mobile ad-hoc network and it’s secure protocols
DESCRIPTION
power point presentatioTRANSCRIPT
Suraj Singh
Mobile ad-hoc network and it’s secure protocols
INSTRUCTOR- YANXIAO ZHAO
EE 626
27Th April,2015
OverviewAd-hoc networks-group of device able to communicate without aid of fixed infrastructure.
Being proposed as an extension over internet.
Lot of research done for development of routing protocols
Traditional routing protocols such TCP/IP not suitable
Problems-Security and link failure due to mobility
Two popular routing algorithms- DSR and AODV
Routing Protocols
DSR(Dynamic Source Routing).
AODV(Ad-hoc on demand Distance vector routing).
DSDV(Destination sequenced Distance Vector).
ZRP(Zero Routing protocol)
AODV Protocol
Source initiates a route request or RREQ message. Destination or intermediate nodes sends RREP message. Duplicate RREQ message are discarded. Modified AODVM-Tracks the list of connected routes to find disjoint path.
Framework For reliable routing.
Modified AODV discovers multiple node –disjoint path –source to destination.
Deploying reliable nodes in the network to achieve reliable routing Where to position the R nodes??
Strategy based randomize min cut algorithm. Probability of finding R path increases.
Security Every Device is router and use terminal at the same time, hence security becomes the main issue.
Hackers take down the network by sending malicious data by overflowing router by retransmitting data.
Existing protocols- can cope with the dynamically changing topology.
AODV Mutipath-find multiple node-disjoint path from source to destination.
Fail Safe Mode• Device that on event of failure will respond in a way that will harm no other
devices.
• Failure does not get triggered but performs at a low performance.
• Example- PC operating in Safe Mode
EXAMPLE
What if the node is malicious?
Possible scenariosMalicious router redirect traffic listening to
routing signals. Node which retransmits unnecessary to other router to
bring the network down.—Routing table poisoining Malicious router can take down the traffic along
reliable path by redundant transmission.
Routing
ONE specific case- Malicious router takes down the traffic.Zmap works by systematically contacting every possible numerical address of devices in Network.Detects malfunctioning nodes.
Routing
Packet should not wait in router. Sender should respond with low data rate.
Redundancy Redundant reliable nodes entered.
Protocol which will allow fail safe operation
After scanning once the nodes that are reliable declare them as safe nodes.
Security by routing protocols Changing Routes based on the analysis made by software such as Zmap.
In case of failure packet should not wait in the router.
Packets should be provided with few timeouts.
Changing the route path accordingly to the scan of the network.
Operate in fail safe mode ---changing performance of routing protocols.
Scan the network Scan the network with Zmap (Research for IP network) to find malicious routes.
Update the routing table according to the result of the scan.
Route without malicious network is declared un-reliable route.
The protocol will route information only through those safe nodes.
References 1) http://www.technologyreview.com/news/536116/probing-the-whole-internet-for-weak-spots/
2) Security Vulnerabilities in Ad Hoc Networks by Po-Wah Yau and Chris J. Mitchell
3) A REVIEW PAPER ON AD HOC NETWORK SECURITY karan Singh, RS yadav
Questions?