1 / 21

MOBILE AD-HOC NETWORK(MANET) SECURITY

MOBILE AD-HOC NETWORK(MANET) SECURITY. VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI. MANET . A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange information. Each node is willing to forward data to other nodes.

konala
Download Presentation

MOBILE AD-HOC NETWORK(MANET) SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI

  2. MANET • A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange information. • Each node is willing to forward data to other nodes. • Does not rely on fixed infrastructure.

  3. FEATURES • Autonomous terminal: A node may function as both host and a router. • Distributed Operations: since there is no fixed network the control and management operations are distributed among the terminals. • Multi-hop routing: packets should be delivered via one or more nodes. .

  4. Contd.. • Dynamic network topology: As the network change rapidly, the mobile nodes dynamically establish routing among themselves i.e. they form their own network • Fluctuating link capacity: One end-to-end path can be shared by several sessions. • Light-weight terminal: The MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage.

  5. PROBLEMS IN MANET: • Routing • Security and Reliability • Quality of Service • Internetworking • Power Consumption

  6. SECURITY • A major issue in Mobile ad-hoc network is “SECURITY”. • Two approaches in protecting mobile ad-hoc networks • Reactive approach: Seeks to detect security threats and react accordingly. • Proactive approach: Attempts to prevent an attacker from launching attacks through various cryptographic techniques

  7. ISSUES • Secure Multicasting • Secure routing • Privacy-aware Routing • Key management • Intrusion detection System

  8. Contd.. • Secure multicasting: Is a communication method where a single data packet can be transmitted from a sender and replicated to a set of receivers. • Secure routing: Most MANET routing protocols are vulnerable to attacks that can freeze the whole network. Need some solutions that work even if some nodes compromised.

  9. Contd.. • Privacy-aware Routing: Building routing protocols that prevent intermediate nodes from performing traffic analysis. • Schemes for minimizing size of crypto-tags( digital signatures) are needed. • Key Management • security goals in MANET are mainly achieved through trusted Certificate Authority (CA) • compromised CA can easily damage the entire network.

  10. Contd.. • Intrusion detection and response schemes: Anomaly detection is difficult in MANETs (ex: types of attacks and their source). collaborative IDS schemes are needed.

  11. GOALS • Authentication • Confidentiality • Integrity • Non-repudiation • Availability • Detection and Isolation

  12. Authentication: A node must know the identity of the peer node it is communicating with. Without authentication, an attacker could gain sensitive information and interfere with other nodes • Confidentiality: Ensurescertain information is never disclosed to unauthorized entities. • Integrity: Message being transmitted is never corrupted.

  13. Contd.. • Non-Repudiation: The sender cannot later deny sending the information and the receiver cannot deny the reception. • Availability: Nodes should be available for communication at all times. A node need continue to provide services despite attacks. E.g.: Key management service. • Detection and Isolation: Require the protocol can identify misbehaving nodes and render them unable to interfere with routing.

  14. IDS-MANET • IDS: Intrusion detection System which is used to detect and report the malicious activity in ad hoc networks. • Ex: Detecting critical nodes using IDS • Intrusion Detection System (IDS) can collect and analyze audit data for the entire network. • Critical node is a node whose failure or malicious behavior disconnects or significantly degrades the performance of the network.

  15. Contd.. • Packets may be dropped due to network congestion or because a malicious node is not faithfully executing a routing algorithm. • Researchers have proposed a number of collaborative IDS systems. • Some of the schemes are neighbor-monitoring, trust-building, and cluster-based voting schemes which are used to detect and report the malicious activity in ad hoc networks.

  16. CONCLUSION • The research on MANET security is still in its early stage. • MANET is easily vulnerable to security attacks than wired networks.

  17. REFERENCES • http://people.ece.cornell.edu/haas/wnl/Publications/cnds02.pdf • http://repositories.cdlib.org/cgi/viewcontent.cgi?article=2292&context=postprints • http://csrc.nist.gov/groups/SNS/manet/documents/Critical-Nodes-MANET.pdf

  18. QUESTIONS? • What is fabrication attack and what is the mechanism to detect whether fabrication attack occurred or not during transmission between the nodes? • An attack that generates false routing messages is called fabrication attack. Watch-dogs are used to detect the fabrication attack.

  19. 2. Two types of attacks, active attack and passive attacks are discussed in the paper for ad hoc routing protocol and also mentioned about recent research on wormhole attack. What kind of attack is this? • The mobile devices use a radio channel to send information, the malicious nodes can eavesdrop the packets, tunnel them to another location in the network, and retransmit them. This generates a false scenario that the original sender is in the neighborhood of the remote location. The tunneling procedure forms a worm hole.

  20. As you mentioned in the report, the routers are free to move randomly and organize them arbitrarily thus, the routers topology may change rapidly and unpredictably in MANET. Then, how to identify whether the node is trusted one or not? • Since there is no fixed infrastructure we cannot define whether the node is trusted or untrusted before the formation of network. For this reason we need security to prevent attacks from untrusted nodes.

  21. THANK U

More Related