A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chris Karlof and David Wagner
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
An Advanced Signature System for OLSR Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Ad hoc Network 江崎研究室 修士1年 中島 亮. What is Ad hoc Network?  Meaning of Ad hoc Network Ad hoc =その場限りの Node to node → ノード間で一時的に形成されるネットワーク.
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Ch 4. Routing in WMNs Myungchul Kim
564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal 1 Protecting Ad Hoc Networks in real-time Presented By: Fadi Farhat Fall, 2007 Instructor:
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
1 Optimized Link State Routing Protocol for Ad Hoc Networks Jacquet, p IEEE INMIC Dec park gi won
A Stable Routing Protocol to Support ITS Services in VANET Networks Tarik Taleb, Ehssan Sakhaee, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobile Computing CSE 40814/60814 Spring 2017.
Internet Networking recitation #4
Sensor Network Routing
Mobile Ad-Hoc Networks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Ad hoc Routing Protocols
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
Subject Name: Computer Networks - II Subject Code: 10CS64
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented by: Holly Bennett 11/8/07

Intro Mobile Ad Hoc Networks (MANET) –Group of mobile devices –No predefined infrastructure –No centralized administration –Advantages: Mobility Low cost No need for existing infrastructure –Users: Disaster relief Emergency operations Military service Maritime communications Vehicle networks Campus networks Robot networks Etc

Routing Methodologies Reactive Routing Protocol –Ad Hoc On Demand Distance Vector AODV S wants to send a packet to D S does not have a route to D S sends a routing request RREQ to all its neighbors They either return a fresh path to D or forward the RREQ to their neighbors. Once the RREQ reaches D it returns a route reply RREP

Routing Methodologies Proactive Routing Protocols –Optimized Link State Routing OLSR Key concept: multipoint relay MPR, to reduce overall traffic Two types of messages: –Hello message to all neighbors, contains the nodes address and a list of all its one hop neighbors –The hello message gives each node a complete two-hop topology –Second type of message Topology Control TC messages –Only sent out by MPR nodes and contains the list of the senders MPR selector –Allows each node to learn the partial network topology and they can build a route to any node MPR Selection –In OLSR a node selects as its MPR set the set of nodes that can reach all its two-hop neighbors.

Attacks and Countermeasures Flooding Attack –Objective: exhaust network resources, overall bandwidth, and individual nodes resources of computational and battery power. –In AODV attacking node A sends out a large number of RREQs for a route to a non-existent node. –Countermeasures Calculate rate of neighbors RREQs, block if they exceed threshold Can not stop flooding below threshold and could block valid node if A is spoofing real nodes. Use statistical analysis to detect varying rates of flooding

Attacks and Countermeasures Blackhole Attack –Obj: Attacking node A returns fake routing information, causing the source node to choice a route through A, the attacker can then misuse or drop messages as it sees fit. –Countermeasures Introduce route confirmation requests CREQ and route confirmations reply CREP Intermediate nodes return RREPs and send CREQs to the next-hop node in the route to D, that node can send a CREP to S if it has a route to D. Can not defend against collusion between attacking nodes that returns false CREPs that validate the false RREPs. Proposal for a statistical analysis that compares destination sequence numbers to compare RREPs

Attacks and Countermeasures Link Withholding Attack –Obj: Attacker does not advertise a link to a specific node or group of nodes. –Countermeasures: Nodes listen for the TC message from the MPR node they selected, if they do not hear one that MPR node is rated suspicious and additional MPR nodes are selected. Again the countermeasure can be defeated by collusion if A2 drops the TC message created by A1

Attacks and Countermeasures Link Spoofing Attack –Obj: A attacking link advertises links to non-neighbors, by faking links to the two-hop neighbors of S, A can become one of its MPR nodes, and then manipulate traffic. –Countermeasures: Equip nodes with GPS and calculate whether two nodes could really have a link. Another solution is to include the 2-hop neighbors in the Hello message, this gives every node a 3-hop topology of the network, less expensive then special hardware, but is defeated by spoofing outside of 3-hops

Attacks and Countermeasures Replay Attack –Obj: Attacker records another nodes control messages and resends them later. Can be used to spoof another node or just disrupt routing. –Countermeasures: Add time stamp and asymmetric key to messages Reject old messages as suspicious

Attacks and Countermeasures Wormhole Attack –Obj: Two colluding attackers have a high speed link between them. Any RREQs that pass through the colluding nodes A1 and A2 will appear to cross the shortest path because of the high-speed link. This will cause S to send all messages to D through the compromised links A1 and A2. –Countermeasures: Packet leashes, temporal and geographical. These prevent a packet from moving too far too fast.

Attacks and Countermeasures Colluding Misrelay Attacks –Obj: Two colluding attackers modify or drop packets –Countermeasures: An acknowledgment system could detect this but will increase overhead. Another solution is to increase transmission power twice to detect the colluding attackers. However even if we increase the transmission power K times, K+1 attackers can drop packets.

Summary The advantages of the MANET are allowing them to be deployed much rapidly at low cost in a variety of applications. Security is often necessary, and the weaknesses of a MANET need to be considered. The major weaknesses are the constrained bandwidth, processing power and battery power. The article presented a survey of the various attacks currently considered against MANETs and summarized defenses that have been developed.