Top Banner

of 26

MANET Routing Protocols and Wormhole Attack Against AODVppt

Apr 05, 2018

Download

Documents

rathodrb
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    1/26

    Outline Routing Protocols of MANET

    Introduction To Wireless Network

    Wormhole Attack against AODV Conclusions

    Bibliography

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    2/26

    Introduction

    Mobile Ad-hoc Network (MANET) is a collection ofwireless mobile hosts without fixed network infrastructureand centralized administration

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    3/26

    Introduction Communication in MANET is done via multi-hop paths.

    Lots of challenges are there in this area: MANET contains

    diverse resources; the line of defence is very ambiguous;Nodes operate in shared wireless medium; Networktopology changes unpredictably and very dynamically;Radio link reliability is an issue; connection breaks arepretty frequent.

    Moreover, density of nodes, number of nodes and mobilityof these hosts may vary in different applications.

    There is no stationary infrastructure. Each node in MANETacts a router that forwards data packets to other nodes.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    4/26

    Routing Protocols of MANET PROTOCOLS:- 1. Destination-Sequenced Distance Vector

    2. Temporally-Ordered Routing Algorithm

    3. Dynamic Source Routing

    4. Ad-Hoc on Demand Distance Vector

    5. Exploring AODV

    1.2 Security Attacks Against AODV

    1.3 Motivation 1.4 Objectives

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    5/26

    1. Destination-Sequenced Distance Vector

    Destination-Sequenced Distance Vector (DSDV) is atraditional table-driven protocol for MANET.

    Routes are established based on constant control trafficand they are available all the time.

    Each node maintains one or more tables that contain routeinformation to other nodes in the network

    The data that is broadcast by the mobile node contains itsnew sequence number, destination address, number ofhops needed to reach destination and sequence number ofthe information received for the destination.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    6/26

    Temporally-Ordered Routing

    Algorithm Temporally-Ordered Routing Algorithm (TORA) is made to find

    routes on demand.

    It tries to achieve high scalability. It creates and maintains

    directed acyclic graph rooted at the destination node. It doesnt give Shortest-Path Algorithm too much of importance.

    Instead it uses longer paths to avoid finding of new routes.

    Route Creation, Route Maintenance and Route Erasure. In the

    Route Creation phase, the query packet is flooded all over thenetwork and if routes exist, an update packet is sent back.

    To simulate the protocol, size of network, rate of topologicalchange and network connectivity should be kept in mind.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    7/26

    Temporally-Ordered Routing

    Algorithm

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    8/26

    . Dynamic Source Routing Dynamic Source Routing (DSR) is a reactive kind of protocol

    which reacts on-demand. The main feature of DSR is sourcerouting in which the source always knows the complete routefrom source to destination.

    It frequently uses source routing and route caching. RouteDiscovery and Route Maintenance are two main methods used inDSR. It is uncomplicated and efficient protocol. It does notdepend on timer-based activities.

    In DSR, intermediate nodes do not need to preserve the

    routing information. Instead the packets themselvescontain every routing decision. DSR uses a route discoveryprocess to find a route when a node in the network tries tosend a data packet to a destination for which the route isunknown.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    9/26

    . Ad-Hoc on Demand Distance Vector Ad-hoc On Demand Distance Vector (AODV) is a reactive

    protocol that reacts on demand. It is probably the mostwell-known protocol in MANET. It is a modification of

    DSDV In networks with large number of mobile nodes AODV is

    very efficient as it relies on dynamically establishing routetable entries at intermediate nodes

    The main advantage of AODV is its least congested routeinstead of the shortest path.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    10/26

    Security Attacks Against AODV 1.2.1 Attacks using Modification

    1.2.2 Attacks using Impersonation

    1.2.3 Attacks using Fabrication

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    11/26

    Attacks using Fabrication Black hole attacks: A black hole is a malicious node that falsely replies

    for route requests without having an active route to the destination. Itexploits the routing protocol to advertise itself as having a good and

    valid path to a destination node

    Gray hole attacks: A gray hole may forward all packets to certain nodesbut may drop packets coming from or destined to specific nodes. Inother type of attack, node may behave maliciously for some time butlater on it behaves absolutely normally. Sometimes, a node maycombine the behaviour of attacks discussed above

    Wormhole attacks: In this type of attacks, the attacker disrupts routingby short circuiting the usual f low of routing packets. Wormhole attackcan be done with one node also. But generally, two or more attackersconnect via a link called wormhole link. They capture packets at oneend and replay them at the other end using private high speed network

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    12/26

    Introduction To Wireless Network WIRELESS NETWORKS

    Why Wireless Networks?

    Ad-Hoc Networks

    Applications of MANETs

    Short comings of Mobile Ad-Hoc Networks

    MANETs Routing Protocols

    Classification of MANETs Routing Protocols: Ad-Hoc On Demand Distance Vector Protocol (AODV):

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    13/26

    Classification of MANETs Routing

    Protocols

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    14/26

    Network

    Wired Networks

    Wireless Networks

    WIRELESS NETWORKS

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    15/26

    Why Wireless Networks?

    a) Personal Area network

    b) Local Area Network

    c) Wide Area Network

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    16/26

    MANET Routing Protocols Proactive routing (table driven)

    -Keep track of routes to all possible destinations

    - Protocols like

    - Destination sequenced Distance vector (DSDV)- Wireless Routing protocol (WRP)

    - Source Tree Adaptive Routing (STAR)

    Reactive routing (on demand)

    -Only discover routes to destinations on-demand

    - Protocols like

    - Dynamic Source Routing

    - Adaptive On Demand Distance Vector

    - Temporally Ordered Routing Algorithm

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    17/26

    Routing Protocols Proactive protocols

    Traditional distributed shortest-path protocols Maintain routes between every host pair at all times Based on periodic updates; High routing overhead Example: DSDV (destination sequenced distance vector)

    Reactive protocols Determine route if and when needed Source initiates route discovery

    Example: DSR (dynamic source routing)

    Hybrid protocols Adaptive; Combination of proactive and reactive Example : ZRP (zone routing protocol)

    Ad H N t k

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    18/26

    Ad-Hoc Networks

    Static Ad-Hoc Networks:

    Mobile Ad-Hoc Networks

    Characteristics of MANETs

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    19/26

    Wormhole Attack against AODV WORM HOLE ATTACK IN MANET BLACK HOLE ATTACK IN MANET Other Attacks on MANET

    Gray Hole Attack Flooding Attack Selfish Node Sleep Deprivation Torture Attack Jellyfish Attack

    Modification Attack Misrouting Attack Impersonation Attack Routing Table Overflow Attack

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    20/26

    WORM HOLE ATTACK IN MANET

    This paper focuses on the wormhole attack, where two colluding nodesthat are far apart are connected by a tunnel giving an illusion that theyare neighbours

    By using this additional tunnel, these nodes are able to advertise that theyhave the shortest path through them. Once this link is established, theattackers may choose each other as multipoint relays (MPRs), which then leadto an exchange of some topology control (TC) messages and data packetsthrough the wormhole tunnel. Since these MPRs forward flawed topologyinformation, it results in spreading of incorrect topology information

    throughout the network In the second type of wormhole attacks the intrusions are distinguished

    between a) hidden attack, where the network is unaware of the presence ofmalicious nodes and b) exposed attack, where the network is aware of thepresence of nodes but cannot identify malicious nodes among them.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    21/26

    Black Hole Attack

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    22/26

    Black Hole Attack MANETs face different securities threats i.e. attack

    that are carried out against them to disrupt the normalperformance of the networks. These attacks arecategorized in previous chapter security issues inMANET on the basis of their nature. In these attacks,black hole attack is that kind of attack which occurs inMobile Ad-Hoc networks (MANET). This chapter

    describes Black Hole attack and other attacks that arecarried out against MANETs.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    23/26

    Conclusions:

    MANETs require a reliable, efficient, scalable and mostimportantly, a secure protocol as they are highly insecure, self-organizing, rapidly deployed and they use dynamic routing.

    AODV is prone to attacks like modification of sequence

    numbers, modification of hop counts, source route tunneling,spoofing and fabrication of error messages. Although fabricationof source routes (cache poisoning) is not possible in AODV whileDSR is prone to it. Wormhole attack is a real threat against

    AODV protocol in MANET. Therefore, trustworthy techniquesfor discovering and detection of wormhole attack should be

    used. We should keep in mind that some solutions may not workwell in the presence of more than one malicious node, whilesome require special hardware and some solutions are veryexpensive. So, there is still a lot of room for research in this areato provide a more secured MANET.

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    24/26

    Bibliography

    [1] Komala CR, Srinivas Shetty, Padmashree S., Elevarasi E., Wireless Ad hocMobile Networks, National Conference on Computing Communication andTechnology, pp. 168-174, 2010

    [2] Samir R. Das, Charles E. Perkins and Elizabeth M. Royer, Performance

    Comparison of Two On-demand Routing Protocols for Ad Hoc Networks [3] Ramanarayana Kandikattu, and LillykuttyJacob, Secure Internet

    Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hocNetworks, International Journal of Electronics, Circuits and Systems, pp. 40-45, 2007

    [4] David B. Johnson, David A. Maltz and Josh Broch, DSR: The DynamicSource Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,http://www.monarch.cs.cmu.edu/

    [5] Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu and JorjetaJetcheva, A Performance Comarison of Multi-hop Wireless Ad Hoc NetworkRouting Protocols, http://www.monarch.cs.cmu.edu/

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    25/26

    Any Question ?

  • 8/2/2019 MANET Routing Protocols and Wormhole Attack Against AODVppt

    26/26

    Thank You!