mobile ad-hoc network and it’s secure protocols

16
Suraj Singh Mobile ad-hoc network and it’s secure protocols INSTRUCTOR- YANXIAO ZHAO EE 626 27 Th April,2015

Upload: ramila-shrestha

Post on 16-Jan-2016

21 views

Category:

Documents


0 download

DESCRIPTION

power point presentatio

TRANSCRIPT

Page 1: Mobile Ad-hoc Network and It’s Secure Protocols

Suraj Singh

Mobile ad-hoc network and it’s secure protocols

INSTRUCTOR- YANXIAO ZHAO 

EE 626

27Th April,2015

Page 2: Mobile Ad-hoc Network and It’s Secure Protocols

OverviewAd-hoc networks-group of device able to communicate without aid of fixed infrastructure.

Being proposed as an extension over internet.

Lot of research done for development of routing protocols

Traditional routing protocols such TCP/IP not suitable

Problems-Security and link failure due to mobility

Two popular routing algorithms- DSR and AODV

Page 3: Mobile Ad-hoc Network and It’s Secure Protocols

Routing Protocols

DSR(Dynamic Source Routing).

AODV(Ad-hoc on demand Distance vector routing).

DSDV(Destination sequenced Distance Vector).

ZRP(Zero Routing protocol)

Page 4: Mobile Ad-hoc Network and It’s Secure Protocols

AODV Protocol

Source initiates a route request or RREQ message. Destination or intermediate nodes sends RREP message. Duplicate RREQ message are discarded. Modified AODVM-Tracks the list of connected routes to find disjoint path.

Page 5: Mobile Ad-hoc Network and It’s Secure Protocols

Framework For reliable routing.

Modified AODV discovers multiple node –disjoint path –source to destination.

Deploying reliable nodes in the network to achieve reliable routing Where to position the R nodes??

Strategy based randomize min cut algorithm. Probability of finding R path increases.

Page 6: Mobile Ad-hoc Network and It’s Secure Protocols

Security Every Device is router and use terminal at the same time, hence security becomes the main issue.

Hackers take down the network by sending malicious data by overflowing router by retransmitting data.

Existing protocols- can cope with the dynamically changing topology.

AODV Mutipath-find multiple node-disjoint path from source to destination.

Page 7: Mobile Ad-hoc Network and It’s Secure Protocols

Fail Safe Mode• Device that on event of failure will respond in a way that will harm no other

devices.

• Failure does not get triggered but performs at a low performance.

• Example- PC operating in Safe Mode

Page 8: Mobile Ad-hoc Network and It’s Secure Protocols

EXAMPLE

Page 9: Mobile Ad-hoc Network and It’s Secure Protocols

What if the node is malicious?

Possible scenariosMalicious router redirect traffic listening to

routing signals. Node which retransmits unnecessary to other router to

bring the network down.—Routing table poisoining Malicious router can take down the traffic along

reliable path by redundant transmission.

Page 10: Mobile Ad-hoc Network and It’s Secure Protocols

Routing

ONE specific case- Malicious router takes down the traffic.Zmap works by systematically contacting every possible numerical address of devices in Network.Detects malfunctioning nodes.

Page 11: Mobile Ad-hoc Network and It’s Secure Protocols

Routing

Packet should not wait in router. Sender should respond with low data rate.

Page 12: Mobile Ad-hoc Network and It’s Secure Protocols

Redundancy Redundant reliable nodes entered.

Protocol which will allow fail safe operation

After scanning once the nodes that are reliable declare them as safe nodes.

Page 13: Mobile Ad-hoc Network and It’s Secure Protocols

Security by routing protocols Changing Routes based on the analysis made by software such as Zmap.

In case of failure packet should not wait in the router.

Packets should be provided with few timeouts.

Changing the route path accordingly to the scan of the network.

Operate in fail safe mode ---changing performance of routing protocols.

Page 14: Mobile Ad-hoc Network and It’s Secure Protocols

Scan the network Scan the network with Zmap (Research for IP network) to find malicious routes.

Update the routing table according to the result of the scan.

Route without malicious network is declared un-reliable route.

The protocol will route information only through those safe nodes.

Page 15: Mobile Ad-hoc Network and It’s Secure Protocols

References 1) http://www.technologyreview.com/news/536116/probing-the-whole-internet-for-weak-spots/

2) Security Vulnerabilities in Ad Hoc Networks by Po-Wah Yau and Chris J. Mitchell

3) A REVIEW PAPER ON AD HOC NETWORK SECURITY karan Singh, RS yadav

Page 16: Mobile Ad-hoc Network and It’s Secure Protocols

Questions?