BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Intrusion Detection for Black Hole and Gray Hole in MANETs.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010: Wireless Network Security Weichao Wang.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Ad Hoc Wireless Routing COS 461: Computer Networks
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Adhoc Network: Routing Protocol:AODV
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Routing with Congestion Awareness and Adaptivity in Mobile Ad hoc Networks Duc A. Tran and Harish Raghavendra Multimedia and Collaborative Networking Group.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Wireless Control of a Multihop Mobile Robot Squad UoC Lab. 임 희 성.
Routing Metrics for Wireless Mesh Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Routing Metrics for Wireless Mesh Networks
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
By Ioannis Chatzigiannakis, Elena Kaltsa, Sotiris Nikoletseas
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Ad hoc Routing Protocols
Routing Metrics for Wireless Mesh Networks
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
Communication Networks
Routing.
Communication Networks
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng

AODV- Ad hoc On-Demand Distance Vector (AODV) Routing  In AODV, the network is silent until a connection is needed.  At that point the network node that needs a connection broadcasts a request for connection.  Other AODV nodes forward this message, and record the node that they heard it from, creating an explosion of temporary routes back to the needy node.  When a node receives such a message and already has a route to the desired node, it sends a message backwards through a temporary route to the requesting node.  The needy node then begins using the route that has the least number of hops through other nodes. Unused entries in the routing tables are recycled after a time.  When a link fails, a routing error is passed back to a transmitting node, and the process repeats.

S E G D F H C B M A broadcasts a requestOther AODV nodes forward this message

S E G D F H C B M A message backwards

S E G D F H C B M A Black hole attack- black hole drops message

Black hole attack

Co-operative Black hole attack

watch dog- Mitigating routing misbehavior in mobile ad hoc networks  Marti S, Giuli TJ,Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. International conference on mobile  computing and networking, August Pp

 In watch dog, to detect the misbehavior in the path, it listens the transmission of the next node.  In watch dog mechanism, the state information is maintained on monitored nodes,  but the transmitted packets increase the memory overhead.

Watchdog method S A DBC A BC A BC A overhear B's transmission and can verify that B has attempted to pass the packet to C.

Disadvantages-collision  1.  2. First time A think B is BH, A will mark B but not tell S. Then A continue watch B.

Disadvantages-cheating S A D B M M is the BH, but M will attempt to cheat A that B is the BH. A knows M doesn’t forward messages, but A thinks it’s B’s problem.

Pathrater  The pathrater, run by each node in the network  Each node maintains a rating for every other node it knows about in the network.  It calculates a path metric by averaging the node ratings in the path

P G D F H I B A C Pathrater the pathrater assigns the nodes a "neutral" rating of 0.5 A node always rates itself with a 1.0

P G D F H I B A C Pathrater if all other nodes are neutral nodes, the path rater picks the shortest length path

P G D F H I B A C Pathrater Every 200 ms, the path rater will increase the rate of the active nodes –active nodes are the ones which sent messages in the last 200ms.(maximum value: 0.8) 200 ms ms 0.52

P G D F H I B A C Pathrater The path rater will decrease a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. (lower bound rating:0.0) 0.45

Pathrater and watchdog 1. watchdog finds out the misbehaviour nodes(BH) 2. Path rater decreases the rate of the BH 3. Pate rater increases the rate of active nodes 4. Pate rater chooses the path with the highest average rate 5. nodes that have negative ratings should have their ratings slowly increased or set back to a non- negative value after a long timeout (in case of some nodes are mismarked as BH)

The end 1) The paper published in 2000, so it’s an old paper; 2) To their knowledge, there is no previously published work on detection of routing misbehaviour specific to ad hoc networks 3) They said they are the first, which is good, but also means: 4) Their method has a lot of problems, such as: collision, cost, memory, time…… 5) The way they get their simulation result is not connected to my research topic; so I don’t talk about it too much; 6) Anyway, watchdog and pathrater are interesting mechanism and can be used in the future