ngmast- wms workshop17/09/2008, cardiff, wales, uk a simulation analysis of routing misbehaviour in...

19
NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference and Exhibition on NEXT GENERATIONS MOBILE APPLICATIONS SERVICES AND TECHNOLOGIES (NGMAST 2008) Workshop on Mobile and Wireless Security (WMS’08) Abdelaziz Babakhouya CERIST Center of Research, Algiers, Algeria. University of Béjaia, Algeria. Y. Challal and A. Bouabdallah (UTC, Heudiasyc lab., France )

Post on 18-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks

2nd International Conference and Exhibition on NEXT GENERATIONS MOBILE APPLICATIONS SERVICES

AND TECHNOLOGIES (NGMAST 2008)Workshop on Mobile and Wireless Security (WMS’08)

Abdelaziz Babakhouya CERIST Center of Research, Algiers, Algeria.

University of Béjaia, Algeria.Y. Challal and A. Bouabdallah (UTC, Heudiasyc lab.,

France )

Page 2: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

2NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Outline

Mobile Ad hoc Network (MANET) Dynamic Source Routing protocol (DSR)

Nodes misbehaviour

Simulation Results (NS-2)

Countermeasures

Conclusion

Page 3: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

3NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Mobile Ad hoc NETwork (MANET)

Definition MANET is a collection of wireless mobile nodes which may

form a temporary network, without the use of any fixed infrastructure or centralized administration

Features Multi-hop communication Dynamic topology Constrained resources No physical security

Applications Military and Rescue operations Civilian application

Page 4: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

4NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Routing in MANET

Network layer Routing: Route discovery and route maintenance Data forwarding

AS DB

Source node Destination nodeIntermediate nodes

Problem: In a malicious environment, misbehaving nodes may not cooperate.

How can they misbehave? What is the effect of nodes misbehaviour on network performance ?

Page 5: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

5NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Route discovery in DSR

11-2

11-3

1-3-4

1-3-4

1-3-4

1-2-5

1-3-4-6

1-3-4-7S

D52

1

3

4

6

7

8

Route Request (RREQ)

Page 6: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

6NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Route discovery in DSR

S

D52

1

3

4

6

7

8

Route Reply (RREP)

1-2-5-81-2-5-8 1-2-5-8

Page 7: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

7NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Packet forwarding in DSR

S

D52

1

3

4

6

7

8

Page 8: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

8NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Nodes misbehaviour

G

S1

M

S2

Cooperative node: cooperate in both route discovery and packet forwarding functions.

Selfish node : try to save their own resources (energy and bandwidth). Selfish node type 1: Disable packet forwarding

function. Selfish node type 2: Disable routing function.

Malicious node: Try to sabotage other nodes, example of Black hole attack

Other parameters: Time: start/stop time of the behaviour Target: source/destination of the behaviour Degree P: [0,1] the probability of the behaviour

Page 9: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

9NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Simulation

Objectives: What is the effect of selfish behaviour when varying the % of

misbehaving nodes? What is the effect of one malicious node when varying nodes

mobility and traffic load? Comparison between malicious behaviour and selfish

behaviour, according to the packet dropping attack strength.

Performances metrics Packet Delivery Fraction (PDF) : CBR packets received / CBR

packets sent Average End to End Delay (EED): the delay between the

sending of CBR packet by the source and its receipt by the destination.

Page 10: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

10NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Simulation in NS2

Fixed parameters Mobility: random waypoint

Pause time = 10s, max speed = 5m/s. CBR: 20 connections,

Packets size = 512 bits; packet rate = 2 packet/s Simulation time : 500 s Target of attack : all nodes Time of attack = simulation time = 500 s

Variables parameters Density number of nodes in an area of 1000m x

1000m Low density = 30 nodes High density = 60 nodes

Probability of packets dropping P:[1.0, 0.5, 0.1]

Page 11: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

11NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Selfish type 1

AS DB

RREQ packets from S to D

RREP packets from D to S

CBR packets from S to D

What is the effect on PDF when varying % of misbehaving nodes? We consider two scenarios:

Low density = 30 nodes, and high density = 60 nodes Probability of packets dropping: [ 1.0, 0.5, 0.1]

Page 12: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

12NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Simulation results of selfish type 1

Degradation of PDF when the % of misbehaving nodes increases.

Node density has a negligible influence on the PDF Reduction of the attack strength when Pi decreases.

Page 13: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

13NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Selfish type 2

AS DB

RREQ packets from S to D

RREP packets from D to S

CBR packets from S to D

Misbehaving nodes do not drop data packet What is the effect on Average EED ?

Low and high node density scenarios

Page 14: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

14NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Simulation results of selfish type 2

Negligible influence on the PDF there exists alternative routes Degradation of EED when the percentage of misbehaving nodes

increases, especially in low density (30 nodes).

Page 15: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

15NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Malicious node (black hole attack)

BA D

Forged RREP packets <S,A,M,D>

What is the impact on PDF, by varying mobility and number of CBR connections?

M

S C

Correct route

Forged route

Page 16: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

16NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Simulation results of Malicious behaviour

PDF falls to 55% when only one malicious node performs the black hole attack.

Nodes Mobility and CBR connection don’t affect the metric PDF.

Page 17: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

17NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Countermeasures

Secure routing S-AODV, SRP, ARAN, Adriane. Achieve authentication integrity and non repudiation

of the discovered route Prevent malicious nodes from being included in the discovered route.

Limitations: Do not prevent from with selfish nodes. Need of a Public Key Infrastructure (PKI) New security follows.

Detection and isolation of misbehaving nodes Watch-dog, CORE, CONFIDANT, OCEAN, SORI. Neighbours monitoring, node’s reputations and exchange

of Alarms and recommendations. False detection, need of nodes authentication

Page 18: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

18NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Conclusion

Misbehaving node is one of the major security issues of MANET

To retain from simulation results :

RREQ dropping do not affects the PDF. However, it can really affect the average EED and lead to congestion in a low density network.

One malicious node carrying a black hole attack can have the same effect as 20% to 30% of selfish nodes type 1.

Both of data and routing packets need to be secured from selfish and malicious nodes.

Page 19: NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference

NGMAST- WMS workshop 17/09/2008, Cardiff, Wales, UK

Thanks