Dynamic Source Routing Protocol DSDV: Destination-Sequenced Distance Vector Protocol AODV: Ad Hoc On-Demand Distance Vector Protocol Two main routing messages: RREQ: Routing REQuest RREP: Routing REPly Currently the most popular routing protocols for ad hoc networks include: AODV which stands for ad hoc on demand distance vector protocol DSR: DSDV

 High Security Requirements Applications of MANET  High Security Requirements Personal area networking Meeting rooms Disaster relief Battlefield operations

Previous Security Solutions for MANET Secure routing protocol may perform digital signature authentication at each routing message huge overhead Key management mechanism usually need a super-trusted third-party to issue certificates destroy the self-organization nature of MANET

Previous Security Solutions for MANET (con’d) Intrusion detection mechanism Listen, collect and analyze all traffics on each node Huge process overhead Our aim is to design a secure routing protocol, called TAODV (Trusted AODV Routing Protocol), without introducing huge overhead or destroying the self-organization nature of MANET

Now Comes to: Introduction Framework of TAODV Trust model for TAODV Routing Operations in TAODV Analyses and Simulations Conclusion

Main Ideas of TAODV A secure routing protocol for MANET Use trust relationships among nodes for routing Employ a trust model derived from subjective logic Trust calculation is not very time-consuming Need not sign and verify digital signature at each routing message Cooperate with a self-organized key management mechanism such as some threshold solutions We take AODV for example to illustrate our idea

Four Modules of TAODV Basic routing protocol (AODV in this work) Trust model Define the algorithms or rules to combine, judge, and update trust information based on subjective logic Trusted routing protocol Self-organized key management mechanism generate a {secret, public} key pair for each node and distribute public keys in a secure self-organized way A pre-requisition, will not discuss it in this presentation

Module of Trusted Routing Protocol Include operations of trust recommendation trust combination trust judgement trust update signature authentication trust authentication

Framework of TAODV

Now Comes to: Introduction Framework of TAODV Trust model for TAODV Routing Operations in TAODV Analyses and Simulations Conclusion

Representation of Trust Use Opinion to represent trust: A two-dimensional, but three-element metric -- Probability of node A believing in node B -- Probability of node A disbelieving in node B -- Probability of node A’s uncertainty about B We define that

Combination of Trust Discounting Combination: Combine trusts along one path Combine Equation: Let

Combination of Trust (con’d) Consensus Combination: Combine trusts from several paths Combine Equation: Let

Mapping Between Evidence and Opinion space Mapping from evidence space to opinion space: α is a parameter imply the change rate of b, d, and u we can adjust it to meet our application p : positive evidences n : negative evidences

Mapping Between Evidence and Opinion space (con’d) Mapping from opinion space to evidence space: We can update trust information from evidence space mapping to opinion space, or vice versa

Now Comes to Introduction Framework of TAODV Trust model for TAODV Routing Operations in TAODV Analyses and Simulations Conclusion

Trust Recommendation Exchange trust information Three types of message: TREQ: Trust REQuest TREP: Trust REPly TWARN: Trust WARNing Broadcast TWARN when a node’s disbelief value is zero

Trust Recommendation (con’d) Message Structure TREQ  TREP 

Trust Judgement Predefined trust judging rules b d u Actions > h Request and verify digital signature Distrust a node till next certificate renewal Trust a node and continue routing ≤ h b – belief d – disbelief u – uncertainty h – threshold which can be adjusted to meet different security level (default h=0.5)

Trust Update Update of Evidences Update of opinion Successful Communication Positive events: p++ Failed Communication Negative events: n++ Mapping from opinion space Update of opinion Combination from different recommendations Mapping from evidence space

Routing Table Extension Add three fields into original routing table Positive events Negative events Opinion New routing table format DestIP DestSeq ... HopCount Lifetime Positive Events Negative Opinion

Routing Message Extension Add such fields into original routing messages Trust information, or Digital signature information RREQ  TRREQ RREP  TRREP Message structure: original routing information … trust information or signature information

General Process of TAODV On initialization, each node’s opinion towards others is (0,0,1), which means total uncertainty of other nodes’ trustworthiness. Nodes perform signature authentication during the initialization period. After some trust exchanges and data communications, thus with the increase of either positive or negative events, the uncertainty will be decreased and the trust relationship among nodes are forming. When the trust relationship in the network has been established, the authentication of nodes will mainly use trust authentication.

Trusted Routing Discovery P D S C N S originated a routing request to D C is the current node P is C’s precursor, N is the next hop Suppose threshold=0.5

Routing Process at Current Node Trust exchange step1: Authenticate P step2: Authenticate S step3: step4: Authenticate D

Routing Process at Current Node U>0.5 or b,d,u<=0.5 Wait for RREQ Trust exchange for opinions to S, D, P Combine  opinion(C,P) Combine  opinion(C,S) Judge opinion(C,S) Have route? Signature authentication Judge opinion(C,P) Y N b>0.5 d>0.5 TRREP enqueue Correct? Deny Re-TRREQ Combine  opinion(C, D) Judge opinion(C, D)

Now Comes to: Introduction Framework of TAODV Trust model for TAODV Routing operations in TAODV Analyses and simulations Conclusion

Performance Analysis Communication overheads can be sharply reduced by avoiding signature generation and verification at each routing message. Bandwidth overheads can be largely reduced because of replacing 1024/2048 bit signatures to simple trust values.

Security Analysis If no misbehavior, trust value will keep increasing. If an external malicious node, it will at once be denied due to not providing valid signature. We only consider to prevent external attacks. Internal attacks can be eased through certificates renewal.

Simulation Environment Simulator: ns-2 Number of Nodes 30 Source-Destination Pairs 12 Simulation Fields 670*670m Simulation Time 360s Node Velocity Range 0-10m/s Source Packet Rate 4pkts/s Source Data Packet Size 512 bytes Physical Link Bandwidth 2Mbps Nominal Radio Range 250m

Selected Simulation Results Throughput of receiving bits VS Average End2End delay (pause time: 10s)

Conclusion TAODV is a trusted routing protocol which cooperates with a self-organized key management mechanism. It introduces less computation overheads than previous secure routing protocol solutions and also guarantee a certain security level. It performs trusted routing in a self-organized way.

Q&A Thank You!