Vous êtes sur la page 1sur 5

A Survey on Secure Ad-Hoc Network Routing

Rakesh Vanam, Department of Electrical and Computer Engineering,


Cleveland State University

Abstract: Cellular networks became more interesting when


voice communication is coupled with data
Ad-Hoc networks are networks with no fixed communication. Mesh networks are of more
infrastructure for routing. Nodes change their interest in present scenario.
position at every instant. Each mobile node
should perform the activities of server, router. Routing protocols in ad-hoc network is designed
Present work is a survey about how routing is for reliability, efficiency rather than security.
done in such a network. Security is very There are two ways of securing an ad-hoc
important issue in such fragile environment. network reactive and proactive. In ad-hoc
Routing protocol logics employed to provide network it is just a collection of nodes without
security are presented. fixed infrastructure and they move. Broadcast is
short links are made and broken.

Introduction:
Nodes are battery powered and have energy
constraints, hence routing algorithms should have
energy as its consideration. As a model ad-hoc

network can be described as state of system by


Wireless is an exciting area in everyday using finite state machine. Markov constraint is
applications point of view. It bought a paradigm used to define such state where present state is
shift in how every day applications are deployed. independent on previous state. But any way
Wifi technology allowed to realize wireless lans. nature cannot be simulated. Medium constraints
include limited bandwidth and synchrony. applied to the wireless networks. Because the
environment of wireless network is totally
Malicious nodes cannot adhere to the rules as different from that of wired network. Several
good nodes. Adversary attacks system through constraints are to be considered one such
certain nodes. It has control over such nodes. constraint is mobility, the other is energy. The
Adversary can launch attacks such as hidden mobile nodes are energy sensitive and that should
channel, wormhole, rushing attack, vary be conserved. Protocols and services are to be
transmission range, direct the transmission, designed which takes this issues into account.
replicate.
Attacker can be defined to perform following
Security cannot be experienced by user unless it is actions: capturing devices, attack network from
totally not there are reduced a lot. Access control inside, impersonate, modify, intercept data, drop
is one of the important factor in security. data. Availability and reliability are of main

Confidentiality is data cannot be received by


others unless it is intended.
concern. If the network is available and the packet
which is intended to a node does not delivered to
Ad-hoc networks are networks which don't have that node then that network is said not to be
perfect infrastructure. There should be trust reliable. Both are required for a good
between nodes because data travels through them. communication.
Then the question arises how much trust should
be there among them. Cryptography is one such Routing is of more importance in the Ad hoc
thing which is used to tackle the physical loss or networks. Routing protocols are able to provide
stealth. Since this nodes are small and if stolen the service even if some networks are not working.
attack is more difficult to defend. Hybrid networks are of more interest here, they
use both multi-hop wireless network and cellular
The problems are some what similar to that of network.
wired networks. Although solutions are available
for wired networks they cannot be directly Routing protocols that guarantee delivery even
when parts of node are compromised. Applying to
multi-hop wireless network and cellular A variant of such model is which allows
component. adversary to be able to release some malicious
nodes back into the honest world and take some
Overview of attacks: others. Adversary can be either active or passive.
Passive adversary is able to eaves drop or just
Routing in wireless network is a special case observe. Active adversary can drop packets,
where the medium is shared. As the number of spoofing, modifying, fabricating and other
nodes increased the quality of service goes down. possible options.
If the medium is accessed by somebody it cannot
be accessed by any other. Here the data is costly Attacks can be grossly categorized as denial of
to send, hence data which is really in need should service attacks and man in the middle attacks.
only be communicated. Counter measures include intrusion detection.
Man in the middle attack is where enemy takes
In wired networks the protocols are proactive, that control of two nodes and launches active threats
is even if no information is exchanged between such as wormhole, rushing, sybil. Wormhole is
the hosts, each hosts maintain the information making distance between two nodes look shorter
about all routes. In wireless networks this is an than other. Counter measures for man in the
overhead which is not acceptable. Most of the middle attack are asking for occasional signed
wireless network protocols follow a different copies form every one. Faults occur in two
approach. Host only establishes a route only if extremes one is scholastically indistinguishable
host requires to talk to other host. Host floods the and the other is dependent. Attacker mask comes
network asks for the node which it wants to in between. Flooding is a solution but it is costly.
establish a connection with. Receiver again floods It may also trigger a DOS attack.
back saying the connection is available. Once the
path is decided then by using available paths best
path is decided. Best path is decided by hop count Routing algorithms:
or node count. Node caching mechanism is used Node discovers a node and sends a packet relayed
to save the route information and share with other through other nodes. Process is a distributed
nodes when it is needed. Byzantine threat model process, everyone is involved in it. Each node is
is defined as if x be number of nodes which are helped out together to find the route. Security
effected by adversary, Once chosen they are fixed deals with x adversary tolerance. Probability that
for duration of system. protocol terminates when adv is active is same as
protocol terminates when adversary is passive. sharing common secrets.
That implies adversary has not achieved anything.
Then it is called as perfect x tolerance. When the Trust Management:
application is 75% reliable then it is called Trust management can be done by resurrecting
working. duckling, first node that sends the message is
considered as its owner. Key authority is made
Routing algorithms are of two kinds one is decentralized. At least t+1 nodes out of n nodes
network centric and the other is source centric. should give key.
Network centric routing is distributed, every one
has a role. For example DSDV, AODV. Source Watchdog application is employed for the node to
centric is source does all the work. Security point watch next node about its action and do action
of view this is better. There is no delegation in according to its observation. Against sybil attacks
this type of routing. secure multi casting, secure aggregation of data
will work.
DSR (Dynamic source routing): If a node needs to
discover a route, node sends a message called SEAD :
'route request'. Every node in between when sees It is a routing protocol used in which a table is
the first route message, looks whether it has a maintained by each node. Table contains address,
route, caches to record and in future it does not node count and destination. This information is
need to look for that. When requested for a route broadcast is done by each node. Every node
node replies with a message called as 'route reply'. update itself by using this information. A
Maintenance is achieved by detecting local sequence number is also used which prevents it
neighbor by periodically pinging. If it is not from infinite looping. Hash chains which are
available then a 'route error' message is send and irreversible are used for making the request and
route is propagated through other nodes. reply authentic.

Protection or security mechanism if not in place Ariadne:


then that will lead to many attacks. Any attacker Shared secrets between nodes are used. Digital
can fabricate, modify messages. These attacks are signatures are maintained between nodes so that
common . more security can be achieved. This is based on
DSR, dynamic source routing. Authenticity of
Security Mechanisms: Route Request is done by message authentication.
Two types of security mechanisms are available Route reply is done through legitimate nodes.
symmetric key cryptography and public key Message authentication code (MAC) is computed
cryptography. Latter is cheaper than later. For with key that is shared between two nodes. By
authentication of nodes digital signatures are using shared key target is guaranteed of
used. Each node is given a secret key and also list authentication. Reputation based system employs
of all public keys of all others. Link messages that the technique of copying the node activities.
are signed by node. In malicious environment if
there are cheaters they do not follow rules. Conclusion:
Malicious nodes may start sharing their keys and Basics of ad-hoc network are studied and routing
one node can present itself as number of nodes. protocols employed for routing in ad-hoc
This type of attack is known as Sybil attack. networks are explained. Security in ad-hoc
network is a challenging issue. To avoid failure of
Problems in detecting malicious behavior is such networks, secure routing protocols are
mainly related to authorization. The authorizing studied.
node may be malicious or not. This raise a new
problem. The problem can be mitigated by
References: University Carnegie Mellon University
Rice University yihchun@cs.cmu.edu
1. Routing in Vehicular Ad Hoc Networks: perrig@cmu.edu dbj@cs.rice.edu .
A Survey Fan Li and Yu Wang, 9. An efficient secure distributed
University of North Carolina at anonymous routing protocol for mobile
Charlotte IEEE VEHICULAR and wireless ad hoc networks
TECHNOLOGY MAGAZINE | JUNE Azzedine Boukerchea,b, Khalil El-
2007 Khatiba, Li Xua, Larry Korbab
2. A Survey of Existing Approaches for 10. An Intrusion Detection Tool for AODV-
Secure Ad Hoc Routing and Their based Ad hoc Wireless Networks
Applicability to VANETS Version 1.1 Giovanni Vigna Sumit Gwalani Kavitha
June 2, 2006 Emanuel Fonseca and Srinivasan Elizabeth M. Belding-Royer
Andreas Festag Richard A. Kemmerer
3. A survey of routing attacks in mobile 11. Anonymous Secure Routing in Mobile
ad hoc networks Bounpadith Ad-Hoc Networks Bo Zhu, Zhiguo
Kannhavong, Hidehisa Nakayama, Wan, Mohan S. Kankanhalli, Feng
Yoshiaki Nemoto, and Nei Kato, Bao, Robert H. Deng
Tohoku University Aabbas Jamalipour, 12. How to Misuse AODV: A Case Study
University of Sydney . of Insider Attacks against Mobile Ad-
4. A Survey of Secure Wireless Ad Hoc hoc Routing Protocols Peng Ning and
Routing YIH-CHUN H U University of Kun Sun Computer Science
5. California, Berkeley ADRIAN PERRIG Department, North Carolina State
Carnegie Mellon University , 2004 University .
IEEE I IEEE SECURITY & PRIVACY . 13. The Dynamic Source Routing Protocol
6. Secure Routing for Mobile Ad Hoc (DSR) for Mobile Ad Hoc Networks for
Networks Patroklos G.Argyroudis an Ipv4.
Donal O’Mahony, University of Dublin, 14. Towards Provable Security for Ad Hoc
Trinity college . Routing Protocols Levente Buttyan
7. Wikipedia. and Istvan Vajda .
8. Rushing Attacks and Defense in 15. SDAR: A Secure Distributed
Wireless Ad Hoc Network Routing Anonymous Routing Protocol for
Protocols Yih-Chun Hu Adrian Perrig Wireless and Mobile Ad Hoc Networks
David B. Johnson Carnegie Mellon Azzedine Boukerche, Khalil El-Khatib,
Li Xu, Larry Korba.

Vous aimerez peut-être aussi