SECURITY PROBLEMS PERTAINING TO E-CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS. P. Balagangadhar Rao INDIA

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
Security in Mobile Ad Hoc Networks
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Introduction (Pendahuluan)  Information Security.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Improving TCP Performance over Wireless Networks
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Security of the Internet of Things: perspectives and challenges
Securing Interconnect Networks By: Bryan Roberts.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Overview of Wireless Networks:
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
New York Institute of Technology- Amman Campus
An Overview of Security Issues in Sensor Network
Presentation transcript:

SECURITY PROBLEMS PERTAINING TO E-CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS. P. Balagangadhar Rao INDIA

Security strength and network performance are the two sides of a coin. If, one of these is enhanced, the other will suffer. Achieving a good trade-off between these two extremes is a fundamental challenge in security design for mobile ad-hoc networks which are basically self-organized wireless interconnecting communication devices that would either extend (or) operate in concert with the wired networking infrastructure INTRODUCTION:

 Lot of research is going on in this field in respect of the unique characteristics of ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium, highly dynamic topology and stringent resource constraints. These limitations make a strong case for building multi-fence security solutions that meet both the goals of security as well as desirable network performance. Ad-hoc networks can be established on demand and disappear when there is no need, traditional security solutions applicable to wired-networks will not be sufficient because of the inherent limitations of such networks. In such an open and distributed communication environment, a central authorization facility that makes more stringent security will not be available. Self organization in ad-hoc networks aims to bring orderliness to the evolving distributed systems with the least possible human intervention. The three important characteristics of such a self organized systems are - I.P (Internet Protocol) auto-configuration, peer-to- peer networking, and shared open-content web pages. The fundamental security problem in mobile ad-hoc network is: the protection of its basic functionality to deliver the "data bits" from one node to the other. Unlike wired networks that have dedicated routers, each mobile node in an ad- hoc network will function as a router and forward packets to other peer nodes.

 Two basic approaches to protect mobile ad-hoc networks are: proactive and reactive. In this paper, an attempt is made to discuss certain fundamental security design challenges like denial-of-service attacks, providing link-layer security support, protecting routing and forward protocol, secured authentication and end-to-end communication through data encryption, preventing viruses, worms and application abuses, at different layers in a wireless ad-hoc network.

 Keywords: Mobile Ad-hoc Networks, Q.O.S. (quality of service), Security Solutions, Net- Work Layers, Link-layer, Viruses, Worms, Nodes

 Mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links. Each node operates as an end system and a router for all other nodes in the network. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized where all network activity including discovering the nodes themselves must execute the topology and delivering messages. This implies that the routing of message in the form of “bits” is also to be ensured by the mobile node

. The design of network protocols for these networks is a complex issue Preservation of security, latency, reliability, recovery from failure or significant factors that are to be considered while designing the algorithms for these networks.Security has become a primary concern in order to provide protected communication between nodes in a potentially hostile environment.Security services such as authentication, confidentiality, integrity, anonymity and availability are the ultimate goals of the security solutions for mobile ad-hoc networks. In order to achieve these goals, the security solutions should be provided in the entire protocol stack. Quality-of- service(Q.O.S) is measure of performance of a system or network.  Viruses, Worms are software programmes by hackers in order to destroy or steal or damage or intrude into the data of others, in an unauthorized way. Network-Layers are various functionalities in a computer network.

 SECURITY SOLUTIONS: (a) Preventing signal jamming and denial of service attacks at Physical layer level. (b) Protecting the wireless MAC (medium access control) protocol and providing link-layer security support at Link layer level. (c) Protecting the ad-hoc routing and forwarding protocols at Network layer level. (d) Authenticating and securing end-to-end communications through data encryption at Transport layer level. (e) Detecting and preventing viruses, worms, malicious codes and application abuses at Application layer level. By ensuring above mentioned security solutions at different layers of mobile ad-hoc networks, we can securely transport e-content information flow.

 CHALLENGES: As there will not be any dedicated routers as in the case of wired networks, each mobile node in an ad- hoc network should function as a router and forward packets of information to other peer nodes. We should make a note of the accessibility of wireless channel to both legitimate network users and malicious attackers, equally. There is no well defined place where traffic monitoring or access control mechanisms can be deployed.As a result, the boundary that separates the inside network from the outside world becomes thin.

 The existing protocols assume a trusted and co-operative environment. As a result, a malicious attacker can readily become a router and disrupt network operations by intentionally disobeying the protocol specifications. There are basically to approaches to protect such networks. The first one is “proactive” where as the other one is “reactive”.

 The proactive approach attempts to prevent an attacker from launching attacks in the first place, typically through various cryptographic techniques. In contrast, the reactive approach reacts, suitably, after detecting a security threat. A complete security solution should integrate both these approaches for preventing, detecting and reacting to security threats. Security is a chain, and it is only as secure as that of the weakest link.

 CONSTRAINTS: The stringent resource constraints in mobile ad-hoc networks constitute another serious challenge to security design. The wireless channel is bandwidth constrained and shared among multiple network entities. The computational capability of certain type of mobile nodes is limited. For example, such as PDAs (Personnel Digital Assistance), can hardly perform computation-intensive tasks like asymmetric cryptographic computation. As mobile devices are typically powered by batteries, they may have limited energy availability. The network topology is highly dynamic as nodes as nodes frequently join or leave the network, and roam in the network on their own will. The wireless channel is subject to interferences like co-channel interference or adjacent channel interference, thus prone for errors. The security scheme adopted by each device has to work with in its own resource limitations and is a challenging job because of the limited wireless transmission range, broad cast nature of wireless, node mobility, limited power resource.

 Mobile users may request at any time, any where, the security services as they move from one place to another. The above characteristics of mobile ad-hoc networks clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance, simultaneously. As there is no well defined place/infrastructure where we can deploy a single security solution, the deployment of security is not a trivial task. Moreover, portable devices, as well as the system security information they store, are vulnerable to compromise or physical capture, especially low-end devices with weak protection. Attackers may sneak into the network through these weak links and incur a serious damaging effect of security breaches in the system.

 CONCLUSION: Security never comes free. When more security features are introduced into the network, the result is the ever- increasing computation, communication, and management overhead. Consequently, network performance in terms of scalability, service availability, robustness, and so on of the security solutions, becomes an important concern in a resource-constrained ad-hoc network. While many contemporary proposals focus on the security stand point, the live the network performance aspect largely unaddressed.In fact, both dimensions of security strength and network performance are equally important, and achieving a good trade-off between the two extremes is the real challenge in security design for mobile ad-hoc networks

 Advantages of using an ad-hoc wireless networks include easy and speedy deployment It is robust, adaptive and self – organizing network. Designing a secure ad-hoc wireless communication is a challenging task due to (1) insecure wireless communication links (2)Absence of a fixed infrastructure (3)resource constraints like battery power, band width, memory, CPU (central processing unit of a computer) capacity. (4)Node mobility that triggers a dynamic network topology

 The main requirements of a robust security routing protocol are (1) Detection of malicious nodes. Avoiding routing of e-content packets from such nodes (2)Guarantee of correct route to destination computer(3)Confidentiality of network topology to prevent attacks by an attacker on the weak links(4)Stability against attacks so that the routing protocol must be able to resume the normal operation with in a reasonable time after an attack

 By addressing the above problems, we can ensure seamless e –content information flow in ad-hoc mobile networks