Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
By Ioannis Chatzigiannakis, Elena Kaltsa, Sotiris Nikoletseas
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
ITIS 6010/8010 Wireless Network Security
Routing.
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School of Computer Engineering and Information Technology University of Ulsan, Ulsan Metropolitan City, , Republic of Korea Seventh Annual International Working Conference on Active and Programmable Networks November CICA, Sophia Antipolis, French Riviera, La Cote d'Azur, FRANCE Network-based Automation Research Center

Slide 1 Contents Motivation and Goals The proposed security schema Security analysis Conclusions and future work

Slide 2 Motivations The AODV routing protocol is under consideration by IETF for MANET routing protocol standardization Security aspects for AODV also have been studied in other researches Based on unrealistic assumptions about the availability of key management infrastructures => Alternative solutions more suitable to ad hoc networks are needed

Slide 3 Goals Consider two related works: ARAN and SAODV These schemas do not consider intermediate nodes during the routing steps nodes may perform fabrication attacks. The goal: design a schema which performs point-to-point message authentication without a deployed key management infrastructure

Slide 4 The proposed security schema (1/4) Principle: messages in AODV must be authenticated to guarantee the integrity and non-repudiation Each node maintains table for security info; a record contains: neighbor address, neighbor public key, and a shared secret key The authentication is executed by checking hashed message which is hashed by the shared key

Slide 5 The proposed security schema (2/4) Key agreement process 1. Broadcast : 2. For each received message 3. If message_type=AGREEMENT_REQ 4. send 5. ElseIf message_type=AGREEMENT_REP 6. generate a shared key K s ; 7. send 8.ElseIf message_type= KEY_OFFER 9. decrypte to get the shared key K s ; 10.End if; 11. End for; e S and e R are the public key of the sender node and replying node eReR

Slide 6 The proposed security schema (3/4) Route request Hased value = hash Ks (RREQ) the hashed value of RREQ message by the shared key K s between the two nodes. IkIk D

Slide 7 The proposed security schema (4/4) Route reply and route maintenance Route replies (RREP) in AODV also need to be authenticated; the request and reply for authentication: ; Authentication for route error report message (RERR) ;

Slide 8 Security analysis (1/2) The proposed schema is a new fully distributed authentication process does not require any third parties provides the integrity and non-repudiation of messages The schema uses point-to-point authentication process can authenticate intermediate nodes in routing steps does not require a certificate server (like ARAN) or assumption of key distribution (SAODV).

Slide 9 Security analysis (2/2) By supplying integrity of exchanging messages, our schema can prevent against attacks A malicious node can not forms loops by spoofing nodesspoofing nodes can prevent falsified error messages or modification attacks during route discovery processfalsified error messages modification attacks However, The end-to-end authentication process has not been considered yet

Slide 10 Conclusions A security schema for AODV has been proposed to prevent common kinds of attacks and compensate for the security flaws of recent related works Exchanging messages in AODV are required to be authenticated in point-to-point step by using hash chains during a transaction Shortcomings Some kinds of attacks (tunneling attacks or selfishness problems) have not been considered in this work end-to-end authentication process has not been considered yet

Slide 11 Future work The end-to-end authentication procedure will be added to the current approach Trust self-management in the schema will be studied The implementation and simulation of the schema has been investigating on GloMoSim simulation tool

Slide 12

Impersonate attacks  A malicious node impersonates the source node  A malicious node impersonates the destination node  Forging a RREP with its address as a destination node  Associating with modifying sequence number with a big value  Impersonates the neighbor of destination  A malicious node forms loops by spoofing nodes

Modification attacks  Modify hop count field  Reduce the hop count field in RREQ messages The malicious node is included on a newly created route The malicious node is included on a newly created route  Modify destination_seq_# field  after re-broadcasting a RREQ, a malicious node creates a falsified RREQ with increased destination_seq_#

Falsifying Route Errors  A malicious node can falsifies a fabrication route error message  A malicious node M spoofs node B and send to node A (previous hop of B in a route to a destination) a error message indicating a broken link between node B and the destination  Node A delete the table entry for the destination and forward the route error message A B S D M Falsified RERR