Mobile ad hoc networks Various problems and some solutions

Similar documents
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Security in Mobile Ad-hoc Networks. Wormhole Attacks

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

This presentation covers Gen Z s Security capabilities.

Introduction and Statement of the Problem

A Review on Black Hole Attack in MANET

Secure Routing and Transmission Protocols for Ad Hoc Networks

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Sleep/Wake Aware Local Monitoring (SLAM)

Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark.

MANET ROUTING ATTACKS

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Detection of Malicious Nodes in Mobile Adhoc Network

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

Wireless Network Security Spring 2015

Webpage: Volume 4, Issue VI, June 2016 ISSN

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Network Security and Cryptography. 2 September Marking Scheme

Achieving Privacy in Mesh Networks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

A SIMPLE INTRODUCTION TO TOR

Detection and Prevention Mechanism against Attack for MANET Routing Protocol

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Wireless Network Security Spring 2015

Security Issues In Mobile Ad hoc Network Routing Protocols

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Enhanced Routing in Mobile Adhoc Network against Denial of Service Attack

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

Wireless Network Security Spring 2011

Network-centric Security Design for Mobile Ad Hoc Networks

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Packet Estimation with CBDS Approach to secure MANET

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-A Survey

Copyright

Wireless Network Security Spring 2016

Wireless Network Security Spring 2011

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

A Review Paper on Secure Routing Technique for MANETs

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

History of mobile ad hoc networks. Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Routing Protocols in Mobile Ad-Hoc Network

Different network topologies

A Review on Mobile Ad-hoc Networks (MANET S) with Attacks Impact

PREDICTION-BASED AUTHENTOCATION FOR MOBILE AD HOC NETWORKS SALMAN LATIF. Bachelor of Electrical Engineering

A Robust Trust Aware Secure Intrusion Detection for MANETs

AN AD HOC NETWORK is a group of nodes without requiring

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

RID IETF Draft Update

International Journal of Advance Engineering and Research Development

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review

Cryptography and Network Security Chapter 1

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Privacy Protection over Network Communication in Manet

IMPROVEMENT OF PATH IN DSR IN MANET USING AN INVERTED LIST BASED NODE ANALYSIS

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

International Journal of Advance Engineering and Research Development

Vidder PrecisionAccess

[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Formal Methods for Assuring Security of Computer Networks

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering

Sybil Attack Detection in Mobile Adhoc Network

Implementation: Detection of Blackhole Mechanism on MANET

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Performance measurement of MANET routing protocols under Blackhole security attack

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Internet Security Enhanced Security Services for S/MIME. Thomas Göttlicher

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

DDoS PREVENTION TECHNIQUE

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

A survey on AODV routing protocol for AD-HOC Network

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Transcription:

Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk

Main Focus Problems We will see what are some of the important problems in MANET Importance We will discuss their importance i.e. why do we need a solution of these problems? Solutions I will highlight some of the possible solutions to these problems. What I will not discuss is routing

Some problems Security Routing (will not discuss) Hidden terminal problem Bandwidth Power limitation corroboration of mobile devices One final point all of these problems are related to the unique art of network formation of Mobile adhoc networks (MANET)

Security Protecting data transformation in mobile adhoc networks is an important aspect to be seen. Parties within the network want their communication to be secure. At present MANET do not have any stick security policy. This could possibly lead active attackers to easily exploit or possibly disable mobile adhoc network.

Security 1 Mobile ad-hoc networks are highly dynamic i.e. topology changes and link breakage happen quite frequently. we need a security solution which is dynamic too. Any malicious or misbehaving nodes can create hostile attacks. These types of attack can seriously damage basic aspects of security, such as integrity, confidentiality and privacy of the node.

Security 2 Some of the main security requirements of MANET Certain discovery route should always be found if it exits between two nodes. Isolation misbehaving nodes misbehaving nodes should always be identified and isolated from routing location privacy protection of information about node location and network structure

Security 3 Types of attacks Passive attack Passive attack do not disturb the operation of MANET and attacker tries to steal/discover valuable information by listening to the network traffic. Active attack active attack injects arbitrary packets and tries to disrupt the network operation The main aim of such attacks is to limit the availability gain authentication or attract packets destined for other nodes.

Security 4 At present Security goal in mobile ad-hoc networks are gained through cryptographic mechanisms Example of some of the cryptographic mechanisms are public key encryption or digital signature. These mechanisms are backed by centralized key management Trusted Certificate Authority (CA) provides public key certificate to mobile nodes in order to develop mutual trust between nodes. However, Chances are any disturbance with Certificate authority can easily affect the security of the entire network.

Corroboration of mobile devices in mobile ad-hoc networks Each nodes in MANET relies on others to forward data packets to the other nodes in the network. Some of the reasons why mobile nodes in adhoc networks would prefer not to cooperate are One important thing In MANET Nodes establish ad hoc structure in one of two cases

Corroboration of mobile devices in mobile ad-hoc networks 1 Case 1 to reach those destinations that would either require a significant amount of transmission energy using single hop communication Case 2 When transmission flow is not possible without routing the traffic through other nodes. In both cases nodes spend energy without receiving any direct benefit

corroboration of mobile devices in mobile ad-hoc networks 2 If a node only considers its own short term live period then it may not choose to participate within the network. concept of introducing measure for corroboration of mobiles devices into the architecture of MANET becomes one of the important issues. Please note here I am not discussing about localization of mobile nodes for which we have number of different

corroboration of mobile devices in mobile ad-hoc networks 3 This problem is out of the focus of our project, however I have proposed two solution to tackle this issue A node can volunteer it self as an administrative node. Number of measure could be taken to identify self-fish node. Such as we may include a specific header identifies each participating nodes. Each of the nodes on the way to the destination require to remove this header before forwarding it to its next hop. In this way if any of the link found missing could be treated as a selffish nodes. You may think, this link could also be taken as broken link, then how can we differentiate in between the two. Obviously if the node is active and receiving and forwarding only those packet which are of interest to it. Could easily be identified.

Corroboration of mobile devices in mobile ad-hoc networks 4 The system could be reboot and the node could be banned from there. Second option is to make use of global positioning systems. This GPS system can force small number of mobile devices to be fixed in a small region. Through this type of strategy we can possibly track down self-fish node.

Corroboration of mobile devices in mobile ad-hoc networks 4 One benefit : GPS enables not only the use of position centric methods of addressing and routing One draw back: GPS scheme make use of extra equipments to localize various nodes to route packets across the network.

Finally I am stopping here due to time limitation. However, Have intention to cover rest of the problems and discuss their solutions, off-course if time permits. Please drop me email at humayunbakht@yahoo.co.uk You can also read some of my articles on this subject A focus on the challenges of mobile ad hoc networks at http://www.computingunplugged.com/issues/issue200408/0000 1346001.html Importance of secure routing in MANET at http://www.computingunplugged.com/issues/issue200408/0000 1327001.html Technical aspects of MANET at http://www.computingunplugged.com/issues/issue200406/0000 1310001.html

Questions time Questions?