170 likes | 408 Views
Securing Location-based Routing. Zhou Zhi Supervisor: Dr. Yow Kin Choong. Outline. Security Issues Location-based Routing. 1. Security Issues. Physical Layer Medium Access Control Routing Key management. Routing. Attacks and Vulnerabilities Existing Solutions.
E N D
SecuringLocation-based Routing Zhou Zhi Supervisor: Dr. Yow Kin Choong
Outline • Security Issues • Location-based Routing
1. Security Issues • Physical Layer • Medium Access Control • Routing • Key management
Routing • Attacks and Vulnerabilities • Existing Solutions
Attacks&Vulnerabilities • Routing Misbehavior • Denial of Service Attack • Black hole, Routing loop, etc.
Attacks&Vulnerabilities • Two sources of threats • External attacker • Internal attacker
Existing Solutions • Ariadne, ARAN, SEAD, etc. • Authentication mechanism: MAC, signature • Watch dog, pathrater … • No solutions for location-based routing
2.Location-based Routing • Introduction • Problems • Research Objectives
Introduction • Location info is used • Limit the flooding of routing packet • No routing table is required • Enhance the scalability of routing
Location Service + Forwarding Strategy Restricted directional flooding LAR DREAM GPSR … GLS DLM … Greedy forwarding Introduction • Two building blocks
L1 L2 … Li … Ln Update Query B A Reply Introduction • Location Service • Location update • Location query
Problems • Update packet forgery, modification, blocking L1 L2 … Li … Ln M Update A
Problems • Query reply packet forgery, modification, and blocking • Location server may be compromised L1 L2 … Li … Ln Update B Reply M
Research Objectives • Guarantee location update • Achieve reliable location query • Tolerate compromised servers
Thank you Zhou Zhi 2003-02-15 zhouzhi@pmail.ntu.edu.sg