1 / 23

Prevention Against Rushing attack in MANETs

Prevention Against Rushing attack in MANETs. Presented By : Shaveta Jain Department of Computer Science & Engineering, Maharishi Markandeshwar University, Mullana shavetajn120@gmail.com. Outline. Introduction of MANET Routing Protocols Routing Attacks Rushing Attack

blaise
Download Presentation

Prevention Against Rushing attack in MANETs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Prevention Against Rushing attack in MANETs Presented By : Shaveta Jain Department of Computer Science & Engineering, Maharishi Markandeshwar University, Mullana shavetajn120@gmail.com

  2. Outline • Introduction of MANET • Routing Protocols • Routing Attacks • Rushing Attack • Prevention Techniques • Conclusion • References

  3. Introduction • Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. • No centralized controller and infrastructure. • Allows free mobility • Node acts as host and router to assist in transmitting data to other nodes in its range. • Can be quickly and inexpensively setup • Applications: military, emergency and disaster situations.

  4. Routing Protocols • Proactive routing protocol • Table-Driven routing protocol • Reactive routing protocol • Source-Initiated On-Demand routing protocol • Forward ROUTE REQUEST packets when needed

  5. Routing attacks Classification: • External attack vs. Internal attack • Passive attack vs. Active attack

  6. Routing attacks • Attacks for routing: • Modification • Fabrication • Wormhole attack (tunneling) • Denial of service attack • Invisible node attack • The Sybil attack • Rushing attack • Non-cooperation

  7. Rushing attack • Directed against on-demand routing protocols • The attacker hurries route request packet to the next node to increase the probability of being included in a route

  8. Example of Rushing Attack

  9. Impact of Rushing attack at different position of attacker There are three different scenarios based on the position of attacker: • Rushing attacker can be at near sender • Rushing attacker can be at near destination • Rushing attacker can be at anywhere in the network

  10. 1.Rushing attacker can be at near sender

  11. 2.Rushing attacker can be at near destination

  12. 3.Rushing attacker can be at anywhere in the network

  13. Rushing attack Prevention techniques • Secure neighbor detection (SND) • Secure route discovery procedure (SRDP) • Randomized Route Request Forwarding (RRRF) • The concept of threshold

  14. 1. Secure Neighbor Detection • Neighbor Detection • Two nodes detect a bidirectional link between themselves • In Proactive routing protocol • In Reactive routing protocol • Requirements • Sender-receiver can check that the other is within the normal communication range • Node needs to hear Neighbor Request

  15. Cont… • Three-round mutual authentication protocol • S broadcasts a Neighbor Request packet • R return a Neighbor Reply packet to S • S sends a Neighbor Verification to B • Short delay timing • Within a maximum communication range sender receiver neighbor Request broadcast neighbor reply neighbor verfication

  16. 2. Secure Route Discovery • To secure any protocol using an on-demand Route Discovery protocol • Secure Neighbor Detection • Secure route delegation • Randomized ROUTE REQUEST forwarding • To limit the number of REQUESTs that traverse an attacker • The nodes that don’t have n distinct path to the source of the REQUEST • Choose a random timeout • Two addition security optimizations • Each REQUEST signed • Use location information

  17. 3. Randomized Message Forwarding • To minimize the chance that a rushing adversary can dominate all returned routes • Randomized message forwarding • Collects a number of REQUESTs • Selects a REQUEST at random to forward • The number of REQUEST packets collected • The more the better? • The algorithm by which timeouts are chosen • Topology closer • Geographically closer • Randomly

  18. 4. The concept of threshold The threshold value is used to reduce the rushing attack. In this a fixed value is used for transmission. Under this the packets will reach to the neighbor node at fixed time interval. If an attacker is present then the forwarded packet will reached before the time, in this way the neighbor node can easily identify the attacker node.

  19. Cont…. Besides these techniques there are special type of packets which is used to protect the network from rushing attack- • Route Check (RCHK) – This type of packet is used for measuring the round trip time (RTT) of the current path. • Route Verify (RVER) – This is used to verify that the measured RRT is proper used or not. • Route Failure (RFAI) – This packet notify the source node that a node has failure

  20. Conclusion We have analyzed the different prevention techniques from rushing attack. This attack is mainly against the on-demand routing protocols. In this the request packets which come after first are discarded. We have seen the impact of rushing attack at the different position of attacker node. The formation of rushing attack is also described. The various techniques have studied to prevent the rushing attack and they can reduce the chance of attack.

  21. References [1]Gagandeep,Aashima and Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review” in International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012 [2]Satyam Shrivastava, “Rushing Attack and its Prevention Techniques”, in International Journal of Application or Innovation in Engineering and Management, Volume 2, Issue 4, April 2013 [3]Chinkit Suthar and Bakul Panchal, “A Survey on Rushing Attack and Its Prevention in Mobile Ad-hoc Network”, in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014

  22. Cont…. [4]Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks”. [5] V. PALANISAMY and P.ANNADURAI, “Impact of Rushing attack on Multicast in Mobile Ad Hoc Network”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009. [6]Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols”, September 2003 [7]Gajendra Singh Chandel and Rajul Chowksi, “Effect of Rushing Attack in AODV and its Prevention Technique”, in International Journal of Computer Applications, Volume 83 – No.16, December 2013

  23. Thank you for your patience. Any questions / comments ?

More Related