Secure routing in ad hoc wireless networks
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

Secure Routing in Ad Hoc Wireless Networks PowerPoint PPT Presentation


  • 102 Views
  • Uploaded on
  • Presentation posted in: General

Secure Routing in Ad Hoc Wireless Networks. 11.03.2005. Requirements of a Secure Routing Protocol. Detection of malicious nodes Guarantee of correct route discovery Confidentiality of network topology Stability against attacks. AODV. Ad-hoc On-demand Distance Vector Protocol

Download Presentation

Secure Routing in Ad Hoc Wireless Networks

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Secure routing in ad hoc wireless networks

Secure Routing in Ad Hoc Wireless Networks

11.03.2005


Requirements of a secure routing protocol

Requirements of a Secure Routing Protocol

  • Detection of malicious nodes

  • Guarantee of correct route discovery

  • Confidentiality of network topology

  • Stability against attacks


Secure routing in ad hoc wireless networks

AODV

  • Ad-hoc On-demand Distance Vector Protocol

  • Source node broadcasts RouteRequest

  • Intermediate nodes forward it

  • If node has a route to destination, it initiates RouteReply


Secure routing in ad hoc wireless networks

SAR

  • Security-aware Ad hoc Routing protocol

  • Enables different levels of security

  • Level of trust as a metric

  • Each packet is associated with a security level

  • Intermediate nodes are associated with security levels

  • Different keys for different levels of security


Secure routing in ad hoc wireless networks

SAR


Secure routing in ad hoc wireless networks

SEAD

  • Secure Efficient Ad hoc Distance vector routing protocol

  • Distance Vector Routing

    • The metric used for routing is hop-count

    • Periodic and/or triggered updates

    • DSDV (Highly Dynamic Destination-Sequenced Distance-Vector Routing) uses sequence numbers

    • DSDV-SQ (DSDV for sequence numbers)

  • Assumes upper bound for the metric used


Secure routing in ad hoc wireless networks

SEAD

  • One-Way Hash Function

    • Used for authentication

    • Generates a one-way hash chain

  • Avoids looping

  • Easily implement with slight modifications


Secure routing in ad hoc wireless networks

ARAN

  • Authenticated Routing for Ad hoc Networks routing protocol

  • Based on cryptographic certificates

  • Defeats all identified attacks on the network layer

  • Issue of certificates:

    • There exists a trusted server

    • Doesn’t specify any specific key distribution algorithm


Secure routing in ad hoc wireless networks

ARAN

  • End-to-end route authentication:

    • Ensures that the correct destination is reached by the packets

    • RouteRequest and RouteReply packets encrypted at each node


Security aware aodv protocol

Security-Aware AODV Protocol

  • RouteRequest packets only sent when data packets arrive at node for transmission

  • Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack)

AODV = Ad-hoc On-demand Distance Vector Protocol


Security aware aodv protocol1

Security-Aware AODV Protocol

  • Solutions:

    • Restrict the intermediate nodes from originating RouteReply

    • FurtherRouteRequest

AODV = Ad-hoc On-demand Distance Vector Protocol


  • Login