ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

A Survey of Secure Wireless Ad Hoc Routing
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Challenges of Routing in Ad-hoc Networks Chandra D Yarlagadda.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Sensor Network Routing Romit Roy Choudhury and Pradeep Kyasanur (Some slides are based on Dr. Nitin Vaidya’s tutorial)
Highly Dynamic Destination- Sequenced Distance-Vector Routing Protocol (DSDV) for Mobile Computers Charles E. Perkins Pravin Bhagwat Mobile Computing,
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Ad Hoc Network.
Distance-Vector maintain distance and next hop information Also known as Distributed Bellman- Ford(DBF) algorithm used in RIP Cause Loop and Count to infinity.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Self-stabilizing energy-efficient multicast for MANETs.
UNIT-V Ad-hoc Networks
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Routing design goals, challenges,
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Proactive vs. Reactive Routing
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang

2 Introduction Security issues –Routing protocols in mobile ad hoc networks Proactive routing Reactive routing Hybrid routing Location based routing –Issues Fake routing information Fake route updates and errors Location privacy

3 Introduction Securing sensor networks –Secure localization Wormhole attack, Sybil attack –Key establishment and management –Data aggregation/authorization –Clock synchronization

4 Introduction Key distribution and management –Key pre-distribution method –Authenticating public keys in sensor networks –Stateless and self-healing key distribution

5 Localization and its security –Range free localization –Neighbor relation verification –Location privacy –Location assisted security protocols

6 Intrusion detection in wireless networks –Packet sink –Attack pattern/User behavior collection –Evidence collection and distribution

7 Deny-of-service attacks –Signal level, MAC level and application level –Difference in available resource –Security operations: decryption and authentication

8 RFID and its security –Authenticating reader –Varying identity –Low probability of detection –Hiding in the crowd

9 Secure group communication –Multicast group formation –Secure inter-group communication –Key distribution and update

10 Energy aware security protocols –Routing –Multicast

11

12 Mobile ad hoc networks –First described by IEEE standard –A set of nodes communicate in a self- organized manner (without infrastructure) –Easy to deploy and form –Adapt to topology and membership changes –Peer-to-peer, multi-hop wireless environments –Every node serves as router: store and forward

13 Characteristics of ad hoc networks –Dynamic topology and membership –Limited physical security –Energy constrained –Storage (not any more), processing, communication constrained Applications –Military operations –Collaborative data exchange –Emergency responses (fire safety/rescue/natural disaster)

14 Local network topology discovery –Neighbor discovery –Medium access control protocol Routing in ad hoc networks –Properly respond to route failure/changes –Route packets with minimum costs –Satisfy delay/throughput requirements

15 Requirements to routing protocols –Distributed, localized algorithm –Broken routes can be detected, fixed, or replaced in a timely manner –Reduce broadcast and route maintenance overhead Classification of routing protocols –Proactive –Reactive –Hybrid –Location based routing

16 DSDV (Destination sequenced distance vector) –A proactive protocol –Each node maintains its own routing table –Very similar to RIP for Internet –Using sequence numbers to prevent routing loops

17 Every routing table entry includes –Destination address –Metric (delay, hop, etc) –Next hop –Sequence number of the destination

18 How routes to node i are established? –It broadcasts a route update packet with path length one –The neighbors increment the path length by one and rebroadcast –The update packets are kept locally for a while to avoid repeated broadcasting –Merging the broadcast packets to reduce control overhead Routing table changes –Periodical full dump of the routing table –Incremental changes caused by route broken or other significant changes

19 Using sequence number to prevent loop –A node increments its sequence number to label the most recent routes. Only even sequence numbers are used. –A fresh route with the largest sequence is always preferred –With the same sequence, the shortest path is preferred

20 Respond to route broken –A broken link can be detected by the node –The metric of a broken link is set to infinity, sequence number incremented –All routes using this link as the next hop will be set to infinity, sequence number incremented –This information will propagate since it has a larger sequence number –It is difficult to enable local repair