Routing Security in Wireless Ad Hoc Networks - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Routing Security in Wireless Ad Hoc Networks

Description:

Routing Security in Wireless Ad Hoc Networks Hongmei Deng Wei Li Dharma P. Agrawal IEEE Communications Magazine October 2002 Outline Introduction Routing security in ... – PowerPoint PPT presentation

Number of Views:74
Avg rating:3.0/5.0
Slides: 21
Provided by: dslabCsi6
Category:

less

Transcript and Presenter's Notes

Title: Routing Security in Wireless Ad Hoc Networks


1
Routing Security in Wireless Ad Hoc Networks
  • Hongmei Deng
  • Wei Li
  • Dharma P. Agrawal
  • IEEE Communications Magazine October 2002

2
Outline
  • Introduction
  • Routing security in MANETs
  • Routing protocols in MANETs
  • Routing security in MANETs
  • The black hole problem in current AODV protocol
  • A proposed solution to the black hole problem
  • Conclusion and future work

3
Introduction
  • Mobile ad hoc network (MANET)
  • MANET is particularly vulnerable due to its
    fundamental characteristics, such as open medium,
    dynamic topology, distributed cooperation, and
    constrained capability.
  • Each mobile node operates not only as a host but
    also as a router.

4
Introduction (cont.)
  • Routing plays an important role in the security
    of the entire network.
  • MANET can be established extremely flexibly
    without any fixed base station in battlefields,
    military applications, and other emergency and
    disaster situation. (Figure 1)
  • The features of MANET
  • All signals go through bandwidth-constrained
    wireless links in a MANET, which makes it more
    prone to physical security threats than fixed
    landline networks.

5
Introduction (cont.)
  • Mobile nodes are roaming independently and are
    able to move in any direction.
  • Decentralized decision making in the MANET relies
    on the cooperative participation of all nodes.
  • Nodes may rely on batteries or other exhaustible
    means for their energy.
  • This article analyze in detail one type of attack
    the black hole problem that can easily be
    deployed against MANETs.

6
Introduction (cont.)
  • It proposed a feasible solution for ad hoc
    on-demand distance vector (AODV) routing
    protocol.

7
Routing Security in MANETs Routing protocols in
MANETs
  • Routing protocols of MANETs can be classified
    into two categories
  • Table-driven
  • On demand
  • The routing protocols for a MANET are
  • Destination-sequenced distance-vector routing
    protocol (DSDV)
  • Ad hoc on-demand distance vector (AODV)
  • Dynamic source routing protocol (DSR)

8
Routing Security in MANETs (cont.) Routing
security in MANETs
  • Attacks can be classified into passive and active
    attacks.
  • Active attack can be further divided into
    external attacks and internal attacks.
  • Some types of active attacks
  • Black hole
  • Denial of service
  • Routing table overflow
  • Impersonation
  • Energy consummation
  • Information disclosure

9
Routing Security in MANETs (cont.) Routing
security in MANETs
  • The External Attack Prevention Model (EAPM)
    secures the network from external attacks by
    implementing message authentication code to
    ensure integrity of route request packets.
  • The Internal Attack Detection Model (IADM) is
    used to analyze local data traces gathered by the
    local data collection module and identify the
    misbehaving nodes in the network.

10
The black hole problem in current AODV protocol
  • AODV is an important on-demand routing protocol
    that creates routes only when desired by the
    source node.
  • When a node requires a route to a destination, it
    initiates a route discovery process within the
    network. It broadcasts a route request (RREQ)
    packet to its neighbors. (Figure 2)

11
The black hole problem in current AODV protocol
(cont.)
12
The black hole problem in current AODV protocol
(cont.)
  • Once the RREQ reaches the destination or an
    intermediate node with a fresh enough route, the
    destination or intermediate node responds by
    unicasting a route reply (RREP) packet (Figure 3)
    back to the neighbor from which it first received
    the RREQ.

13
The black hole problem in current AODV protocol
(cont.)
14
The black hole problem in current AODV protocol
(cont.)
  • Any intermediate node may respond to the RREQ
    message if it has a fresh enough route.
  • The malicious node easily disrupts the correct
    functioning of the routing protocol and make at
    least part of the network crash.

15
The black hole problem in current AODV protocol
(cont.)
16
A proposed solution to the black hole problem
  • One possible solution to the black hole problem
    is to disable the ability to reply in a message
    of an intermediate node, so all reply messages
    should be sent out only by the destination node.
  • But there are two disadvantages in this method.

17
A proposed solution to the black hole problem
(cont.)
  • Another solution is using one more route to the
    intermediate node that replays the RREQ message
    to check whether the route from the intermediate
    node to the destination node exists or not.
  • In the proposed method, we require each
    intermediate node to send back the nexthop
    information when it send back a RREP message.
    (Figure 5 and 6)

18
A proposed solution to the black hole problem
(cont.)
  • The routing overhead is greatly increased if we
    do the process every time an intermediate node
    sends back a reply message.
  • We use the IADM for out prior work to find the
    suspected node.
  • The simulation results show that we are able to
    secure the AODV protocol from black hole attacks
    and achieve increased throughput, while keeping
    the routing overhead minimal.

19
Conclusion and future work
  • Routing security in wireless networks appears to
    be a nontrivial problem that cannot easily be
    solved.
  • It is impossible to find a general idea that ca
    work efficiently against all kinds of attacks,
    since every attack has its own distinct
    characteristics.
  • This article analyzes one type of attack, the
    black hole, that can easily be deployed against a
    MANET.

20
Conclusion and future work (cont.)
  • One limitation of the proposed method is that it
    works based on an assumption that malicious nodes
    do not work as a group, although this may happen
    in a real situation.
  • We are currently looking at this problem of team
    attacks.
Write a Comment
User Comments (0)
About PowerShow.com