SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,

Slides:



Advertisements
Similar presentations
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Advertisements

Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Application Guide For Mesh AP – MAP-3120
Trust relationships in sensor networks Ruben Torres October 2004.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Self-Adaptive, Decentralised Data Publication over Wireless Networks Richard Cooksey Supervisor: Prof. A. Taleb-Bendiab.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Jadavpur University Centre for Mobile Computing & Communication Implementation of Ad-Hoc Mesh Network Presentation by: Sudipto Das Rajesh Roy.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
Wireless MESH network Tami Alghamdi. Mesh Architecture – Mesh access points (MAPs). – Mesh clients. – Mesh points (MPs) – MP uses its Wi-Fi interface.
Wireless LAN Technology
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Content-Based Music Information Retrieval in Wireless Ad-hoc Networks.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Dynamic Transmission Power Control in Wireless Ad-Hoc Networks EE194 Wireless Sensor Networks Stuart Peloquin & Joe Cerra.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
BLUETOOTH BASED LOCATION SYSTEM SULAIMAN AL AWAD HANI AL RUWAILI.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Ad Hoc Network.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
WLAN.
Session: IT 601: Mobile Computing Session 1 Introduction Prof. Anirudha Sahoo IIT Bombay.
DSN & SensorWare Projects Rockwell Science Center –Charles Chien UCLA –Mani Srivastava, Miodrag Potkonjak USC/ISI –Brian Schott, Bob Parker Virginia Tech.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Wireless Sensor Networks
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Computer Networks CSC September 23,
Wireless Technologies
Chapter 6 Wireless and Mobile Networks
A Wireless LAN technologies IEEE
Net 435: Wireless sensor network (WSN)
CS 457 – Lecture 7 Wireless Networks
Wireless ATM PRESENTED BY : NIPURBA KONAR.
Denial-of-Service Jammer Detector Training Course Worldsensing
DK presents Division of Computer Science, KAIST
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science, Bucknell University Faculty Mentor: Prof. L. Felipe Perrone, Dept. of Computer Science, Bucknell University Supported by the Accenture Discovery Undergraduate Research Fund Physical Process Terrain Model OS Model (DaSSF Runtime Kernel) Protocol Graph Host model time memory run thread RF Channel Model read terrain features read terrain features Architecture of the Simulator for Wireless Ad-Hoc Networks (SWAN) Networked nodes run on battery power. Network nodes communicate with radio devices (e.g. Wi-Fi, Bluetooth). Nodes can move around freely. Networks form spontaneously through neighbor discovery and automatic routing: no human intervention. No need for any infrastructure. Wireless Ad-Hoc Networks Graph-Theoretic Metrics Attack Scenario: JammingMetric Recording Infrastructure Fixed-Range vs. Variable-Range Networks Metric Data File Recorder Player We gave the SWAN user the capability to define at configuration time what metrics need to be recorded. Each metric can be periodically sampled (at its own interval) and recorded to a file on disk by a Recorder module. After the simulation is completed, an external Player program uses the recorded data to display it according to a chosen format. Player and Recorder use the Type File to determine the formatting of records in the Data File. Physical layout (with signal ranges) of the wireless nodes. Graph representation of the physical layout. Overlapping regions indicate a connection (or an edge in the graph). model [ arena [ mobility [ # nodes are stationary model "mobility.stationary" deployment "random" # uniform distribution xdim 1500 # width of virtual space ydim 1500 # length of virtual space ] network [ netid 1 # wireless network 1 model "network.fixed-range" cutoff 350 # signal cutoff distance ] propagation [ model "propagation.friis-free-space" carrier_frequency 2.4e9 system_loss 1.0 temperature 290 noise_figure 10.0 ambient_noise_factor 0 ] # network node: configuration example host [ id 1 graph [ session [ Connectivity metrics measure how “well-connected” a graph is at a given time. This knowledge is critical to security studies in order to measure the damage done by different attacks. Connectivity Index Connectivity Efficiency Randic’s Connectivity Index Description name "app" use "tstapp.sess-app-session" packet_size 512 iat 1.0 show_report true peer [ netid 1 hostid 2 iface 0 ] ] session [ name "aodv“ use "routing.aodv_sim.swan-aodv-session" netid 1 show_report true # show report at the end ] session [ name "net" use "net.ip-session"] session [ name "arp“ use "net.arp-session" show_report true ] interface [ id 0 # identification of network interface card netid 1 # identification of wireless network session [ name "mac" use "mac.mac session" show_report true ] session [ name "phy" use "phy.phy session" bandwidth 11e6 accumulative_noise true interference_threshold ] ] ] ] ] Example Configuration File (DML) Wireless networks following standards transmit on the 2.4Ghz band. When other destructive transmissions are present on the same band, all communications are jumbled and fail to be recognized. A malicious node can constantly emit signals and effectively “jam” an area. SWAN can simulate this type of attack, allowing us to obtain useful damage reports. Normal area and its connectivity graph. Jammed area and its connectivity graph. The lack of infrastructure and automatic configuration allow these networks to be easily deployed. They can be helpful in remote sensing, where nodes obtain and forward to monitoring points information from their environment, such as the presence of a chemical contaminant, video, or audio. Originally, SWAN only modeled fixed-range networks, that is, networks in which all nodes transmit with the same signal strength and thus all cover the same area. Although this model is adequate for many simulation studies, we introduced a more flexible model: variable-range network, in which each node can individually choose the strength of its transmissions and adjust it at any point in time. This feature enables us to experiment with attack models in which the jammer(s) can change their coverage periodically and interfere more strongly with packet routing algorithms. Fixed ranged network.Variable ranged network. Fixed ranged network with jammers of different ranges. The Next Step: Running and Analyzing Attacks With the infrastructure for security studies built, the next part of our research study will be to design different attack scenarios, simulate them, and analyze the results using the connectivity metrics implemented. Data representation will resemble the sample graph below: Time Attack This research study primarily concentrates on denial of service (DoS) attacks in which the goal of the attack is to disrupt accessibility to the network. Attack models we’ll study include: Jamming: The communication band is flooded with garbage disallowing transmissions. Reboot: Nodes are periodically rebooted, causing confusion in network routing. Range: Transmission power is varied periodically changing the number of neighbors seen by a node Metric Type File metric values Connectivity EPS JPG GIF