Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Secure routing in multi-hop wireless networks (II)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
ROUTING ALGORITHMS IN AD HOC NETWORKS
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Mobile and Wireless Networking
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
ITIS 6010/8010 Wireless Network Security
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan Department Of Electrical Engg. College Of E&ME (NUST),Rwp.

INTRODUCTION  Mobile Adhoc NETwork (MANETs)  Adhoc On-demand Distance Vector (AODV)  Security Threats to existing protocols  Secure – AODV (SAODV)  Security analysis  Conclusion

MANETs  One of the most prevalent areas of research in the recent years  Communication via wireless means without need of infrastructure  Nodes can perform the roles of both hosts and routers  No centralized controller and infrastructure  Dynamic network topology

Advantages Of MANETs  Can access information and services regardless of geographic position  Can set up computer networks at any place and time  No need of dedicated infrastructure, hence cost-effective.  Can cope with Dynamic Topologies.  With improved algorithms, becoming more scalable.

Disadvantages Of MANETs  Limited resources  Limited physical security  Limited Bandwidth, high error rate  Mutual trust vulnerable to attacks  Security protocols for wired networks cannot work well for ad hoc networks

MANETs  Classification based on routing table maintenance.  Table Driven : Also called Proactive routing protocols. Maintain routes with every host at all time.  On-Demand : Also called Reactive routing protocols. Create routes to remote hosts on-demand.

MANETs  Available ad hoc routing protocols  Proactive (table driven) approaches  DSDV (Destination Sequenced Distance Vector)  OLSR (Optimized Link State Routing)  Reactive (on demand) approaches  DSR (Dynamic Source Routing)  AODV (Ad-hoc On-demand Distance Vector)

Ad hoc On-demand Distance Vector (AODV)  Uses routing tables, with one route entry per destination  Each entry stores next hop towards destination

AODV Route Discovery Process  Broadcasting route request (RREQ) packets  Each RREQ is uniquely identified by the sender address, destination address and request id  If the node is either the destination node or has a route to the destination node  Returns a route reply (RREP) containing the route, to sender

AODV Route Discovery Process Source Destination Propagation of a Route Request (RREQ) Packet

AODV Route Discovery Process Source Destination Path Taken By the Route Reply (RREP) Packet

AODV Route Discovery Process  Maintaining “fresh-enough” routes  Uses sequence numbers  Node compares the destination sequence number of the RREQ with that of its route table entry  Either responds with its own route if entry is fresh, or rebroadcasts the RREQ to its neighbors

AODV Route Discovery Process  Loop prevention  Before forwarding route request, check broadcast_id of RREQ  Dropped those that were already processed  Routing table consists of ‘ precursor ’ & ‘ outgoing ’ lists  Precursor list of nodes that use node for forwarding packets  Outgoing list of nodes which act as ‘ next hops ’ in a route

AODV Route Maintenance  A routing table entry is “ expired ” if it is not used recently.  A set of predecessor nodes is maintained per routing table entry  These nodes are notified with a RERR if entry expires  If a link break occurs while the route is active, the node upstream of the break propagates a RERR message to the source node

Attacks Possible On Existing Protocols  Attacks using modification  Attacks using impersonation  Other forms of attacks

Attacks Using Modification  Cause redirection of network traffic and Denial of Service (DoS) attacks by  Altering the protocol fields in routing messages  Injecting routing messages into the network with falsified values in these fields.

Sn = 99 Sn = 10 Sn = 99 Redirection with modified route sequence numbers ABX M SourceDestination RREQ A RREQ B Attacks using Modification

SourceDestination Hop count = 0 Hop count = 2 Redirection with modified hop counts ABX M SourceDestination RREQ A RREQ B Attacks using Modification

A MD CX Source Destination Denial of service with modified source routes RERR Attacks using Modification

Attacks Using Impersonation  By impersonating another node (spoofing), a malicious node can launch many attacks in a network  Traffic belonging to impersonated node redirected to malicious node (eavesdropping).  Spoofing is readily combined with modification attacks to create loops in routes

Attacks Using Impersonation  Malicious nodes don ’ t need to impersonate a single node of network  It can take up identity of multiple nodes of a network (Sybil Attack)  Data belonging to multiple nodes can be compromised

Attacks Using Impersonation  By generating false RERR messages  Routes passing through targeted node would be disrupted

I am C!! A BD CX Source Destination M RERR: D is broken Routing entries for X Falsifying route error messages in AODV and DSR Attacks using Impersonation

Other Forms of Attacks  Wormhole attack  Two attacker nodes A and B linked via a private network connection  A forwards every packet received through the wormhole to B for broadcasting, and conversely  Potentially disrupts routing by short circuiting the normal flow of routing packets

SAODV  An extension of the AODV routing protocol  Providing security features like integrity and authentication.  Each node has a signature key pair from a suitable asymmetric cryptosystem (OpenSSL)  Each node is capable of securely verifying the association between the address of a given ad hoc node and the public key of that node

SAODV Digital Signatures  Used to protect the integrity of the non ­ mutable data in RREQ and RREP messages  Sign everything but the Hop Count (mutable) of the AODV message and the Hash from the SAODV extension  When a node receives a routing message, it will verify the signature before any other action

SAODV Hash Chains  Used to authenticate the hop count of RREQ and RREP messages  Ensures that the hop count has not been altered by an attacker  Is formed by applying a one-way hash function repeatedly to a seed

SAODV Hash Chains  Calculating Top hash  Generates a random number as the “ seed ”  Set the Max_Hop_Count field in the message to the TTL value of the packet.  Determine the Hash function and use it to calculate the Top Hash which is obtained by hashing the seed Max_Hop_Count times.  Top Hash = h Max Hop Count (seed) Where:  – h is a hash function.  All this information is stored in the message

RREQ / RREP Extension

SAODV Hash Chains  Verification of hop Count  When a node receives a RREQ or a RREP message  Applies the hash function Maximum Hop Count minus Hop Count times to the value in the Hash field,  Top Hash = h Max Hop Count – Hop_Count (seed)  Verifies that the resultant value is equal to the value contained in the Top Hash field.  If it is a valid message,  The node applies the hash function to the Hash value before forwarding it  All the fields mentioned above except the Hash field are protected by digital signatures in order to protect their integrity

SAODV Route Errors  RERR corruption may cause route destruction  Every node uses digital signatures to sign the whole message  Any neighbour that receives it verifies the signature  Destination Sequence no. never updated from RERR

SAODV Security Analysis  The digital signature serves as proof of validity of the information contained in the routing message  Thus, formation of loops by malicious nodes through spoofing is prevented  Able to detect that the malicious nodes are sending out false messages.

SAODV Security Analysis  A node attempting to transmit false RERR messages will not succeed  Digital signature will reveal that it is not on the route and hence is not supposed to send a RERR.  Sequence number in the RREQs and RREPs also protected by the digital signature.  Any modifications to the sequence number will invalidate the message

SAODV Security Analysis  The hop authentication implemented using hash chains counters the ability of a malicious node for mounting an attack by modifying the hop count

SAODV Security Analysis  SAODV is able to handle all attacks using either modification or impersonation  However, it is unable to cope with wormhole attacks.

SAODV Key Management & Distribution  One approach can be that nodes are assigned keys on boot-up by a central authority  Assumption is that:  key distribution is already done  Every node has list of shared keys of network

Conclusion  MANET’s are among the fastest evolving network designs  No need for infrastructure, hence installation costs are minimum.  Provided limited bandwidth and security threats are a BIG issue.  Security needs greater than for fixed topology networks due to ad hoc nature.  Security features can be incorporated using various cryptographic schemes  Security increases packet overhead, further reducing bandwidth.  No protocol yet designed which exhibits complete security features.  Hence, secure routing on Mobile Adhoc Networks still in an evolutionary phase.

We thank you for your patience! open for questions, if any…