wormhole attack under manets& its detection
Post on 21-Oct-2015
40 Views
Preview:
DESCRIPTION
TRANSCRIPT
OUTLINEOUTLINE INTRODUCTION
To the ad-hoc networks To MANETs Routing in MANETs Security in MANETs Simulation background
MANET using AODV ROUTING PROTOCOL Features Mode of operation
MANET under WORMHOLE ATTACK USING AODV Problem Statement Problem Definition Wormhole in AODV
OUTLINE Contd.
PREVENTION TECHNIQUES FOR WORMHOLE IN MANETs Types of Wormhole attack Types of prevention technique Technique to be Implemented in project
INTRODUCTION To the Ad-hoc networks: -1. Characteristics- Ad-hoc is Latin and means "for this purpose". No fixed infrastructure & Dynamic changing topology.
Mobile devices join/leave the network unexpectedly; they can also move freely
Energy-constrained & Limited bandwidth Each node also serves as router
Help to relay packets received from neighbors Interoperation with the Internet.
INTRODUCTION Contd.
2. Types of Ad-hoc networks-
Ad-hoc Networks
1. Mobile Ad-hoc Networks (MANETs)
2. Wireless Mesh Networks (WMNs)
3. Wireless Sensor Networks (WSNs)
INTRODUCTION Contd. Mobile Ad-hoc networks (MANETs): -
1. Characteristics- Host movement & topology change is frequent.
No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes. This forms a random topology with rapid & unpredictable
changes. Routers move randomly free Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-
induced disasters, military conflicts, emergency medical situations, etc.
INTRODUCTION Contd. Architectural difference between a
Wireless mobile network & a MANET
v Mobile nodes
Access points
Backbone
Wireless Mobile Network
MANET
INTRODUCTION Contd.
2. Types of MANET-
Types of MANET
1. Vehicular Ad-hoc
Networks (VANETs)
2. Intelligent Vehicular Ad-hoc
Networks (InVANETs
)
3. Internet based
Mobile Ad-hoc
Networks (iMANETs)
4. Wi-maxIEEE
802.16
INTRODUCTION Contd.
3. Challenges in MANET-
Limitations of the Wireless Network packet loss due to transmission errors variable capacity links frequent disconnections/partitions limited communication channel Broadcast nature of the communications
Limitations Imposed by Mobility dynamically changing topologies/routes lack of mobility awareness by system/applications
Limitations of the Mobile Node short battery lifetime limited capacities
INTRODUCTION Contd. Routing in MANET: -
1.Routing Protocols- The classification of various routing protocols that
are used in MANET is shown below-
DSDV WRP AODV
DSR LMR ABR CGSR
TORA SSR
Ad-hoc network routing protocols
Position-BasedTopology-Based
Pro-active (Table driven)
Reactive (Source initiated on-
demand)
INTRODUCTION Contd.
Proactive routing Classic routing strategies: link state, distance
vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control
information E.g. DSDV, WRP, TBRPF, OLSR, etc.
Reactive routing Only discover routes to destinations on-
demand Consume much less bandwidth but experience
substantial delay E.g. DSR, AODV, TORA, etc.
INTRODUCTION Contd. Security in MANETs: -Security in MANETs: -1.Security Requirements in MANETs-
Authorization and Key Management Data Confidentiality Data Integrity Non-repudiation
2. MANETs Security aspects- Routing security Data forwarding security Link layer security Key management Intrusion detection systems (IDSs)
INTRODUCTION Contd.
3. Threats: -3. Threats: -Attacks-
Misbehaviour
Types
Passive attacks Active attacks
Replication
FabricationImpersonati
on
Modification
Information disclosure
MANET USING AODV ROUTING MANET USING AODV ROUTING PROTOCOLPROTOCOL
FeaturesFeatures: -: - AODV maintains routing tables at the nodes, so
that data packets do not have to contain routes. In AODV, routes are maintained only between
nodes which need to communicate. ROUTE REQUEST (RREQ)-When node S wants to
send a packet to node D, but does not know a route to D, node S initiates a route discovery.
Source node S floods(broadcasts) Route Request (RREQ) .
Each node appends own identifier when forwarding RREQ.
When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source.
MANET USING AODV ROUTING MANET USING AODV ROUTING PROTOCOLPROTOCOL
Contd. Contd. ROUTE REPLY (RREP)-When the intended
destination receives a Route Request, it replies by sending a Route Reply (RREP).
Route Reply travels along the reverse path set-up when Route Request is forwarded.
Mode of operation: -Mode of operation: - The following figure shows the basic route
establishments in MANETs employing AODV .- RREQ, RREP & Forward link.
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL
Contd.Contd.S-SourceS-Source
D-DestinationD-Destination
B
A
S E
F
H
J
D
C
G
IK
M
N
L
-- Represents a node that has received RREQ for D from S
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
B
A
S E
F
H
J
D
C
G
IK
Represents transmission of RREQ
M
N
L
Route Requests in AODVBroadcasts transmission
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
B
A
S E
F
H
J
D
C
G
IK
Represents transmission of RREQ
M
N
L
Route Requests in AODVBroadcasts transmission
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
Route Requests in AODV
B
A
S E
F
H
J
D
C
G
IK
Represents links on Reverse Path
M
N
L
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
IK
M
N
L
• Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
IK
M
N
L
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd. Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
IK
M
N
L
•Node D does not forward RREQ, because node D is the intended target of the RREQ
MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.
Forward Path Setup in AODV
B
A
S E
F
H
J
D
C
G
IK
M
N
L
Forward links are setup when RREP travels along the reverse path.
Represents a link on the forward path.
MANET UNDER WORMHOLE ATTACK USING AODV
Problem Statement: - Wireless networks are particularly vulnerable to a
Powerful attack known as the wormhole attack. In our project we will develop a new trust based
that prevents wormhole attacks on a wireless network.
A few existing Protocols (like e.g.) detect wormhole attacks but they require highly specialized equipment not found on most wireless devices.
This project aims to develop a defence against Wormhole attacks that does not require as a significant amount of specialized equipment.
MANET UNDER WORMHOLE ATTACK IN AODV Contd.
Problem Definition: - To set up a wormhole attack, an attacker places
two or more transceivers at different locations on a wireless network as shown in figure1 as follows. Figure- Set-up of a wormhole attack
MANET UNDER WORMHOLE ATTACK IN AODV Contd.
After setting up a wormhole, an attacker can disrupt routing to direct packets through the wormhole using a technique known as selective forwarding[10] depicted in Figure . Selective forwarding
MANET UNDER WORMHOLE ATTACK IN AODV Contd.
Wormhole in AODV: - In scenarios where the colluding nodes (M1,M2) are not the
immediate neighbours of the source (S) and destination (D) nodes. Wormhole creation in such a scenario is generally accomplished using the following steps: Step 1-Sustained Routes between Colluding Nodes (M1 &
M2). Step 2-Fallacious Response to Source Node Route Requests . Step 3-Route Development till the Destination Node. Step 4-Deception through Gratuitous Route Replies .
DETECTION OF WORMHOLE IN MANET
Contd. Types of Wormhole attack: - Wormhole using Packet Encapsulation Wormhole using High Power Transmission Wormhole using Packet Relay Wormhole using Protocol Deviation
Types of Detection Technique: - Link Frequency Analysis Trust-based models
Technique to be Implemented in project: - In our project we will implement both the techniques mentioned above .
top related