Security in Mobile Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Routing in mobile ad hoc networks Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Wireless Sensor Network Security Anuj Nagar CS 590.
Ad Hoc Wireless Routing COS 461: Computer Networks
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Communication in heterogeneous ad hoc grid Shan Natarajan.
UNIT-V Ad-hoc Networks
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
CAN WE ACCSESS INTERNET USING BLUETOOTH
Ad-hoc Networks.
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
Adhoc and Wireless Sensor Networks
Mobile ad hoc networking: imperatives and challenges
Study of performance of regular TCP in MANETs (using simulator).
Routing in Mobile Ad-hoc Networks
EEL 6935 Wireless Ad Hoc Networks
Protocols.
Other Routing Protocols
Computer Networks: Wireless Networks
Protocols.
Presentation transcript:

Security in Mobile Ad Hoc Networks Thao p Le tple@cs.wichita.edu Department of Computer Sciences, Wichita State University

Outline of Presentation Induction to MANET (Mobile Ad-Hoc Network) Ad Hoc Networks Architecture Attacks to Ad Hoc Networks Challenge of Ad Hoc Networks Security Solution Conclusion

Introduction Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. No centralized controller and infrastructure. Allows free mobility Node acts as host and router to assist in transmitting data to other nodes in its range. Can be quickly and inexpensively setup Applications: military, emergency and disaster situations.

MANETs: Advantages Can access information and services regardless of geographic position Can set up computer networks at any place and time

Ad Hoc Networks Architecture Rapid setup time Ad hoc mode only needs the setting up of radio network interface card (NICs) in the user devices. Better performance possible The question of performance with ad hoc mode is certainly doubtful. Limited network access. There is no distribution system with ad hoc wireless LANs, users don’t have effective access to the internet and other wired network services.

Ad Hoc Networks Architecture (cont.) Difficult network management Network management becomes a headache with ad hoc networks because of the fluidity of the network topology and lack of a centralized device.

Attacks to Ad Hoc Networks Two types of attacks target Ad Hoc network External attacks: MAC layer jamming Traffic analysis Internal attacks: Compromised host sending false routing information Fake authentication and authorization Traffic flooding

Challenge of Ad Hoc Networks Dynamic topology Movement, node failure, etc. Heterogeneous and decentralized control Limited resources Bandwidth, processing ability, energy Unfriendly environment Selfish nodes, malicious attackers

Challenge of Ad Hoc Networks (cont.) Authentication and accounting No fixed membership Security concern Open medium without any centralized control Real time services Dynamic topology and slow routing information distribution Limited bandwidth Congestion is typically the norm rather than the exception.

Problems with Security Measures Deficiencies of intrusion prevention Increases the overhead during normal operations of Ad Hoc networks Restriction on power consumption and computation capability prevent the usage of complex encryption algorithms Flat infrastructure increases the difficulty for the key management and distribution Cannot guard against internal attacks

Security Solution The Multi-fence Approach in Security Solution The proactive approach attempts to prevent security threats in the first place. The reactive approach seeks to detect threats a posteriori (derived by reasoning from observed facts) and react accordingly. The reactive approach is widely used to protect packet forwarding operations.

Security Solution (cont.) Ad hoc Secure Routing Source Node Routing( DSR) Distance Vector Routing (DSDV and AODV) Link State Routing: Secure Link State Routing (SLSP) Other Routing Protocols: ARAN

Conclusion The research on MANET security is still in its early stage. The existing proposals are typically attack-oriented in that they first identify several security threats and then enhance the existing protocol or propose a new protocol to thwart such threats. Because the solutions are designed explicitly with certain attack models in mind, they work well in the presence of designated attacks but may collapse under anticipated attacks. Therefore, a more ambitious goal for ad hoc network security is to develop a multi-fence security solution that is embedded into possibly every component in the network, resulting in in-depth protection that offers multiple lines of defense against many both known and unknown security threats.

Sources [1] Cavin et al., "On the accuracy of MANET simulators," Proc. ACM Workshop on Princ. Mobile Computing [2] K.-W. Chin, et al., "Implementation Experience with MANET Routing Protocols," ACM SIGCOMM Computer Communications Review, Nov. 2002, pp. 49-59. Available online. [3] Frodigh, et al, "Wireless Ad Hoc Networking: The Art of Networking without a Network," Ericsson Review, No. 4, 2000. online. [4] M. S. Corson et al., "Internet-Based Mobile Ad Hoc Networking," IEEE Internet Computing, July-August 1999 [5] C. Elliott and B. Heile, "Self-Organizing, Self-Healing Wireless Networks," Proc. 2000 IEEE [6] K. Kim, "A New Mobile Environment: Mobile Ad Hoc Networks (MANET)," IEEE [7] C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys.and Apps., 1999