Mobile Ad-hoc Network and It’s Secure Protocols

Post on 16-Jan-2016

17 views 0 download

Tags:

description

power point presentatio

transcript

Suraj Singh

Mobile ad-hoc network and it’s secure protocols

INSTRUCTOR- YANXIAO ZHAO 

EE 626

27Th April,2015

OverviewAd-hoc networks-group of device able to communicate without aid of fixed infrastructure.

Being proposed as an extension over internet.

Lot of research done for development of routing protocols

Traditional routing protocols such TCP/IP not suitable

Problems-Security and link failure due to mobility

Two popular routing algorithms- DSR and AODV

Routing Protocols

DSR(Dynamic Source Routing).

AODV(Ad-hoc on demand Distance vector routing).

DSDV(Destination sequenced Distance Vector).

ZRP(Zero Routing protocol)

AODV Protocol

Source initiates a route request or RREQ message. Destination or intermediate nodes sends RREP message. Duplicate RREQ message are discarded. Modified AODVM-Tracks the list of connected routes to find disjoint path.

Framework For reliable routing.

Modified AODV discovers multiple node –disjoint path –source to destination.

Deploying reliable nodes in the network to achieve reliable routing Where to position the R nodes??

Strategy based randomize min cut algorithm. Probability of finding R path increases.

Security Every Device is router and use terminal at the same time, hence security becomes the main issue.

Hackers take down the network by sending malicious data by overflowing router by retransmitting data.

Existing protocols- can cope with the dynamically changing topology.

AODV Mutipath-find multiple node-disjoint path from source to destination.

Fail Safe Mode• Device that on event of failure will respond in a way that will harm no other

devices.

• Failure does not get triggered but performs at a low performance.

• Example- PC operating in Safe Mode

EXAMPLE

What if the node is malicious?

Possible scenariosMalicious router redirect traffic listening to

routing signals. Node which retransmits unnecessary to other router to

bring the network down.—Routing table poisoining Malicious router can take down the traffic along

reliable path by redundant transmission.

Routing

ONE specific case- Malicious router takes down the traffic.Zmap works by systematically contacting every possible numerical address of devices in Network.Detects malfunctioning nodes.

Routing

Packet should not wait in router. Sender should respond with low data rate.

Redundancy Redundant reliable nodes entered.

Protocol which will allow fail safe operation

After scanning once the nodes that are reliable declare them as safe nodes.

Security by routing protocols Changing Routes based on the analysis made by software such as Zmap.

In case of failure packet should not wait in the router.

Packets should be provided with few timeouts.

Changing the route path accordingly to the scan of the network.

Operate in fail safe mode ---changing performance of routing protocols.

Scan the network Scan the network with Zmap (Research for IP network) to find malicious routes.

Update the routing table according to the result of the scan.

Route without malicious network is declared un-reliable route.

The protocol will route information only through those safe nodes.

References 1) http://www.technologyreview.com/news/536116/probing-the-whole-internet-for-weak-spots/

2) Security Vulnerabilities in Ad Hoc Networks by Po-Wah Yau and Chris J. Mitchell

3) A REVIEW PAPER ON AD HOC NETWORK SECURITY karan Singh, RS yadav

Questions?