Académique Documents
Professionnel Documents
Culture Documents
OUTLINE
INTRODUCTION
To the ad-hoc networks To MANETs
Routing in MANETs
Security in MANETs Simulation background
OUTLINE
Types of Wormhole attack Types of prevention technique Technique to be Implemented in project
Contd.
INTRODUCTION
To the Ad-hoc networks: 1. Characteristics
Ad-hoc is Latin and means "for this purpose". No fixed infrastructure & Dynamic changing topology. Mobile devices join/leave the network unexpectedly; they can also move freely Energy-constrained & Limited bandwidth Each node also serves as router Help to relay packets received from neighbors Interoperation with the Internet.
INTRODUCTION
2. Types of Ad-hoc networksAd-hoc Networks
Contd.
INTRODUCTION
Mobile Ad-hoc networks (MANETs): 1.
Contd.
No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes. This forms a random topology with rapid & unpredictable changes. Routers move randomly free Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-induced
INTRODUCTION
Contd.
MANET
INTRODUCTION
2. Types of MANETTypes of MANET
Contd.
INTRODUCTION
3. Challenges in MANET Limitations of the Wireless Network
Contd.
packet loss due to transmission errors variable capacity links frequent disconnections/partitions limited communication channel Broadcast nature of the communications
INTRODUCTION
Routing in MANET: 1. Routing Protocols-
Contd.
INTRODUCTION
Contd.
Proactive routing Classic routing strategies: link state, distance vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control information E.g. DSDV, WRP, TBRPF, OLSR, etc.
Reactive routing Only discover routes to destinations on-demand Consume much less bandwidth but experience substantial delay E.g. DSR, AODV, TORA, etc.
INTRODUCTION
2. Routing Algorithms-
Contd.
INTRODUCTION
Security in MANETs: 1. Security Requirements in MANETs
Contd.
Routing security Data forwarding security Link layer security Key management Intrusion detection systems (IDSs)
INTRODUCTION
3. Threats: AttacksPassive attacks
Contd.
Types
Active attacks
Information disclosure
Impersonation
Modification
Fabrication
Replication
Misbehaviour
packets do not have to contain routes. In AODV, routes are maintained only between nodes which need to communicate. ROUTE REQUEST (RREQ)-When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery. Source node S floods(broadcasts) Route Request (RREQ) . Each node appends own identifier when forwarding RREQ. When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source.
receives a Route Request, it replies by sending a Route Reply (RREP). Route Reply travels along the reverse path set-up when Route Request is forwarded.
Mode of operation: The following figure shows the basic route establishments
S B A H I C
E F M D N L
J
G K
S B A H I C
E F M D N L
J
G K
Contd.
E F M L
Contd.
S B A H I C
E F M D N L
J
G K
Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once
Contd.
E F M L
Contd.
E F M L
Node D does not forward RREQ, because node D is the intended target of the RREQ
Contd.
S B A H I C
E F J G M D N L
Forward links are setup when RREP travels along the reverse path. Represents a link on the forward path.
attack known as the wormhole attack. In our project we will develop a new trust based that prevents wormhole attacks on a wireless network. A few existing Protocols (like e.g.) detect wormhole attacks but they require highly specialized equipment not found on most wireless devices. This project aims to develop a defence against Wormhole attacks that does not require as a significant amount of specialized equipment.
Problem Definition: -
to direct packets through the wormhole using a technique known as selective forwarding[10] depicted in Figure . Selective forwarding
Wormhole in AODV: -
In scenarios where the colluding nodes (M1,M2) are not the immediate
neighbours of the source (S) and destination (D) nodes. Wormhole creation in such a scenario is generally accomplished using the following steps: Step 1-Sustained Routes between Colluding Nodes (M1 & M2). Step 2-Fallacious Response to Source Node Route Requests . Step 3-Route Development till the Destination Node. Step 4-Deception through Gratuitous Route Replies .