Vous êtes sur la page 1sur 29

WORMHOLE ATTACK UNDER MANETS & ITS DETECTION

Presented byMs. Ritika Sharma Student, M.tech III/II, Semester/Year

OUTLINE
INTRODUCTION
To the ad-hoc networks To MANETs

Routing in MANETs
Security in MANETs Simulation background

MANET using AODV ROUTING PROTOCOL


Features Mode of operation

MANET under WORMHOLE ATTACK USING AODV


Problem Statement Problem Definition Wormhole in AODV

OUTLINE
Types of Wormhole attack Types of prevention technique Technique to be Implemented in project

Contd.

PREVENTION TECHNIQUES FOR WORMHOLE IN MANETs

INTRODUCTION
To the Ad-hoc networks: 1. Characteristics

Ad-hoc is Latin and means "for this purpose". No fixed infrastructure & Dynamic changing topology. Mobile devices join/leave the network unexpectedly; they can also move freely Energy-constrained & Limited bandwidth Each node also serves as router Help to relay packets received from neighbors Interoperation with the Internet.

INTRODUCTION
2. Types of Ad-hoc networksAd-hoc Networks

Contd.

1. Mobile Ad-hoc Networks (MANETs) 2. Wireless Mesh Networks (WMNs)

3. Wireless Sensor Networks (WSNs)

INTRODUCTION
Mobile Ad-hoc networks (MANETs): 1.

Contd.

CharacteristicsHost movement & topology change is frequent.


A B A B

No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes. This forms a random topology with rapid & unpredictable changes. Routers move randomly free Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-induced

disasters, military conflicts, emergency medical situations, etc.

INTRODUCTION

Contd.

Architectural difference between a Wireless mobile network & a MANET


Backbone

Mobile nodes Access points

Wireless Mobile Network

MANET

INTRODUCTION
2. Types of MANETTypes of MANET

Contd.

1. Vehicular Ad-hoc Networks (VANETs)

2. Intelligent Vehicular Ad-hoc Networks (InVANETs)

3. Internet based Mobile Ad-hoc Networks (iMANETs)

4. Wi-max IEEE 802.16

INTRODUCTION
3. Challenges in MANET Limitations of the Wireless Network

Contd.

packet loss due to transmission errors variable capacity links frequent disconnections/partitions limited communication channel Broadcast nature of the communications

Limitations Imposed by Mobility

dynamically changing topologies/routes lack of mobility awareness by system/applications

Limitations of the Mobile Node


short battery lifetime limited capacities

INTRODUCTION
Routing in MANET: 1. Routing Protocols-

Contd.

The classification of various routing protocols that are used

in MANET is shown below-

Ad-hoc network routing protocols


Position-Based Pro-active (Table driven) Topology-Based Reactive (Source initiated on-demand)

DSDV WRP AODV DSR CGSR

LMR ABR TORA SSR

INTRODUCTION

Contd.

Proactive routing Classic routing strategies: link state, distance vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control information E.g. DSDV, WRP, TBRPF, OLSR, etc.

Reactive routing Only discover routes to destinations on-demand Consume much less bandwidth but experience substantial delay E.g. DSR, AODV, TORA, etc.

INTRODUCTION
2. Routing Algorithms-

Contd.

INTRODUCTION
Security in MANETs: 1. Security Requirements in MANETs

Contd.

Authorization and Key Management Data Confidentiality Data Integrity Non-repudiation

2. MANETs Security aspects

Routing security Data forwarding security Link layer security Key management Intrusion detection systems (IDSs)

INTRODUCTION
3. Threats: AttacksPassive attacks

Contd.

Types
Active attacks

Information disclosure

Impersonation
Modification

Fabrication
Replication

Misbehaviour

MANET USING AODV ROUTING PROTOCOL


Features: AODV maintains routing tables at the nodes, so that data

packets do not have to contain routes. In AODV, routes are maintained only between nodes which need to communicate. ROUTE REQUEST (RREQ)-When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery. Source node S floods(broadcasts) Route Request (RREQ) . Each node appends own identifier when forwarding RREQ. When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source.

MANET USING AODV ROUTING PROTOCOL Contd.


ROUTE REPLY (RREP)-When the intended destination

receives a Route Request, it replies by sending a Route Reply (RREP). Route Reply travels along the reverse path set-up when Route Request is forwarded.

Mode of operation: The following figure shows the basic route establishments

in MANETs employing AODV . - RREQ, RREP & Forward link.

MANET USING AODV ROUTING PROTOCOL Contd.


S-Source D-Destination
S B A H I C G K D N E F M L

-- Represents a node that has received RREQ for D from S

MANET USING AODV ROUTING PROTOCOL Contd.


Route Requests in AODV
Broadcasts transmission

S B A H I C

E F M D N L

J
G K

Represents transmission of RREQ

MANET USING AODV ROUTING PROTOCOL Contd.


Route Requests in AODV
Broadcasts transmission

S B A H I C

E F M D N L

J
G K

Represents transmission of RREQ

MANET USING AODV ROUTING PROTOCOL


Route Requests in AODV
S B A H I C G K D N

Contd.

E F M L

Represents links on Reverse Path

MANET USING AODV ROUTING PROTOCOL


Reverse Path Setup in AODV

Contd.

S B A H I C

E F M D N L

J
G K

Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

MANET USING AODV ROUTING PROTOCOL


Reverse Path Setup in AODV
S B A H I C G K D N

Contd.

E F M L

MANET USING AODV ROUTING PROTOCOL


Reverse Path Setup in AODV
S B A H I C G K D N

Contd.

E F M L

Node D does not forward RREQ, because node D is the intended target of the RREQ

MANET USING AODV ROUTING PROTOCOL


Forward Path Setup in AODV

Contd.

S B A H I C

E F J G M D N L

Forward links are setup when RREP travels along the reverse path. Represents a link on the forward path.

MANET UNDER WORMHOLE ATTACK USING AODV


Problem Statement: Wireless networks are particularly vulnerable to a Powerful

attack known as the wormhole attack. In our project we will develop a new trust based that prevents wormhole attacks on a wireless network. A few existing Protocols (like e.g.) detect wormhole attacks but they require highly specialized equipment not found on most wireless devices. This project aims to develop a defence against Wormhole attacks that does not require as a significant amount of specialized equipment.

Problem Definition: -

MANET UNDER WORMHOLE ATTACK IN AODV Contd.


To set up a wormhole attack, an attacker places two or more

transceivers at different locations on a wireless network as shown in figure1 as follows.


Figure- Set-up of a wormhole attack

MANET UNDER WORMHOLE ATTACK IN AODV Contd.


After setting up a wormhole, an attacker can disrupt routing

to direct packets through the wormhole using a technique known as selective forwarding[10] depicted in Figure . Selective forwarding

Wormhole in AODV: -

MANET UNDER WORMHOLE ATTACK IN AODV Contd.

In scenarios where the colluding nodes (M1,M2) are not the immediate

neighbours of the source (S) and destination (D) nodes. Wormhole creation in such a scenario is generally accomplished using the following steps: Step 1-Sustained Routes between Colluding Nodes (M1 & M2). Step 2-Fallacious Response to Source Node Route Requests . Step 3-Route Development till the Destination Node. Step 4-Deception through Gratuitous Route Replies .

DETECTION OF WORMHOLE IN MANET


Types of Wormhole attack: Wormhole using Packet Encapsulation Wormhole using High Power Transmission
Contd.

Wormhole using Packet Relay


Wormhole using Protocol Deviation

Types of Detection Technique: Link Frequency Analysis


Trust-based models

Technique to be Implemented in project: - In our


project we will implement both the techniques mentioned above .

Vous aimerez peut-être aussi