Top Banner
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, MobiCom 2000.
33

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Mar 31, 2015

Download

Documents

Hope Abbey
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Reference: “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, MobiCom 2000.

Page 2: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Overview

Introduction Node misbehavior on routing Proposed approach from the paper

Watchdog Pathrater

Simulation results Conclusion & comments

Page 3: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Ad-Hoc Network

A collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. Lack of infrastructure Distributed peer-to-peer mode of operations Multi-hop Routing

Applications Military communication Rescue missions in times of natural disasters

Page 4: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Vulnerabilities

Vulnerabilities of wireless links Changing topology Absence of infrastructure Nodes may be physically controlled by the

attacker

Page 5: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Research areas in security

Key establishment Secure routing Selfishness Intrusion Detection Secure sensor networks Lightweight cryptographic protocols

Page 6: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Node Misbehavior

Ad hoc networks maximize total network throughput by using all available nodes for routing and forwarding.

A node may misbehave by agreeing to forward the packet and then failing to do so due to overloaded, selfish, malicious or broken

Misbehaving nodes can be a significant problem

Page 7: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Contemporary Solutions

Forward packets only through nodes that share a prior trust relationship. Require key distribution Trust nodes can still be overloaded, broken or

compromised Untrusted nodes may be well behaved

Isolate the misbehaving from the network. Would add significant complexity to protocols whose

behavior must be very well defined

Page 8: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Proposed Approach

Install extra facilities in the network to detect and mitigate routing misbehavior.

Make only minimal changes to the underlying routing algorithm.

Introduce two extensions to the Dynamic Source Routing Protocol (DSR) Watchdog Pathrater

Page 9: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Definitions & Assumptions

Neighbor A node that is within wireless transmission range of

another node Neighborhood

All the nodes that are within wireless transmission range of a node

Links between the nodes are bi-directional Nodes are in promiscuous mode operation Malicious node does not work in group

Page 10: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Dynamic Source Routing (DSR)

“on-demand” Route paths are discovered at the time a source sends a

packet to a destination for which the source has no path Route Request Message Route Reply Message

Generate when the route request reach the destination Or when an intermediate node which contains in its

route cache an unexpired route to the destination Route Error

Handle link breaks

Page 11: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

DSR (Route Request)

1

2

3

5

7

6

8

4

11-2

11-3

1-3-4

1-3-4

1-3-4

1-2-5

1-3-4-6

1-3-4-7S

D

Page 12: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

DSR (Route Reply)

1

2

3

5

7

6

8

4

1-2-5-81-2-5-8 1-2-5-8

S

D

Page 13: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Two extensions on DSR

Watchdog Detects misbehaving nodes by overhearing

transmission

Pathrater Avoids routing packets through misbehavior

nodes

S A B DC

Page 14: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Watchdog

Maintain a buffer of recently sent packets Compare each overheard packet with the packet

in the buffer to see if there is a match If a packet remained for longer than timeout,

increments a failure tally for the node responsible

If the tally exceeds a threshold, the node is determined to be misbehaving and the source will be notified

Page 15: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Watchdog

Advantages Can detect misbehavior at the forwarding

level Disadvantages

Might not detect in presence of Ambiguous collisions Receiver collisions Limited transmission power Others

Page 16: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Ambiguous Collisions

The ambiguous problem prevents node A from overhearing transmission from B

S

A B

D

Page 17: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Receiver Collision

Node S can only tell this whether node A sends the packet to node B, but it cannot tell if B receives it

S

A B

D

Page 18: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Limited Transmission Power

Misbehaving node can control its transmission power to circumvent the watchdog

S

A B

D

Page 19: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Other disadvantages

False Misbehavior When nodes falsely report other nodes as

misbehaving Collusion

Multiple nodes in collusion can mount a more sophisticated attack

Partial Dropping A node can circumvent the watchdog by dropping

packets at a lower rate than the threshold

Page 20: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Pathrater

Each node maintains a rating for every other node it knows about in the network

It calculates a path metric by averaging the node ratings in the path

The metric gives a comparison of the overall reliability of different paths

If there are multiple paths to the same destination, it choose the path with the highest metric

Page 21: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Methodology

Berkeley’s Network Simulator (ns) with wireless extensions made by the CMU Monarch project

Simulate 50 nodes Moving speed: 0 - 20m/s Pause time: 0s or 60s % of compromised node: 0 – 40% in 5%

increments

Page 22: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Metrics of Evaluation

Throughput % of sent data packets actually received by the

intended destinations Overhead

Ratio of routing-related transmissions to data transmissions

False Positive Impact of watchdog false positive on network

throughput

Page 23: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Simulation

Extensions Watchdog (WD) Pathrater (PR) Route request (SRR)

4 combinations by extensions WD=ON, PR=ON, SRR=ON WD=ON, PR=ON, SRR=OFF WD=OFF, PR=ON, SRR=OFF WD=OFF, PR=OFF, SRR=OFF

Page 24: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Simulation

Each metric includes two graphs of simulation results for two separate pause times (0s, 60s)

Simulate two different node mobility patterns using 4 different pseudo-random number generator seeds

Seeds determine which nodes misbehave Plot the average of the 8 simulations

Page 25: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Network Throughput (0s pause time)

Page 26: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Network Throughput (60s pause time)

Page 27: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Routing Overhead(0s pause time)

Page 28: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Routing Overhead(60s pause time)

Page 29: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Effects of False Detection(0s pause time)

Page 30: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Effects of False Detection(60s pause time)

Page 31: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Conclusion

Ad hoc networks are vulnerable to nodes that misbehave when routing packets

Proposed two possible extensions to DSR to mitigate the effects of routing misbehavior

Simulation evaluates that the 2 techniques increases throughput by 17% in network with moderate

mobility, while increase ratio of overhead to data transmission from 9% to 17%

increases throughput by 27% in network with extreme mobility, while increase ratio of overhead to data transmission from 12% to 24%

Page 32: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Comments

Work does not mention about how the threshold value is calculated - it is one of the important factor in detecting malicious nodes.

If malicious nodes work in a group then it is difficult to identify them

Paper does not address other attacks such as Mac attack, False route request and reply messages that bring down throughput in ad-hoc network

Page 33: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

Thank you!