1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure Routing in Ad Hoc Wireless Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
EAACK—A Secure Intrusion-Detection System for MANETs
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Presented by Edith Ngai MPhil Term 3 Presentation
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Amar B. Patel , Shushan Zhao
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

2 / 18 Fariba alamshahi Outline Introduction Ad hoc networks Secure Routing Protocols Attacks SecAodv Intrusion Detection Conclusion

3 / 18 Fariba alamshahi Introduction Recent years have witnessed a proliferation of mobile devices. Corporations and government agencies alike are increasingly using embedded and wireless technologies, and working towards mobilizing their workforce Ad hoc networks, as the name suggests, have no supporting infrastructure

4 / 18 Fariba alamshahi Ad hoc networks Ad hoc networks are comprised of a dynamic set of cooperating peers, which share their wireless capabilities with other similar devices to enable communication with devices not in direct radio-range of each other, effectively relaying messages on behalf of others

5 / 18 Fariba alamshahi Secure Routing Protocols a majority of the proposed routing protocols assume non-hostile environments

6 / 18 Fariba alamshahi SecAodv SecAodv is a highly adaptive distributed algorithm designed for MANETs that does not require: prior trust relations between pairs of nodes time synchronization between nodesprior shared keys or any other form of secure association

7 / 18 Fariba alamshahi The SecAodv implements two concepts which are: Secure binding between IPv6 addresses and the RSA key generated by the nodes themselves Signed evidence produced by the originator of the message and signature verification by the destination

8 / 18 Fariba alamshahi Working of SecAODV S D D S

9 / 18 Fariba alamshahi Although encryption and signed headers are intrusion prevention measures, vulnerabilities remain nonetheless. An IDS further strengthens the defense of a MANET Troubleshooting

10 / 18 Fariba alamshahi Security objectives in Ad Hoc Networks Availability Confidentiality Integrity Authentication non-repudiation

11 / 18 Fariba alamshahi Classification of attacks Types of attacks External attacks Internal attacks Types of attacks Active attacks Passive attacks Types of attacks Routing change Attack sources

12 / 18 Fariba alamshahi Attack using the Modification Hostile node can falsify header content packages related to the routing of network traffic to each other that wants to divert Change the number of hop Change the value of the hop counter

13 / 18 Fariba alamshahi Intrusion Detection In an ad hoc network, malicious nodes may enter and leave the immediate radio transmission range at random intervals A MANET is most likely not under a single administrative domain, making it difficult to perform any kind of centralized management or control

14 / 18 Fariba alamshahi IDS (Intrusion Detection System) categorize host-based IDSs based on anomaly detection and misuse detection Each node monitors particular traffic activity within its radio-range

15 / 18 Fariba alamshahi IDS An audit log of all locally detected intrusions is maintained as evidence of misbehavior A node can thus monitor most of the packet traffic of its neighbors in promiscuous mode, while they are in radio-range

16 / 18 Fariba alamshahi Scalability issues It may be possible in certain situations to have a list of suspects that can be watched instead of all the nodes in the neighborhood. Another possibility is to monitor a random choice of neighbor nodes

17 / 18 Fariba alamshahi Conclusion In this paper we briefly described the inherent vulnerabilities of mobile devices in MANETs and several attacks possible on such devices The IDS is routing protocol independent, though in this case we have used SecAODV for routing

18 / 18 Fariba alamshahi Refrence 1) T. Aura. Internet Draft: Cryptographically Generated Addresses (CGA). send-cga-05.txt, February ) R. Hinden and S. Deering. RFC 3513: Internet Protocol Version6 (IPv6) Addressing Architecture, April ) Y.-C. Hu, A. Perrig, and D. B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2003 ACM workshop on Wireless security, pages 30–40. ACM Press, ) R. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks, May ) B. Lu and U. Pooch. Cooperative security-enforcement routing in mobile ad hoc networks. In Mobile and Wireless Communications Network, th International Workshop on, Vol., Iss., pages 157–161, ) P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference, pages 27–31, January 2002

19 / 18 Fariba alamshahi Thank you for your attention ؟