C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Secure Wireless Ad Hoc Routing
1 Routing in Mobile Ad Hoc Networks CS 598HL, 2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Challenges of Routing in Ad-hoc Networks Chandra D Yarlagadda.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Team C.O.B.R.A. Derrick Chiu Matthew Denker Kyle Morse Mark Srebro.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
ITIS 6010/8010 Wireless Network Security
Overview: Chapter 3 Networking sensors
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu

Dynamic Source Routing

Problem Develop a simple and efficient multi-hop wireless ad hoc networking protocol Account for range, mobility, and the lack of a server Minimize overhead Localize error correction

Solution 1 Develop a pair of algorithms that work together to form the basis of DSR –Route discovery Each node holds a list of known routes to various destinations. If the definition is not in the route, begin a recursive search for a new route. –Route maintenance When a route no longer becomes viable, request new routes and update known route tables. ABCDE “A” “A,B”“A,B,C” “A,B,C,D” “ID=2” Route Discovery example: Node A is the initiator, and node E is the target. Taken from “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks ABCD Route Maintenance example: Node C is unable to forward a packet from A to E over its link to next hop D. Taken from “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks E

Solution 2 Overhead minimization –Listen for new transactions before replying with a route (random timings) –Introduce a “hop limit” for routing route requests –Allow automatic route shortening – if a node overhears a packet going around it. It can drop itself from future routes when nodes request a route. Data integrity –Allow for package salvaging by letting nodes with a route error search for a new route in their cache and forward the packet again. This has a single salvage limit so loops are not formed. Miscellany –Algorithm allows for multiple interfaces, as long range hops appear the same as short range hops to the protocol. –Connections exist for nodes to be edge nodes, thus giving access to the internet at large.

On Demand Multipath Routing for Mobile Ad Hoc Networks The Problem: -Routes unreliable in Ad Hoc networks -Network floods for routes -Performance hit Bandwidth is precious in Ad Hoc

On Demand Multipath Routing for Mobile Ad Hoc Networks Solution: - Modify DSR(Dynamic Source Routing) - Nodes initially do flood requests as before but more than a single path is returned - Nodes decide a primary shortest path and store a given number of alternates - Intelligent clean-up on route failure

On Demand Multipath Routing for Mobile Ad Hoc Networks Results: - Increase in time between route discoveries across the board. Although decreases with path length. - Keeping 2 alternates found to be optimum setting.

Energy Conserving Routing in Wireless Ad-Hoc Networks

The Problem: - Ad-Hoc revolves around mobility this introduces a new limited resource battery life. - Current ECR focuses on the battery life of a single node.

Energy Conserving Routing in Wireless Ad-Hoc Networks Solution: - Focus on the life of the ad-hoc network as a system - Flow Augmentation and Redirection - Creates a tradeoff between searching for the best EC route and the route that spares nodes with not little energy left.

Energy Conserving Routing in Wireless Ad-Hoc Networks Results: - Life of important nodes were lengthened allowing the system life to be increased on an average of 60% - Focused on overall network connectivity

Secure Routing for MANETs Panagiotis Papadimitratos, Zygmunt J. Haas No server: –Authenticate? Route? Malicious Activity: –False topology broadcasts –Nodes drop/misroute packets –Nodes corrupt packets

Secure Routing Protocol (SRP) Shared, symmetric key – Elliptic Curve Diffie-Hellman algorithm Route request packet: –Query sequence #, random query ID –These + key  MD5/SHA-1  send packet! Intermediate nodes pass along Destination verifies MAC, sends reply over reverse path

Why it’s good Node priority system – eliminate malicious activity Computation isolated to end nodes Guaranteed correct network topology Quick route breakage discovery

Secure Efficient Ad hoc Distance vector routing protocol (SEAD) Stands for Secure Efficient Ad hoc Distance vector routing protocol. Based on Destination-Sequenced Distance-Vector routing protocol with Sequence numbers (DSDV- SQ) Prevents nodes from sending out malicious routing tables. Prevents Denial-of-Service (DoS) attacks through the low use of computing resources.

SEAD Uses hash chains to authenticate routing table entries. First hash value in hash chain is computed using a randomly generated value. Sequence number determines the block in the hash chain to use. Metric determines the hash in that block to use.

SEAD Node sends the first element of its hash chain in its own entry in the routing table. For all other entries, nodes compute and send the hashes of received hash values based on sequence number and metric. Receiver authenticates hash value in new entry using hash value in old entry by recreating the new hash value using the old.

C.O.B.R.A Team Project Create a twenty first century version of a classic Bonzai! Type game. –Players are positioned as islands with a fortress and cannon. –Fire cannons at other fortresses and try to get hits. Use SEAD to securely manage the routing of shots (messages) between clients.

Chosen Papers “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks” –Yih-Chun Hu David B. Johnson Adrian Perrig “On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks” –Weichao Wang, Yi Lu, Bharat K. Bhargava “Highly Dynamic Destination Sequenced Distance Vector Routing DSDV for Mobile Computers” –Charles E Perkins, Pravin Bhagwat “Efficient Constructions for One-way Hash Chains” –Yih-Chun Hu Markus Jakobsson Adrian Perrig

Our Website