Académique Documents
Professionnel Documents
Culture Documents
Security Considerations
AODV :
1
INTRODUCTION
8/1/2018
MANET
AODV
8/1/2018
Dynamic network
Multi-hop network
8/1/2018
1) Eavesdropping
8/1/2018
Reactive packet routing protocol
8/1/2018
Source address
8/1/2018
The fields in RREP are:
Source address
Destination address
Destination sequence no
Hop count
Route lifetime
7
SEQUENCE NUMBER
8/1/2018
Ensures freshness of the route
8/1/2018
Source
F
S RREQ RREQ
9
ROUTE REQUEST (RREQ)
8/1/2018
To discover a route to the destination
Utilizes the broadcast behavior of nodes
10
S ROUTE REQUEST (RREQ)
D?
8/1/2018
AODV: SECURITY CONSIDERATIONS
D?
D?
D?
D?
D? D?
11
D
ROUTE REPLY (RREP)
8/1/2018
Destination node uncast a RREP back to the source
12
8/1/2018 AODV: SECURITY CONSIDERATIONS
13
D
S
ROUTE REPLY (RREP)
S
S
S
RERR MESSAGES
8/1/2018
This message is broadcast for broken links
Generated directly by a node or passed on when
HELLO MESSAGES
Hello Message = RREP with TTL = 1
This message is used for broadcasting connectivity
information.
A node should use Hello messages only if it is part
of an active route. 14
SECURITY BASED ENHANCEMENTS
ON AODV
8/1/2018
AODV: SECURITY CONSIDERATIONS
I. Enhance Route Discovery for AODV (ERDA)
15
ENHANCE ROUTE DISCOVERY FOR
AODV (ERDA)
8/1/2018
Minimum modification to existing AODV algorithm.
Two parts:
Securing routing table update
Detecting and isolating malicious node
16
8/1/2018 AODV: SECURITY CONSIDERATIONS
17
SECURING ROUTING TABLE UPDATE
8/1/2018
Step 03: RREPs received by node S are stored in rrep_tab table.
//network is under Black hole attack and M be the malicious node with a
8/1/2018
parameter = ‘false’.
Step 02: if rt_upd parameter = ‘false’, then the information in
8/1/2018
DIGITAL SIGNATURES
host.
HASH CHAINS
To secure the hop count information (The only modifiable
information in the messages).
8/1/2018
End to end kind of technique cannot be applied to modifiable
information.
Mechanisms:
Hopcount_Limit = TTL
H_field = seed
H_function = h
8/1/2018
field to notify other nodes.
Add a flag called Do_not_consider to RREP to mark a
8/1/2018
The node sending that RREP is marked as a malicious
node.
DISADVANTAGE:
If attacker generates destination sequence number which is
less than or equal to PEAK value, the node is not detected 25
as a malicious node.
MODIFIED RELIABLE AODV (MR- AODV)
8/1/2018
In MR-AODV when a node detects a malicious node, it
8/1/2018
forwarding RREP after detection of misbehavior.
31
USING RSA KEY EXCHANGE AND ENCRYPTION
It uses R-AODV.
8/1/2018
The nodes are arranged in spanning tree topology.
The spanning tree maintains security associations only
8/1/2018
The Grayhole and Blackhole attacks are considered
as the most dangerous attacks towards adhoc
network.
38
REFERENCES
8/1/2018
1) Sisily, S and S. Sreedhar, (2013). “An Efficient AODV Protocol and
Encryption Mechanism for Security Issues in Adhoc Networks”,
International Conference on Microelectronics,