collaborative attacks on routing protocols in ad hoc networks

36
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India

Upload: kael

Post on 23-Feb-2016

41 views

Category:

Documents


0 download

DESCRIPTION

Collaborative Attacks on Routing Protocols in Ad hoc Networks. Neelima Gupta University of Delhi India. ATTACKS on Routing Protocols in AD-HOC NETWORKS. Black Hole Wormhole Rushing Attack Many more Attacks. Black Hole Attack:. D. RREQ. M. RREQ. RREP. RREP. S. RREQ. RREQ. RREQ. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Collaborative Attacks on Routing Protocols in Ad hoc Networks

Neelima Gupta

University of Delhi

India

Page 2: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

ATTACKS on Routing Protocols in AD-HOC NETWORKS Black Hole Wormhole Rushing Attack Many more Attacks

Page 3: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Black Hole Attack:

MRREQ

RREQ

RREPRREP

RREQ RREQ

RREQS

D

Page 4: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Worm Hole Attack: Malicious nodes eavesdrops the packets, tunnel

them to another location in the network and retransmit them at the other end.

M1

M2

SD

Page 5: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Rushing Attack

Forward ROUTE Requests more quickly than legitimate nodes can do so, increase the probability that routes that include the attacker will be discovered,

Attack against all currently proposed on-demand ad hoc network routing protocols.

Page 6: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Attacks

Informal definition:

“Collaborative attacks (CA) occur when more than one attacker synchronize their actions to disturb a target

network”

Page 7: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Different Models of Collaborative AttackCollaborative Black hole attackCollaborative Black hole and

Wormhole attackCollaborative Black hole and

Rushing Attack

Page 8: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black Hole Attack

S

M24

12

D

5

M1

3

Page 9: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

M24

1

2

D

5

M1

3RREQ

RREQ

RREQ

RREQRREQ

RREP

RREP

RREQ

Page 10: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

BH2

4

1 2

D

5

BH1

3

Collaborative Black Hole Attack (cont.)

Page 11: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

BH2

4

1 2

D

5

BH1

3

Collaborative Black Hole Attack (cont.)

Page 12: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Existing ApproachesCross Validation from neighbours

(especially Next Hop Neighbours)

will fail

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Page 13: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Dr. Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

M24

1

2

D

5

M1

3RREQ

RREQ

RREQRREQ

RREQRREQ

RREP

RREP

RREP

RREP

RREP RREP RREP

RREQ

Page 14: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

BH2

4

1 2

D

5

BH1

3

Collaborative Black Hole Attack (cont.)

Page 15: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Existing ApproachesNeighbour monitoring

M1 will escape

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Page 16: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Wormhole attack

S

WH2

c4

a1

c1

D

WH1

c3c2

BH1RREQ

RR

EQ

RREQ

RREQ RREQ

RREP

RREP

Out-of-Band Channel

a3a2

RREQ

RREP

RREP

RREP

RREQ

RREQ

RREP

RREP

Page 17: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Wormhole attack (cont.)

S

WH2

c4

a1

c1

D

WH1

c3c2

BH1

a3a2

Page 18: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Rushing Attack

S

c4

a1

c1

D

a3R1

c3c2

BH1 a2

b2

Page 19: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Rushing Attack (cont.)

S

c4

a1

c1

D

R1

c3c2

BH1RREQ

RR

EQ

RREQ

RREQ RREQ

RREP

RREP

a3

a2

RREQ

RREP

RREP

b2

RREQRREQ

RREQ

RREP

RREQ

RREPRREP

Page 20: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black hole and Rushing Attack (cont.)

S

c4

a1

c1

D

R1

c3c2

BH1

a3

a2

b2

Page 21: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Current Proposed Solutions to handle collaborative black hole attack

Collacorative Monitoring: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , A Patcha and A Mishra, Proceedings of RAWCON ’03

Recursive Validation: Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard. Prevention of Cooperative Black Hole Attack in wireless Ad-Hoc Networks, Intl Conference on wireless netwroks, 2003

Page 22: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Collaborative Black Hole Attack

S

D

M2

W

W

M1

Page 23: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Consider this scenario-

S

D

M2

W1

W

RREQ

RREP

M1

Tell W1 to monitor M1

Page 24: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Case 1: M1 itself drops packets

S

D

M2

W

W

Data

PacketsM1

Buffer of sent packets to M1

Packets are not

forwarded; M1 is

Malicious

Page 25: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Case 2: M1 forwards but does not inform watchdog to monitor M2

S

DM2

W W

Data

PacketsM1

Buffer of sent packets to M1

Overhear the packets but does not know the next hop id; increments

SUSPECT_NODE counter ->M1 is

Malicious

Does not send

SEND_DATA signal

Page 26: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Case 3: M1 forwards and informs but M2 drops..will be caught by W2

S

DM2

w1 w2

Data

PacketsM1

Buffer of sent packets to M1

Page 27: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

S

DM2

W W

M1

Buffer of sent packets to M1

Packets are not

forwarded; M2 is

Malicious

SEND_DATA signal

Page 28: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

AnalysisProblem with this appraoch

◦ Monitoring is done during data transmission => loss of data packets. The current solutions does not specify if and how the lost data is re-transmitted

Solution : Some dummy packets may be sent before sending the data packets.

Page 29: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

S

21 DM

WW

Data

Packets

M does not have a route to D, so forward to 3

(not in route)

Data Packets

3

NULL or NON-NULL Node

Neighbor List : M

Neighbor List : 3

W

Page 30: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Another Problem◦Malicious Nodes acting together can

alternately drop packets to keep their individual SUSPECT_NODE counter less than SUSPECT_THRESHOLD, each time a route is established through them.

◦Malicious nodes would not be detected.◦Data packets are permanently lost.

Page 31: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Recursive neighbor validation

DS

B3

C2

A2A1

B1

C3C1

B2

A3A4

B4

C4

B5

RREQ

RREQRREQRR

EQ

RREQRREQ RREQ

RREQ

RREQRREQ

RREQ

RREQ

RREP

RREP

Intermediate Node, IN

Next Hop Node, NHN

RR

EP

RREP

RREP

RREP

RREP

Page 32: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Current Proposed Solution to handle collaborative attack

Weichao Wang, Bharat Bhargava, Yi Lu, and Xiaoxin Wu. Defending against wormhole attacks in mobile ad hoc networks. In Wiley Journal Wireless Communications and Mobile Computing (WCMC), volume 6, pages 483 –503. Wiley, 2006.

Page 33: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Monitoring /characterizing

Defense

Classification

No anomaly

anomaly

Negligible anomaly

Attack handled

Attack

detected

Page 34: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

ChallengesTwo much of overhead in• monitoring even if no attack is present.• in isolating the malicious nodes recursively.We propose:1. Get a count of the packets received

from the destination.2. If the count is less than a threshold

then monitor.3. If a node drops more than a certain

threshold, declare it to be malicious. If more than one node drops packet, their sum is compared against the threshold. If greater, both the nodes are delcared to be malicious

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Page 35: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

NEED TO THINK DIFFERENTLY

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Page 36: Collaborative Attacks on Routing Protocols in  Ad hoc Networks

Neelima Gupta, Dept. of Computer Sc., University of Delhi

Thank You!!!