TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.

Slides:



Advertisements
Similar presentations
Extensible Manet Auto-configuration Protocol (EMAP) draft-ros-autoconf-emap-02.txt Pedro M. Ruiz Francisco J. Ros March, 2006 Dallas, USA 65 th IETF.
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
Centre for Wireless Communications University of Oulu, Finland
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Outline Introduction Existing solutions for ad hoc
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Routing Information Protocol
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
A Stable Routing Protocol to Support ITS Services in VANET Networks Tarik Taleb, Ehssan Sakhaee, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Giannis F. Marias, Vassileios Tsetsos,
A comparison of Ad-Hoc Routing Protocols
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
Ad hoc Routing Protocols
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004

CSE Dept. of CUHKPage 2 Outline Introduction Background: AODV and Subjective logic Framework of TAODV Trust model for TAODV Routing operations in TAODV Analysis Conclusion and future work

March 2004CSE Dept. of CUHKPage 3 Introduction to MANETs Mobile Ad Hoc Networks (MANETs) –No fixed infrastructure –Self-organized routing –Prone to be unstable and insecure Previous Secure Solutions for MANETs –Require each node to testify itself by showing its digital signature at all times –Need a super-trusted third-party to provide authentication

March 2004CSE Dept. of CUHKPage 4 Introduction to TAODV Make use of trust relationships among nodes Need not request and verify signature at each time of communication, just like human society TAODV: a secure routing protocol based on trust model for MANET

March 2004CSE Dept. of CUHKPage 5 Background: Subjective Logic Subjective logic –Represent trust relationship formally –Define how to combine different trust information together –Map all kinds of evidences to trust representation space We derive our trust model for TAODV from subjective logic

March 2004CSE Dept. of CUHKPage 6 Background: AODV AODV –Ad Hoc On-Demand Distance Vector Routing Protocol for MANETs –Two main routing messages: RREQ: Routing REQuest RREP: Routing REPly We extend AODV by adding trust information into its routing messages

March 2004CSE Dept. of CUHKPage 7 Framework of TAODV

March 2004CSE Dept. of CUHKPage 8 Trust Model for TAODV: Representation of trust Use Opinion to represent trust: –A three-dimensional metric – -- Probability of node A believing in node B -- Probability of node A disbelieving in node B -- Probability of node A ’ s uncertainty about B –

March 2004CSE Dept. of CUHKPage 9 Discounting Combination: –Combine trusts along one path –Combine –Equation: Let Trust Model for TAODV: Combination of trust

March 2004CSE Dept. of CUHKPage 10 Trust Model for TAODV: Combination of trust Consensus Combination: –Combine trusts from several paths –Combine – Equation: Let

March 2004CSE Dept. of CUHKPage 11 Mapping from evidence space to opinion space: –p : positive evidences –n : negative evidences Trust Model for TAODV: Mapping from evidences to opinion space

March 2004CSE Dept. of CUHKPage 12 Routing Operations in TAODV Trust Recommendation Trust Judgement Routing Table Extension Trust Update Routing Messages Extensions Trusted Routing Discovery

March 2004CSE Dept. of CUHKPage 13 Trust Recommendation Exchange trust information Three types of message: –TREQ: Trust REQuest –TREP: Trust REPly –TWARN: Trust WARNing Broadcast TWARN when a node ’ s disbelief value is zero Message structure:

March 2004CSE Dept. of CUHKPage 14 Trust Judgement Predefined trust judging rules bduActions >0.5Request and verify digital signature >0.5Distrust a node for an expire time >0.5Trust a node and continue routing ≤0.5 Request and verify digital signature b – belief d – disbelief u – uncertainty 0.5 – threshold

March 2004CSE Dept. of CUHKPage 15 Routing Table Extension Add three fields into original routing table –Positive events –Negative events –Opinion New routing table format DestIPDestSeq...HopCount...LifetimePositive Events Negative Events Opinion

March 2004CSE Dept. of CUHKPage 16 Trust Update Update of Evidences –Successful Communication  Positive events: p++ –Failed Communication  Negative events: n++ Update of opinion - two ways: –Mapping from evidence space –Combination from different recommendations

March 2004CSE Dept. of CUHKPage 17 Trusted Routing Discovery: Scenario I-Beginning of TAODV Initial opinions are all (0,0,1) Node A originates a RREQ to discover a route to C Node B will authenticate A and C because of high uncertainty (u=1) of them from its point of view Finally, if succeeds, the opinions are all changed to (0.33,0,0.67)

March 2004CSE Dept. of CUHKPage 18 Trusted Routing Discovery: Scenario II-A Stable TAODV MANET Trust relationships have been established among almost all the nodes The values of uncertainty are getting smaller and smaller The general procedures are as follows. (e.g. N2)

March 2004CSE Dept. of CUHKPage 19 Trusted Routing Discovery: Scenario II-A Stable TAODV MANET

March 2004CSE Dept. of CUHKPage 20 Analysis Performance –No need to perform cryptographic computations in every packet  reducing computation overhead –Trust recommendation messages and routing table extension are simple  no introducing much routing overhead

March 2004CSE Dept. of CUHKPage 21 Analysis Security –A malicious node will be finally denied from the network and it ’ s opinion from other nodes will be (0,1,0). –When a bad node turns to be a good one, it ’ s opinion in others will be changed from (0,1,0) to (0,0,1) after expiry.

March 2004CSE Dept. of CUHKPage 22 Analysis Flexibility –Each node is given more flexibility to define its own opinion threshold. –The default threshold is 0.5. –For high level security requirement, the threshold can be increased. –For some non-critical applications, the threshold can be decreased.

March 2004CSE Dept. of CUHKPage 23 Conclusion First approach to apply the idea of trust model into the security solutions of MANETs. The trust among nodes can be quantified and combined. TAODV is a secure routing protocol with –Less computation overheads –Not introducing much routing overheads –Flexible security levels

March 2004CSE Dept. of CUHKPage 24 Future Work Optimize trusted routing discovery algorithm Establish fast response mechanism when being attacked Perform detailed simulation evaluation