Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Similar documents
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

On Demand secure routing protocol resilient to Byzantine failures

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

International Journal of Advance Research in Computer Science and Management Studies

Mitigating Malicious Activities by Providing New Acknowledgment Approach

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Dynamic Source Routing in ad hoc wireless networks

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Security Enhanced Adaptive Acknowledgment Intrusion Detection System

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Malicious Node Detection in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Detecting Misbehaving Node In Ad-Hoc Network By Audit Mechanism

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

ISSN: [Preet* et al., 6(5): May, 2017] Impact Factor: 4.116

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Arvind Krishnamurthy Fall 2003

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

An Improvement to Mobile Network using Data Mining Approach

A Meta- Analysis on Mobile Ad-Hoc Networks (MANET) Performance Issues

CERIAS Tech Report

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Detection of Malicious Nodes in Mobile Adhoc Network

Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

Secure Data Transmission in MANETS Using ELIPTIC Curve Cryptography

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET

DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK

A Trust-Based Geographical Routing Scheme in Sensor Networks

Improving the Performance of Wireless Ad-hoc Networks: Accounting for the Behavior of Selfish Nodes

Secure Routing for Mobile Ad-hoc Networks

Novel Defense Scheme for Static and Dynamic Wireless Mess Network

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

An Attacker Model for MANET Routing Security

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Wireless Network Security Spring 2015

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Mobile Ad-hoc Networks (MANET)

Routing Protocols in MANETs

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks

Decoy Black-Hole Attack

Preemptive Multicast Routing in Mobile Ad-hoc Networks

The CMU Monarch Project s Wireless and Mobility Extensions to ns

Avoiding Blackhole Attacks Using CBDA Approach in MANETS

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Scheme of security in Mobile Ad Hoc Networks using Route Blacklist Limit Mechanism

Catching BlackHole Attacks in Wireless Sensor Networks

Identification and Elimination of Selfish Nodes in Adhoc Network

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

A SECURED MECHANISM TO PREVENT THE VULNERABLITIES ON DDOS ATTACK TOWARDS WIRELESS NETWORKS

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

PREVENTION OF VULNERABILITY ON DDOS ATTACKS TOWARDS WIRELESS NETWORKS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Multipath Routing Based Secure Data Transmission in Ad Hoc Networks

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Performance Analysis of Three Routing Protocols for Varying MANET Size

Malicious Node Identification Scheme for MANET using Rough Set Theory

Wormhole Attack in Wireless Ad-Hoc Networks

Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks

Hybrid Cryptography Technique For Mobile Ad-hoc Network

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Acknowledgement based Security for Manets Against DDOS attacks

Ad Hoc Routing Protocols and Issues

Design & Evaluation of Path-based Reputation System for MANET Routing

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

A Robust Trust Aware Secure Intrusion Detection for MANETs

Efficient Monitoring of Intrusion Detection in Mobile Ad-Hoc Network using Monitoring based Approach

Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Route Reliability Modelling in Mobile ad hoc Network (R2M2) model using Bayesian algorithm

Performance Evaluation of Various Routing Protocols in MANET

Wireless Network Security Spring 2016

Routing Security in Wireless Ad Hoc Networks

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks

Secure On Demand Multicast Routing Protocol for Mobile Ad-Hoc Networks

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Mitigating Malicious Control Packet Floods in Ad Hoc Networks

Webpage: Volume 4, Issue VI, June 2016 ISSN

hash chains to provide efficient secure solutions for DSDV [7].

AN ACKNOWLEDGEMENT BASED APPROACH FOR ROUTING MISBEHAVIOR DETECTION IN MANET WITH AOMDV

Wireless Network Security Spring 2016

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs

Enhanced Secure Routing Model for MANET

Transcription:

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Monty Barber 21 April 2003 CSC774 Network Security Overview Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, MobiCom 2000 Introduces two techniques that improve throughput in an ad hoc network in the presence of misbehaving nodes.

Outline Background Ad-Hoc Networks Routing in Ad-Hoc Networks Dynamic Source Routing Extensions Watchdog Pathrater Simulation Results Related Work Future Work and Conclusions Background: Ad-Hoc Networks Collection of wireless mobile devices Vulnerabilities Misbehaving Nodes Solutions Routing Issues

Background: Routing in Ad-Hoc Two categories: Table Driven Nodes maintain routing tables Broadcast updates On Demand Routes created only when needed Routes expire or removed Outline Background Ad-Hoc Networks Routing in Ad-Hoc Networks Dynamic Source Routing Extensions Watchdog Pathrater Simulation Results Related Work Future Work and Conclusions

Dynamic Source Routing On Demand routing Nodes maintain a route caches Route Discovery Phase If not found in cache, broadcast a route request packet Destination sends a route reply Route Maintenance Phase Error packets Acknowledgments Dynamic Source Routing Extensions: Watchdog Identifies misbehaving nodes Maintains a buffer of transmitted packets Monitors next hop node s transmission Increments a failure tally for the nodes

Dynamic Source Routing Extensions: Watchdog cont d Watchdog Weaknesses Ambiguous collisions Receiver collisions False misbehavior reporting Limit transmission power Collusion Partial dropping Dynamic Source Routing Extensions: Pathrater Avoids routing packets through malicious nodes Each node maintains a rating for every other node A node is assigned as a neutral rating of 0.5 The rating of nodes on all actively used path increase by 0.01 at periodic intervals of 200 ms The rating of nodes decrease 0.05 when a link break is detected High negative numbers are assigned to nodes suspected of misbehaving nodes by Watchdog

Dynamic Source Routing Extensions: Pathrater cont d It calculates a path metric by averaging the node rating in the path If there are multiple paths, the node choses the path with the highest metric It increases the throughput It gives a comparison of the overall reliability of different paths It increase the ratio of overhead transmissions to data transmission Outline Background Ad-Hoc Networks Routing in Ad-Hoc Networks Dynamic Source Routing Extensions Watchdog Pathrater Simulation Techniques Related Work Future Work and Conclusions

Simulation Scenario Assumptions Bidirectional communication Wireless interfaces that support promiscuous mode operation Setup 50 nodes in various states of mobility Created 4 different extension scenarios (WD, PR, SRR) Varied misbehaving nodes 0% to 40% Simulation Metrics Evaluation done on three metrics: Throughput: % of sent data actually received by the intended destinations Overhead: Ratio of routing-related transmission to data transmissions Watchdog False Positives: The impact when watchdog mistakes a node as misbehaving

Simulation Metrics: Throughput Best performance when all three extensions were active Pathrater isolated in one test Pathrater alone does not affect performance Simulation Metrics: Throughput

Simulation Metrics: Overhead Increased overhead Watchdog isolated in one simulation Watchdog alone adds a little overhead Simulation Metrics: Overhead

Simulation Metrics: False Detection Demonstrated how throughput is effected with the reporting of False Positives Throughput does decrease but could result in beneficial side effects: Helps determine unreliable nodes Ambiguous collisions may help increase throughput Nodes maintain a fresher route cache Outline Background Ad-Hoc Networks Routing in Ad-Hoc Networks Dynamic Source Routing Extensions Watchdog Pathrater Simulation Results Related Work Future Work and Conclusions

Related Work No significant related work before publication date in 2000. DSR, AODV, TORA, DSDV, STAR only detect if the receiver s network interface is accepting packets. Some recent related work: T. GoffNael, B. Abu-Ghazaleh, D. S. Phatak, and R. Kahvecioglu, "Preemptive Routing in Ad-Hoc Networks," presented at Seventh annual international conference on Mobile computing and networking, 2001. Y.-C. Hu, A. Perrig, and D. B. Johnson, "Adrianne: A Secure On- Demand Routing Protocol," presented at Eight Annual International Conference on Mobile Computing and Networking, Atlanta, GA, 2002. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On- Demand Secure Routing Protocol Resilient to Byzantine Failures," presented at ACM Workshop on Wireless Security, Atlanta, GA, 2002. Outline Background Ad-Hoc Networks Routing in Ad-Hoc Networks Dynamic Source Routing Extensions Watchdog Pathrater Simulation Results Related Work Future Work and Conclusions

Future Work Expand on how the threshold values could be optimized Implementation of a priori trusted relationships Detection of multiple node collusion Conclusions Ad hoc networks are vulnerable to nodes that misbehave when routing packets Simulation evaluates that the 2 techniques increases throughput by 17% in network with moderate mobility, while increase ratio of overhead to data transmission from 9% to 17% increases throughput by 27% in network with extreme mobility, while increase ratio of overhead to data transmission from 12% to 24%

Thank you. Questions