Top Banner
Security on Mobile Ad-hoc Network by Abdullah Mukhtar (Network Security Engineer)
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Abdullah Mukhtar ppt

Security on Mobile Ad-hoc Network

by

Abdullah Mukhtar(Network Security Engineer)

Page 2: Abdullah Mukhtar ppt

Outline

Introduction

Primary Goals of Security in MANET

Key management

Classification of attacks

Problems Arises in MANET

Page 3: Abdullah Mukhtar ppt

Introduction

• Mobile ad hoc networks are formed dynamically by an

autonomous system of mobile nodes that are connected

via wireless links.

• No existing fixed infrastructure or centralized administration –No base station.

• Mobile nodes are free to move randomly.

•Network topology changes frequently.

• May Operate as standalone fashion or also can be connected to the larger internet.

• Each node work as router.

• Multihop communication- node communicate with the

help of two or more node from source to destination.

Page 4: Abdullah Mukhtar ppt

Primary Goals of Security in MANET

To assure a reliable data transfer over the communication networks and to protect

the system resources a number of security services are classified in five

categories:-

Authentication:- The process of identifying an individual , usually based on a

username and password.

Confidentially:- Confidentiality aims at protecting the data from disclosure to

unauthorized person.

Non repudiation:- Integrity guarantees that a message being transferred is never

corrupted.

Network attacks against confidentiality

Packet capturing

Password attack

Port scanning

Dumpster Diving

Wiretapping

Phishing and Pharming

Page 5: Abdullah Mukhtar ppt

Integrity:- Integrity guarantees that a message being transferred is never corrupted.

Availability:- Its ensure that data ,network resources or network services are

available to legitimate user when required.

Continued…

network attack against integrity

Salami attack

trust relationship attacks

Man in the middle attack

Session hijacking attacks

network attack against availability

Denial of services attacks

Distributed denial of services attack

SYN flood attacks and ICMP flood attacks

Electrical power attacks

Server Room environment attacks

Page 6: Abdullah Mukhtar ppt

Key management

The security in networking is in many cases dependent on proper key management.

Key management consists of various services, of which each is vital for the security

of the networking systems.

Trust model:-Its must determine how much different element in the

network can trust each other.

Cryptosystem:- Public and symmetric key mechanism can be applied .

Key creation:- It must determine which parties are allowed to

generate key to themselves.

Key storage :- In adhoc network any network element may have to store

its own key and possibly key of other element as well.

Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.

Page 7: Abdullah Mukhtar ppt

Classification of attacks

Attacks on network are divided into two categories –

•Internal attack

•External attack.

In internal attacks, the adversary (attacker) wants to gain the normal access to the network

and participate the network activities, either by some malicious impersonation to get

the access to the network as a new node, or by directly compromising a current node

and using it as a basis to conduct its malicious behaviors

In external attacks, the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services.

MANETs are basically vulnerable to two different types of attacks: o active attacks o passive attacks.

Page 8: Abdullah Mukhtar ppt

Continued….

Some of the active attacks

• Black hole

• Byzantine

• Wormhole

• Spoofing attack

• Sybil

Fig1. Black hole problem

Fig 2. Wormhole attack Fig 3. Flooding attack

Page 9: Abdullah Mukhtar ppt

Problems Arises in MANET

The attacker may target the route maintenance process and advertise that an

operational link is broken.

One more problem is the attacker along an established route may drop the packet,

modify the content of packet or duplicates the packets it has already forwarded

Attack via network layer packet blasting ,in which the attacker injects a large amount

of junk packets in to the network, these packets waste a significant portion of

the network resources and introduce severe wireless channel contention and

network congestion in MANET

By attacking routing protocol the attacker can attract traffic towards certain destination

in the nodes under their control and cause the packet to be forwarded along a

route that is not optional.

The attacker can create routing loops in the network and introduce severe network

congestion and channel contention in certain areas

Page 10: Abdullah Mukhtar ppt

Continued…

Many colluding attracters may even prevent a source node from finding any route to the

destination and partition the Network.

A pair of attacker nodes may create a wormhole and shortcut the normal flows between

each other.

The attacker may advertise a route with a smaller distance metric than the actual distance

to the destination.

The existing ADHOC routing protocols such as ADHOC on Demand distance vector

(ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not

provide a trusted environment so a malicious attacker can readily become a router and

disrupt network operations by disobeying the protocol specifications.

Page 11: Abdullah Mukhtar ppt

References

1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET

Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622,

Vol. 4, Issue 5( Version 6), May 2014, pp.110-115.

2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”,

International journal of soft computing and engineering (ijsce) ISSN: 2231-2307

volume-2, issue-6, January 2013.

3. Stallings William(2000), network security essentials : applications and standards;

Pearson education

4. Stallings William (2003), cryptography and network security principles and practices;

Pearson education 3rd edition.

5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure

on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference

on advanced computing & communication technologies.

6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg

ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25,

2003.Proceedings

Page 12: Abdullah Mukhtar ppt

References continued…

7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” ,

Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-

hoc Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf

8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. “http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”.

9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in

wireless ad hoc networks” , IEEE communications magazine October 2002.

10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi,

Department of computer science and electrical engineering university of Maryland, baltimore

county.

Page 13: Abdullah Mukhtar ppt

Thank you