Defenses against Wormhole Attack
|
|
- Nathaniel Boyd
- 5 years ago
- Views:
Transcription
1 Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir
2 Outline Introduction Packet Leashes Approaches TIK Protocol Performance and Security Analysis Conclusion
3 Introduction Problem Statement Wormhole Attack: An attacker tunnels packets received at one point in the network to another colluding node which will replay them Bypassing normal routes Performed even if the network provides confidentiality and authenticity No necessity to have any crypto keys To establish the tunnel, High power antenna, wired link or other methods can be used Attack Impact: the attacker is in a very powerful position Disrupt Routing protocols: manipulate route priorities Denial of Service (DoS): No other route can be discovered (e.g. routes more than 2 hops) Packet modification and analysis Very severe
4 Attack Demo Normal route Wormhole route Src Src Dst Dst
5 Wormhole Attack Modes Two Modes Hidden mode: the attackers do not use their identities so they remain hidden from the legitimate nodes Participation mode: attackers possess valid cryptographic keys that can be used to launch a more powerful attack.
6 Attack Countermeasures Two Types: Proactive: prevent wormhole formation, typically through restricting max traveled distance, accurate time synchronization or time measurement, neighbor overhearing, local monitoring, or transmission maximum power in a particular direction. Reactive: consider the wormhole as a valid link and avoid it only if it exhibits some malicious behavior like modifying or dropping packets do not prevent the wormhole formation do not work against passive attacks using some basic mechanisms such as packet authentication and destination acknowledgment.
7 Attack Countermeasure: Packet Leashes (Proactive) Add information to the packet to restrict its maximum allowed distance Approaches Geographical Upper bound on packet s traveled distance Temporal Upper bound on packet s lifetime
8 Geographical Leash Child Safety Leash Upper bound on packet s traveled distance Loose time syn nodes are mobile Where s: sender, r: receiver dsr: distance between sender and receiver p: location, δ: location error t: time, Δ: time syn error v: node velocity upper bound
9 Temporal Leash Upper bound on packet s life time Restrict traveled distance Tight time syn; i.e. Δ is in microsecond The packet s expiration time: The Receiver accept the packet if : te: packet expiration time ts: packet sent time c: propagation speed of wireless signal L: maximum allowed travel distance; L > Lmin = Δ*c Δ: maximum clock difference between 2 nodes
10 Any problem? An attacker could change the expiration time (te) Solution: authenticate the expiration time (te) using: Message Authentication Codes (HMAC) Digital Signature TIK TESLA with Instant Key disclosure
11 Message Authentication Codes (HMAC) The sender and receiver share a key K, to send a message M, For n node keys Expensive!
12 Digital Signature Uses Asymmetric Key Crypto sender node signs the message with its private key Receiver node verifies the authenticated message using sender s public key n keys Problem: asymm crypto is expensive computationally
13 TIK protocol Main observation Authenticate the keys Use one-time-key Three phases Sender setup Receiver bootstrap Sending and verifying authenticated packet
14 TIK Protocol- Sender setup Requires tight time syn Includes the key in the packet Sender generates a series of keys, K 0, K 1,, K w-1, using a pseudo Random Function (F) and a secret master key X: K i = F x (i) Sender selects a key expiration interval I and determines the expiration time (T i ) for its keys: T i = T 0 + i*i, where T 0 is the expiration time for K 0 Sender constructs a Merkle hash tree to commit to keys: K 0, K 1,, K w-1
15 Merkle hash tree-i
16 Merkle hash tree-ii K 0 = H(K 0 ), H is hash function m 01 = H(K 0 K 1 ), m 03 = H(m 01 m 23 ); The root value (m 07 ) sent to the receivers To authenticate K 2, for example: Sender includes in the packet the tree hash values (T) which is only 3 values: K 3 M 01 m 47 Receiver authenticate K 2 by verifying m 07 m 07 = H[ H[ m 01 H[ H[K 2 ] K 3 ]] m 47 ]
17 TIK Protocol Receiver Bootstrapping Assumptions: Tight time syn within a max of Δ Receiver knows: The key expiration interval (I) the tree root m 07 Expiration of first key T 0
18 TIK Protocol Sending and Verifying Packets- Sending Sender HMAC M T K i Receiver HMAC M T K i Time at Sender t s T i Time at Receiver T: the hash tree values t r (t s + L/C - Δ) t s : send time, t r : receive time, T i : sender discloses the key K i after it expires, Attacker can not replay (one-time-key)!!
19 TIK Protocol Sending and Verifying Packets- Verification Receiver verifies: The key K i is authentic using Tree root m07 Hash tree values T The message HMAC using K i
20 TIK: a win-win game TIK already protect against Wormhole An attacker will most likely not be able to transmit the packet before it expires and the sender discloses it (one-timekey) WE can also add Expiration time (t e ) to the packet and authenticate using TIK
21 Performance Analysis Cons No protection against False sender time stamp (t s ) Receiver refusal to verify TIK still need to be optimized for very resource scarce sensors Pros For n node Requires n keys Less storage requirement for the hash tree Less computation overhead Efficient instant authentication Prevent wormhole attack
22 Conclusion Wormhole attack is a powerful and disruptive against many routing protocols With tight time syn, temporal leash can detect and prevent Wormhole Efficient implementation of Geographical leash and optimization of TIK are still research issues
23 References Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, 24(2): , IEEE, M. Khabbazian, H. Mercier, and V. K. Bhargava, Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks, IEEE Transactions on Wireless Communications, 8(2): , 2009.
24 Discussion
Wormhole Attack in Wireless Ad-Hoc Networks
Wormhole Attack in Wireless Ad-Hoc Networks Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour Abstract Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack,
More informationEfficient and Secure Source Authentication for Multicast
Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related
More informationA REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department
More informationSECURE ROUTING PROTOCOLS IN AD HOC NETWORKS
SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,
More informationA Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationInternational Journal of Advance Research in Engineering, Science & Technology. A Survey on Wormhole Attack in MANET
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 A Survey on Wormhole Attack
More informationA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS Subhashis Banerjee 1 and Koushik Majumder 2 1 Department of Computer Science & Engineering, West Bengal University of Technology,
More informationSecure Routing for Mobile Ad-hoc Networks
Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)
More informationE2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks
2012 26th International Conference on Advanced Information Networking and Applications Workshops E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks Sanjay Kumar Dhurandher
More informationLHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1, Shouhuai Xu 2, Sanjeev Setia 1, and Sushil Jajodia 1 1 Center for Secure Information Systems, George Mason University,
More informationA Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks
A Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks Sushant S. Bahekar 1, Prashant Panse 2 1 M. Tech Student, Departemnt of Computer Engineering, SVCE, Indore,
More informationRushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu Carnegie Mellon University yihchun@cs.cmu.edu Adrian Perrig Carnegie Mellon University perrig@cmu.edu David B. Johnson
More informationWormhole Attack Detection Protocol using Time Stamp with Security Packet.
Wormhole Attack Detection Protocol using Time Stamp with Security Packet. Chandraprabha Rawat Department of Computer Application Samrat Ashok Technological Institute Vidisha, India. Abstract- The Mobile
More informationCSC 774 Advanced Network Security
Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially
More informationLHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1 Shouhuai Xu 2 Sanjeev Setia 1 Sushil Jajodia 1,3 1 Center for Secure Information Systems, George Mason University,
More informationWAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationSecurity in Ad Hoc Networks *
Security in Ad Hoc Networks * Refik Molva and Pietro Michiardi Institut Eurecom 2229 Route des Crêtes 06904 Sophia-Antipolis, France Abstract. In wirelesss ad hoc networks basic network operations are
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane
More informationRound Trip Time based Wormhole Attacks Detection
Round Trip Time based Wormhole Attacks Detection Zaw Tun and Ni Lar Thein University of Computer Studies, Yangon zawtun78 @gmail.com, nilarthein@gmail.com Abstract The nature of wireless ad hoc and sensor
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationSecure routing in ad hoc and sensor networks
Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security
More informationLHAP: A Lightweight Network Access Control Protocol for Ad-Hoc Networks
LHAP: A Lightweight Network Access Control Protocol for Ad-Hoc Networks Sencun Zhu a,, Shouhuai Xu b, Sanjeev Setia c, Sushil Jajodia c a Department of Computer Science and Engineering and School of Information
More informationAn On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities
An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University On-Demand vs. Proactive Routing Security Concerns On-Demand Source Authentication Caching presents
More informationCHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL
63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery
More informationAn On-demand Secure Routing Protocol Resilient to Byzantine Failures
An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University Joint work with David Holmer, Cristina Nita-Rotaru, and Herbert Rubens Based on paper at WiSe2002
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014
More informationReview Paper on Wormhole Attack
Review Paper on Wormhole Attack Garima Kadian CSE Department, DCRUST DCRUST, Murthal, Sonipat, India Dinesh Singh, PhD ABSTRACT A Wireless Networks are more accessible to different types of attack than
More informationA Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks (MANET) Bhaskar Kumawat, Dev Kumar Computer Science & Information Communication, Suresh Gyan Vihar University, India Abstract In
More informationWIRELESS sensor networks have received a lot of attention
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationDefending Against Resource Depletion Attacks in Wireless Sensor Networks
Defending Against Resource Depletion Attacks in Wireless Sensor Networks Cauvery Raju M. Tech, CSE IInd Year, JNNCE, Shimoga Abstract: One of the major challenges wireless sensor networks face today is
More informationSEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. (2008) Published online in Wiley InterScience (www.interscience.wiley.com).60 SEAR: a secure efficient ad hoc on demand routing protocol for
More informationAnalysis of Worm-Hole Attack in MANET using AODV Routing Protocol
Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,
More informationLITEWORP: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks
LITEWORP: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks Issa Khalil, Saurabh Bagchi, Ness B. Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011
Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationPerformance Investigation and Analysis of Secured MANET Routing Protocols
Performance Investigation and Analysis of Secured MANET Routing Protocols A.Jayanand #, Prof.Dr.T.Jebarajan * # Principal, Maria Polytechnic College,Attoor, India (Research scholar, MSU) * Principal, Kings
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationRushing Attack Prevention with modified AODV in Mobile Ad hoc Network
Rushing Attack Prevention with modified AODV in Mobile Ad hoc Network 1 Chinkit Suthar, 2 Bakul Panchal 1 Student-ME(CSE), 2 Assistant Professor 1 Comp uter Science and Engineering Department, 1 L.D. C
More informationWormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure Majid Khabbazian, Hugues Mercier and Vijay K. Bhargava Department of Electrical and Computer Engineering University of British Columbia
More informationA Novel Secure Routing Protocol for MANETs
22 A Novel Secure Routing Protocol for MANETs Zhongwei Zhang University of Southern Queensland Australia 1. Introduction Ad hoc networks is a special kind of wireless network mode. A mobile ad hoc network
More informationOn Demand secure routing protocol resilient to Byzantine failures
On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,
More informationA REVIEW: ANALYSIS OF WORMHOLE ATTACK AND ITS DETECTION TECHNIQUES
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A REVIEW: ANALYSIS OF WORMHOLE ATTACK AND ITS DETECTION TECHNIQUES AASHIMA 1, VISHAL KUMAR ARORA 2 1 M Tech Scholar,
More informationDETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.
More informationA Security Analysis of the Precise Time Protocol
A Security Analysis of the Precise Time Protocol Jeanette Tsang & Konstantin Beznosov December 5, 2006 Laboratory for Education and Research in Secure Systems Engineering (LERSSE) University of British
More informationSRPS: Secure Routing Protocol for Static Sensor Networks
SRPS: Secure Routing Protocol for Static Sensor Networks Hamoinba Vebarin and Samourqi Difrawi International Awarness Institute Email: {hvebarin, sdifrawi}@iwi.org.jp Abstract In sensor networks, nodes
More informationAn Improvement to Mobile Network using Data Mining Approach
An Improvement to Mobile Network using Data Mining Approach Sumiti Dahiya M.Phil (CS) MM University, Mulana, Ambala, Haryana (India) sumitidahiya604@gmail.com Abstract Secure communication is always the
More informationA survey on AODV routing protocol for AD-HOC Network
A survey on AODV routing protocol for AD-HOC Network Parveen Kumar Jatin Sharma Kriti saini Astt. Professor Research fellow Research fellow Dept. of Computer Science Dept. of Computer Science Dept. of
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks
More informationA Review on Black Hole Attack in MANET
A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,
More informationA Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor
More informationDefense Against Packet Injection in Ad Hoc Networks
Defense Against Packet Injection in Ad Hoc Networks Qijun Gu 1 Peng Liu 2 Chao-Hsien Chu 2 Sencun Zhu 3 1 Department of Computer Science Texas State University, San Marcos, TX 78666 2 School of Information
More informationA DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM
A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM Ms. Nivethitha N, Mr. NandhaKumar S, Ms. Meenadevi M Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering
More informationMOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. Abstract
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks Issa Khalil, Saurabh Bagchi, Ness B. Shroff Dependable Computing Systems Lab and Center for Wireless Systems and Applications
More informationAriadne: Secure On-Demand Routing in Ad-Hoc Networks an explanation for dummies
Ariadne: Secure On-Demand Routing in Ad-Hoc Networks an explanation for dummies Bernd May (bm@dv-team.de) Seminar Internet Routing, Betreuer Cigdem Sengul, Oliver Hohlfeld, Anja Feldmann Fachgebiet Intelligente
More informationA Review On: Detection and Prevention of Wormhole Attacks in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013 1 A Review On: Detection and Prevention of Wormhole Attacks in MANET Yashpalsinh Gohil, Sumegha Sakhreliya,
More informationA Tree-Based µtesla Broadcast Authentication for Sensor Networks
A Tree-Based µtesla Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia Cyber Defense Laboratory Department of Computer Center for Secure Department of Computer
More informationEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET Vinay Kumar Pandey 1 Dr. Harvir Singh 2 Sanjay Kumar 3 1 Department of CSE UTU,Dehradun, India, vkp1979@yahoo.co.in 2 Department of CSE UTU, Dehradun, India, dr.harvir@gmail.com
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationKun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou
Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance
More informationNetwork Layer Attacks and Protection in MANET- A Survey
Network Layer Attacks and Protection in MANET- A Survey Athira V Panicker, Jisha G Rajagiri School of Engineering and Technology, Department of Information Technology Rajagiri Valley P O, Cochin, Kerala,
More informationLink-Based Wormhole Detection in Wireless Sensor Networks
Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,
More informationHMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract
HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract Alvaro A. Cardenas, Vahid Ramezani, John S. Baras Department of Electrical and Computer Engineering and Institute for
More informationDepartment of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD 20742, USA
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 211, Article ID 392529, 18 pages doi:1.1155/211/392529 Research Article Energy-Efficient Source Authentication
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationMitigating DoS attacks against broadcast authentication in wireless sensor networks
Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 1-1-2008 Mitigating DoS attacks against broadcast authentication in wireless
More informationTHE COST OF PROTECTION MEASURES IN TACTICAL NETWORKS
THE COST OF PROTECTION MEASURES IN TACTICAL NETWORKS Brian J. Matt McAfee Research Rockville, MD 1. INTRODUCTION The security of the Object Force and Future Combat Systems communication is dependent on
More informationDetecting and Preventing Wormhole Attacks In Wireless Sensor Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 19-27 Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks
More informationAODV Routing Protocol in MANET based on Cryptographic Authentication Method
IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College
More informationhash chains to provide efficient secure solutions for DSDV [7].
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University
More informationCERIAS Tech Report
CERIAS Tech Report 2005-90 LITEWORP: A LIGHTWEIGHT COUNTERMEASURE FOR THE WORMHOLE ATTACK IN MULTIHOP WIRELESS NETWORKS by Issa Khalil, Saurabh Bagchi, Ness B. Shroff Center for Education and Research
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationMOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks Issa Khalil, Saurabh Bagchi, Ness B. Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications
More informationRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS R. Ramesh 1 and S. Gayathri 2 1 Department of Electrical and Electronics Engineering, Anna University, India rramesh@annauniv.edu
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationA Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS
NEC Technical Report NLE-PR-2006-19, NEC Network Laboratories, March 2006, 28 pages. A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1.1 June 2, 2006
More informationDetection and Prevention of Wormhole Attack in Wireless Sensor Network
Detection and Prevention of Wormhole Attack in Wireless Sensor Network Aaditya Jain 1, Shalini Sharma 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering
More informationWormhole Attack Detection and Prevention Model in MANET Based on Hop-Count and Localization
Islamic University of Gaza Deanery of Graduate Studies Faculty of Information Technology Wormhole Attack Detection and Prevention Model in MANET Based on Hop-Count and Localization Prepared By Badran M.
More informationA Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
Sensors 2009, 9, 5022-5039; doi:10.3390/s90605022 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET Shang-Ming Jen
More informationDynamic Source Routing in ad hoc wireless networks
Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Security in ADHOC Sensor Networks Dr. G. Murugaboopathi Head
More informationEfficient Security Mechanisms for Routing Protocols
Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University yihchun@cs.cmu.edu Adrian Perrig Carnegie Mellon University perrig@cmu.edu David B. Johnson Rice University dbj@cs.rice.edu
More informationA STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS
953 A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS K.Prasuna 1, Chilakalapudi Meher Babu 2,K.Ram Kumar 3 1 Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA. 2 Ph.D., Scholar,
More informationReview:- EN-efficient Approaches for MANETs in Rushing Attacks
Review:- EN-efficient Approaches for MANETs in Rushing Attacks Rashmi Vishwakarma Sumit Dhariwal Mohmmed.Imran Deptt.Of CSE Deptt.Of CSE HOD,Deptt.Of CSE JNCT Rewa M.P, India SIRTE Bhopal M.P, India JNCT
More informationDetecting Wormhole Attacks in Delay Tolerant Networks
Detecting Wormhole Attacks in Delay Tolerant Networks Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen Dept. of ECE, Stevens Institute of Technology Dept. of CSE, Lehigh University Castle Point on
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationWatch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
International Journal of Computational Intelligence Systems, Vol. 5, No. 5 (September, 212), 878-886 Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks Liang-yu Luan 1 1 College of
More informationWormhole Detection and Prevention in MANET: A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.980
More informationCryptographic Checksums
Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;
More informationImplementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
More informationAnalysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSecure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols 1 Secure Ad-Hoc Routing Protocols Mehul K Revankar Abstract An Ad-Hoc network is a collection of mobile nodes dynamically forming a temporary network without the presence
More information