manet routing protocols and wormhole attack against aodvppt
TRANSCRIPT
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
1/26
Outline Routing Protocols of MANET
Introduction To Wireless Network
Wormhole Attack against AODV Conclusions
Bibliography
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
2/26
Introduction
Mobile Ad-hoc Network (MANET) is a collection ofwireless mobile hosts without fixed network infrastructureand centralized administration
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
3/26
Introduction Communication in MANET is done via multi-hop paths.
Lots of challenges are there in this area: MANET contains
diverse resources; the line of defence is very ambiguous;Nodes operate in shared wireless medium; Networktopology changes unpredictably and very dynamically;Radio link reliability is an issue; connection breaks arepretty frequent.
Moreover, density of nodes, number of nodes and mobilityof these hosts may vary in different applications.
There is no stationary infrastructure. Each node in MANETacts a router that forwards data packets to other nodes.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
4/26
Routing Protocols of MANET PROTOCOLS:- 1. Destination-Sequenced Distance Vector
2. Temporally-Ordered Routing Algorithm
3. Dynamic Source Routing
4. Ad-Hoc on Demand Distance Vector
5. Exploring AODV
1.2 Security Attacks Against AODV
1.3 Motivation 1.4 Objectives
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
5/26
1. Destination-Sequenced Distance Vector
Destination-Sequenced Distance Vector (DSDV) is atraditional table-driven protocol for MANET.
Routes are established based on constant control trafficand they are available all the time.
Each node maintains one or more tables that contain routeinformation to other nodes in the network
The data that is broadcast by the mobile node contains itsnew sequence number, destination address, number ofhops needed to reach destination and sequence number ofthe information received for the destination.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
6/26
Temporally-Ordered Routing
Algorithm Temporally-Ordered Routing Algorithm (TORA) is made to find
routes on demand.
It tries to achieve high scalability. It creates and maintains
directed acyclic graph rooted at the destination node. It doesnt give Shortest-Path Algorithm too much of importance.
Instead it uses longer paths to avoid finding of new routes.
Route Creation, Route Maintenance and Route Erasure. In the
Route Creation phase, the query packet is flooded all over thenetwork and if routes exist, an update packet is sent back.
To simulate the protocol, size of network, rate of topologicalchange and network connectivity should be kept in mind.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
7/26
Temporally-Ordered Routing
Algorithm
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
8/26
. Dynamic Source Routing Dynamic Source Routing (DSR) is a reactive kind of protocol
which reacts on-demand. The main feature of DSR is sourcerouting in which the source always knows the complete routefrom source to destination.
It frequently uses source routing and route caching. RouteDiscovery and Route Maintenance are two main methods used inDSR. It is uncomplicated and efficient protocol. It does notdepend on timer-based activities.
In DSR, intermediate nodes do not need to preserve the
routing information. Instead the packets themselvescontain every routing decision. DSR uses a route discoveryprocess to find a route when a node in the network tries tosend a data packet to a destination for which the route isunknown.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
9/26
. Ad-Hoc on Demand Distance Vector Ad-hoc On Demand Distance Vector (AODV) is a reactive
protocol that reacts on demand. It is probably the mostwell-known protocol in MANET. It is a modification of
DSDV In networks with large number of mobile nodes AODV is
very efficient as it relies on dynamically establishing routetable entries at intermediate nodes
The main advantage of AODV is its least congested routeinstead of the shortest path.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
10/26
Security Attacks Against AODV 1.2.1 Attacks using Modification
1.2.2 Attacks using Impersonation
1.2.3 Attacks using Fabrication
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
11/26
Attacks using Fabrication Black hole attacks: A black hole is a malicious node that falsely replies
for route requests without having an active route to the destination. Itexploits the routing protocol to advertise itself as having a good and
valid path to a destination node
Gray hole attacks: A gray hole may forward all packets to certain nodesbut may drop packets coming from or destined to specific nodes. Inother type of attack, node may behave maliciously for some time butlater on it behaves absolutely normally. Sometimes, a node maycombine the behaviour of attacks discussed above
Wormhole attacks: In this type of attacks, the attacker disrupts routingby short circuiting the usual f low of routing packets. Wormhole attackcan be done with one node also. But generally, two or more attackersconnect via a link called wormhole link. They capture packets at oneend and replay them at the other end using private high speed network
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
12/26
Introduction To Wireless Network WIRELESS NETWORKS
Why Wireless Networks?
Ad-Hoc Networks
Applications of MANETs
Short comings of Mobile Ad-Hoc Networks
MANETs Routing Protocols
Classification of MANETs Routing Protocols: Ad-Hoc On Demand Distance Vector Protocol (AODV):
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
13/26
Classification of MANETs Routing
Protocols
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
14/26
Network
Wired Networks
Wireless Networks
WIRELESS NETWORKS
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
15/26
Why Wireless Networks?
a) Personal Area network
b) Local Area Network
c) Wide Area Network
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
16/26
MANET Routing Protocols Proactive routing (table driven)
-Keep track of routes to all possible destinations
- Protocols like
- Destination sequenced Distance vector (DSDV)- Wireless Routing protocol (WRP)
- Source Tree Adaptive Routing (STAR)
Reactive routing (on demand)
-Only discover routes to destinations on-demand
- Protocols like
- Dynamic Source Routing
- Adaptive On Demand Distance Vector
- Temporally Ordered Routing Algorithm
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
17/26
Routing Protocols Proactive protocols
Traditional distributed shortest-path protocols Maintain routes between every host pair at all times Based on periodic updates; High routing overhead Example: DSDV (destination sequenced distance vector)
Reactive protocols Determine route if and when needed Source initiates route discovery
Example: DSR (dynamic source routing)
Hybrid protocols Adaptive; Combination of proactive and reactive Example : ZRP (zone routing protocol)
Ad H N t k
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
18/26
Ad-Hoc Networks
Static Ad-Hoc Networks:
Mobile Ad-Hoc Networks
Characteristics of MANETs
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
19/26
Wormhole Attack against AODV WORM HOLE ATTACK IN MANET BLACK HOLE ATTACK IN MANET Other Attacks on MANET
Gray Hole Attack Flooding Attack Selfish Node Sleep Deprivation Torture Attack Jellyfish Attack
Modification Attack Misrouting Attack Impersonation Attack Routing Table Overflow Attack
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
20/26
WORM HOLE ATTACK IN MANET
This paper focuses on the wormhole attack, where two colluding nodesthat are far apart are connected by a tunnel giving an illusion that theyare neighbours
By using this additional tunnel, these nodes are able to advertise that theyhave the shortest path through them. Once this link is established, theattackers may choose each other as multipoint relays (MPRs), which then leadto an exchange of some topology control (TC) messages and data packetsthrough the wormhole tunnel. Since these MPRs forward flawed topologyinformation, it results in spreading of incorrect topology information
throughout the network In the second type of wormhole attacks the intrusions are distinguished
between a) hidden attack, where the network is unaware of the presence ofmalicious nodes and b) exposed attack, where the network is aware of thepresence of nodes but cannot identify malicious nodes among them.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
21/26
Black Hole Attack
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
22/26
Black Hole Attack MANETs face different securities threats i.e. attack
that are carried out against them to disrupt the normalperformance of the networks. These attacks arecategorized in previous chapter security issues inMANET on the basis of their nature. In these attacks,black hole attack is that kind of attack which occurs inMobile Ad-Hoc networks (MANET). This chapter
describes Black Hole attack and other attacks that arecarried out against MANETs.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
23/26
Conclusions:
MANETs require a reliable, efficient, scalable and mostimportantly, a secure protocol as they are highly insecure, self-organizing, rapidly deployed and they use dynamic routing.
AODV is prone to attacks like modification of sequence
numbers, modification of hop counts, source route tunneling,spoofing and fabrication of error messages. Although fabricationof source routes (cache poisoning) is not possible in AODV whileDSR is prone to it. Wormhole attack is a real threat against
AODV protocol in MANET. Therefore, trustworthy techniquesfor discovering and detection of wormhole attack should be
used. We should keep in mind that some solutions may not workwell in the presence of more than one malicious node, whilesome require special hardware and some solutions are veryexpensive. So, there is still a lot of room for research in this areato provide a more secured MANET.
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
24/26
Bibliography
[1] Komala CR, Srinivas Shetty, Padmashree S., Elevarasi E., Wireless Ad hocMobile Networks, National Conference on Computing Communication andTechnology, pp. 168-174, 2010
[2] Samir R. Das, Charles E. Perkins and Elizabeth M. Royer, Performance
Comparison of Two On-demand Routing Protocols for Ad Hoc Networks [3] Ramanarayana Kandikattu, and LillykuttyJacob, Secure Internet
Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hocNetworks, International Journal of Electronics, Circuits and Systems, pp. 40-45, 2007
[4] David B. Johnson, David A. Maltz and Josh Broch, DSR: The DynamicSource Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,http://www.monarch.cs.cmu.edu/
[5] Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu and JorjetaJetcheva, A Performance Comarison of Multi-hop Wireless Ad Hoc NetworkRouting Protocols, http://www.monarch.cs.cmu.edu/
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
25/26
Any Question ?
-
8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt
26/26
Thank You!