security in mobile adhoc networks

Upload: deepanshi-arora

Post on 02-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 security in mobile adhoc networks

    1/15

    Security in Mobile

    Ad Hoc Networks Thao p Le

    [email protected] of Computer Sciences,

    Wichita State University

  • 8/10/2019 security in mobile adhoc networks

    2/15

    Outline of Presentation

    Induction to MANET ( Mobile A d-HocNet work)

    Ad Hoc Networks Architecture Attacks to Ad Hoc NetworksChallenge of Ad Hoc Networks

    Security SolutionConclusion

  • 8/10/2019 security in mobile adhoc networks

    3/15

    Introduction

    Ad hoc networks are collections of mobile nodes withlinks that are made or broken in an arbitrary way. No centralized controller and infrastructure.

    Allows free mobilityNode acts as host and router to assist intransmitting data to other nodes in its range.

    Can be quickly and inexpensively setup Applications: military, emergency and disastersituations.

  • 8/10/2019 security in mobile adhoc networks

    4/15

  • 8/10/2019 security in mobile adhoc networks

    5/15

    MANETs: Advantages

    Can access information and services regardlessof geographic positionCan set up computer networks at any place andtime

  • 8/10/2019 security in mobile adhoc networks

    6/15

    Ad Hoc Networks Architecture

    Rapid setup time Ad hoc mode only needs the setting up of radionetwork interface card (NICs) in the user devices.

    Better performance possible The question of performance with ad hoc mode iscertainly doubtful.Limited network access.

    There is no distribution system with ad hoc wirelessLANs, users dont have effective access to the internetand other wired network services.

  • 8/10/2019 security in mobile adhoc networks

    7/15

    Ad Hoc Networks Architecture(cont.)

    Difficult network managementNetwork management becomes a headache withad hoc networks because of the fluidity of thenetwork topology and lack of a centralizeddevice.

  • 8/10/2019 security in mobile adhoc networks

    8/15

    Attacks to Ad Hoc Networks

    Two types of attacks target Ad Hoc network External attacks:

    MAC layer jamming Traffic analysis

    Internal attacks:Compromised host sending false routing information

    Fake authentication and authorization Traffic flooding

  • 8/10/2019 security in mobile adhoc networks

    9/15

    Challenge of Ad Hoc Networks

    Dynamic topologyMovement, node failure, etc.

    Heterogeneous and decentralized controlLimited resourcesBandwidth, processing ability, energy

    Unfriendly environmentSelfish nodes, malicious attackers

  • 8/10/2019 security in mobile adhoc networks

    10/15

    Challenge of Ad Hoc Networks(cont.)

    Authentication and accountingNo fixed membership

    Security concernOpen medium without any centralized control

    Real time servicesDynamic topology and slow routing information distribution

    Limited bandwidthCongestion is typically the norm rather than the exception.

  • 8/10/2019 security in mobile adhoc networks

    11/15

    Problems with Security Measures

    Deficiencies of intrusion prevention Increases the overhead during normal operations of

    Ad Hoc networks Restriction on power consumption and computation

    capability prevent the usage of complex encryptionalgorithms

    Flat infrastructure increases the difficulty for the keymanagement and distribution Cannot guard against internal attacks

  • 8/10/2019 security in mobile adhoc networks

    12/15

    Security Solution

    The Multi-fence Approach in Security Solution The proactive approach attempts to prevent security

    threats in the first place. The reactive approach seeks to detect threats a

    posteriori (derived by reasoning from observed facts)and react accordingly. The reactive approach is

    widely used to protect packet forwarding operations.

  • 8/10/2019 security in mobile adhoc networks

    13/15

    Security Solution (cont.)

    Ad hoc Secure Routing Source Node Routing( DSR) Distance Vector Routing (DSDV and AODV) Link State Routing: Secure Link State Routing (SLSP) Other Routing Protocols: ARAN

  • 8/10/2019 security in mobile adhoc networks

    14/15

    Conclusion

    The research on MANET security is still in its early stage. Theexisting proposals are typically attack-oriented in that they firstidentify several security threats and then enhance the existingprotocol or propose a new protocol to thwart such threats.

    Because the solutions are designed explicitly with certain attackmodels in mind, they work well in the presence of designatedattacks but may collapse under anticipated attacks. Therefore, amore ambitious goal for ad hoc network security is to develop amulti-fence security solution that is embedded into possibly

    every component in the network, resulting in in-depth protectionthat offers multiple lines of defense against many both knownand unknown security threats.

  • 8/10/2019 security in mobile adhoc networks

    15/15

    Sources[1] Cavin et al., "On the accuracy of MANET simulators," Proc. ACMWorkshop on Princ. Mobile Computing [2] K.-W. Chin, et al., "Implementation Experience with MANET RoutingProtocols," ACM SIGCOMM Computer Communications Review , Nov. 2002, pp.49-59. Available online.

    [3] Frodigh, et al, "Wireless Ad Hoc Networking: The Art of Networking without a Network," Ericsson Review , No. 4, 2000. online. [4] M. S. Corson etal., "Internet-Based Mobile Ad Hoc Networking," IEEE Internet Computing ,

    July-August 1999[5] C. Elliott and B. Heile, "Self-Organizing, Self-Healing Wireless Networks,"Proc. 2000 IEEE[6] K. Kim, "A New Mobile Environment: Mobile Ad Hoc Networks(MANET)," IEEE[7] C. Perkins and E Royer, Ad Hoc On -Demand Distance Vector Routing,2nd IEEE Wksp. Mobile Comp. Sys.and Apps., 1999