Secure Link State Routing for Mobile Ad Hoc Networks
|
|
|
- Philomena Dickerson
- 10 years ago
- Views:
Transcription
1 Secure Link State Routing for Mobile Ad Hoc Networks Abstract Panagiotis Papadimitratos School of Electrical and Computer Engineering Cornell University, Ithaca NY The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed here Secure Link State Routing Protocol (SLSP) provides secure proactive topology discovery, which can be multiply beneficial to the network operation. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, it is capable of adjusting its scope between local and network-wide topology discovery, and it is capable of operating in networks of frequently changing topology and membership. 1. Introduction The collaborative, self-organizing environment of the Mobile Ad Hoc Networking (MANET) technology opens the network to numerous security attacks that can actively disrupt the routing protocol and disable communication. Recently, a number of protocols have been proposed to secure the route discovery process in frequently changing MANET topologies. These protocols are designed to perform route discovery only when a source node needs to route packets to a destination; that is, they are reactive routing protocols [1-3]. Nevertheless, in many cases, proactive discovery of topology can be more efficient; e.g., in networks with low- to medium-mobility, or with high connection rates and frequent communication with a large portion of the network nodes. Furthermore, hybrid routing protocols [4], which are the middle ground, have been shown to be capable of adapting their operation to achieve the best performance under differing operational conditions through locally proactive and globally reactive operation. In this paper, we study how to provide secure proactive routing and we propose a proactive MANET protocol that secures the discovery and the distribution of link state information across mobile ad hoc domains. Our goal is to provide correct (i.e., factual), up-to-date, and authentic link state information, robust against Byzantine behavior and failures of individual nodes. The choice of a link state protocol provides such robustness, unlike distance vector protocols [5], which can Zygmunt J. Haas School of Electrical and Computer Engineering Cornell University, Ithaca NY [email protected] be significantly more affected by a single misbehaving node. Furthermore, the availability of explicit connectivity information, present in link state protocols, has additional benefits: examples include the ability of the source to determine and route simultaneously across multiple routes [6], the utilization of the local topology for efficient dissemination of data [7] or efficient propagation of control traffic [8]. Finally, a wide range of MANET instances is targeted by our design, which avoids restrictive assumptions on the underlying network trust and membership, and does not require specialized node equipment (e.g., GPS or synchronized clocks). We present here our Secure Link State Protocol (SLSP) for mobile ad hoc networks, which is robust against individual attackers. SLSP shares security goals and bears some resemblance to secure link state routing protocols proposed for the wired Internet, but, at the same time, it is tailored to the salient features of the MANET paradigm. More specifically, SLSP does rely on the requirements of the robust flooding protocol [9], that is, a central entity to distribute all keys throughout the network and the reliable flooding of link state updates throughout the entire network. SLSP does not seek to synchronize the topology maps across all nodes or to support the full exchange of link state databases [10]. Note that nodes cannot be provided with credentials to prove their authorization to advertise specific routing information [11] due to the continuously changing network connectivity and membership. Finally, the participation of nodes in routing does not stem from their possession of credentials [12], since in MANET, all nodes are expected to equally assist the network operation. First we present our assumptions and network model, followed by an overview and the definition of SLSP. Next, we discuss a number of relevant issues and conclude by describing related future work. 2. SLSP Definition The Secure Link State Protocol (SLSP) for mobile ad hoc networks is responsible for securing the discovery and distribution of link state information. The scope of SLSP may range from a secure neighborhood discovery to a network-wide secure link state protocol. SLSP nodes disseminate their link state updates and maintain topological information for the subset of network nodes within R hops, which is termed as their zone [4]. Nevertheless, SLSP is a self-contained link state discovery
2 protocol, even though it draws from, and naturally fits within, the concept of hybrid routing Assumptions and network model Each node is equipped with a public/private key pair, namely E V and D V, and with a single network interface per node within a MANET domain. 1 Key certification can be provided by a coalition of K nodes and the use of threshold cryptography [15,13], the use of local repositories of certificates provided by the network nodes [14], or a distributed instantiation of a CA [15]. Nodes are identified by their IP addresses, which may be assigned by a variety of schemes, e.g., dynamically or even randomly [16]. Although E V does not need to be tied to the node s IP address, it could be beneficial to use IP addresses derived from the nodes public keys [17]. Nodes are equipped with a one-way or hash function H [18,19] and a public key cryptosystem. Adversaries may disrupt the protocol operation by exhibiting arbitrary malicious behavior: e.g., replay, forge, corrupt link state updates, try to influence the topology view of benign nodes, or exploit the protocol to mount Denial of Service (DoS) attacks. SLSP is concerned solely with securing the topology discovery; it does not guarantee that adversaries, which complied with its operation during route discovery, would not attempt to disrupt the actual data transmission at a later time. The protection of the data transmission is a distinct problem, which we address in a different publication [6] Overview To counter adversaries, SLSP protects link state update (LSU) packets from malicious alteration, as they propagate across the network. It disallows advertisements of non-existent, fabricated links, stops nodes from masquerading their peers, strengthens the robustness of neighbor discovery, and thwarts deliberate floods of control traffic that exhausts network and node resources. To operate efficiently in the absence of a central key management, SLSP provides for each node to distribute its public key to nodes within its zone. Nodes periodically broadcast their certified key, so that the receiving nodes validate their subsequent link state updates. As the network topology changes, nodes learn the keys of nodes that move into their zone, thus keeping track of a relatively limited number of keys at every instance. SLSP defines a secure neighbor discovery that binds each node V to its Medium Access Control (MAC) address and its IP address, and allows all other nodes within transmission range to identify V unambiguously, given that they already have E V. Nodes advertise the state of their incident links by broadcasting periodically signed link state updates (LSU). SLSP 1 To support operation with multiple interfaces, one key pair should be assigned to each interface. restricts the propagation of the LSU packets to within the zone of their origin node. Receiving nodes validate the updates, suppress duplicates, and relay previously unseen updates that have not already propagated R hops. Link state information acquired from validated LSU packets is accepted only if both nodes incident on each link advertise the same state of the link Neighbor Discovery Each node commits its Medium Access Control (MAC) address and its IP address, the (MAC V, IP V ) pair, to its neighbors by broadcasting signed hello messages. Receiving nodes validate the signature and retain the information; in the case of SUCV addresses [17] the confirmation for the IP address can be done in a memory-less manner. The proposed binding of the MAC V strengthens the robustness of our scheme, by disallowing nodes from appearing as multiple ones at the data link layer, and by assisting in protection against flooding DoS attacks. To achieve these goals, we propose that the Neighbor Lookup Protocol (NLP) be an integral part of SLSP. NLP is responsible for the following tasks: (i) maintaining a mapping of MAC and IP layer addresses of the node's neighbors, (ii) identifying potential discrepancies, such as the use of multiple IP addresses by a single data-link interface, and (iii) measuring the rates at which control packets are received from each neighbor, by differentiating the traffic primarily based on MAC addresses. The measured rates of incoming control packets are provided to the routing protocol. This way, control traffic originating from nodes that selfishly or maliciously attempt to overload the network can be discarded. Basically, NLP extracts and retains the 48-bit hardware source address for each received (overheard) frame, along with the encapsulated IP address. This requires a simple modification of the device driver [18], so that the data link address is passed up to the routing protocol along with each packet. With nodes operating in promiscuous mode, the extraction of such pairs of addresses from all overheard packets leads to a significant reduction in the use of the neighbor discovery and query/reply mechanisms for medium access control address resolution. Each node updates its neighbor table by retaining both, the data-link and the network interface addresses addresses. The mappings between the two addresses are retained in the table as long as transmissions from the corresponding neighboring nodes are overheard; a lost neighbor timeout period 2 is associated with each table entry. NLP issues a notification to SLSP, according to the content of a received packet, in the event that: (i) a neighbor used an IP address different from the address currently recorded in the neighbor table, (ii) two neighbors used the same IP address (that is, a packet appears to originate from a node that may have 2 The lost neighbor timeout should be longer than the timeout periods associated with the flushing of routing information (link state, routing table entries), related to the particular neighbor.
3 "spoofed" an IP address), (iii) a node uses the same medium access control address as the detecting node (in that case, the data link address may be spoofed ). Upon reception of the notification, the routing protocol discards the packet bearing the address that violated the aforementioned policies Link State Updates Link state updates are identified by the IP address of their originator and a 32-bit sequence number, which provides an ample space of approximately four billion updates. To ensure that the LSU s propagate only within the zone of its origin, i.e., R hops away, the node selects a random number X and calculates a hash chain: X i = H i (X), i=1,...,r, H 0 (X)=X. It places X R and X 1 in the zone_radius and the hops_traversed fields of the LSU header, 3 respectively, and sets TTL equal to R-1, with R placed in the R LSU field. Finally, a signature is appended, with the header format is shown in Figure 1. Receiving nodes check if they have the public key of the originating node, unless the key is attached to the LSU (see section 2.5 below). For an LSU that has already traveled over i hops (i=r-ttl), if i is less than the radius of the originating node, the packet is not relayed unless H R-i (hops_traversed) equals zone_radius. Each relaying node sets hops_traversed equal to H(hops_traversed), decrements TTL, and rebroadcasts the LSU TYPE RLSU RESERVED ZONE_RADIUS SLSP_LSU_SEQ LSU_SIGNATURE HOPS_TRAVERSED Figure 1: LSU Header The provided information is discarded after a confirmls timeout, unless both nodes incident on a link report the same state. Finally, NLP notifications result in discarding an update relayed by a misbehaved node. The flooding of the LSU packets renders the protocol resilient against malicious failures (e.g., packet dropping, alteration, or modification of the packet s hops_traversed field). Meanwhile, the localized flooding keeps the transmission and processing overhead low. 3 Hash chains have a wide range of applications; in the MANET context, they have been used to assist in hop count authentication [19] Public Key Distribution Nodes use Public Key Distribution (PKD) packets, or attach their certified keys to LSU packets. PKD packets, shown in Figure 2, are flooded throughout the zone, or they may be distributed less frequently throughout an extended zone. The LSU-based key broadcast provides for timely acquisition of the key and thus validation of routing information to nodes that move into a new zone. It also reduces to a great extent the transmission of PKD packets, thus reducing the message complexity. On the other hand, the distribution within an extended zone can reduce the delay of validating new keys when nodes outside a zone eventually enter the zone. Key broadcasts are timed according to the network conditions and the device characteristics. For example, a node can rebroadcast its key when it detects a substantial change of the topology of its zone; that is, if at least some percentage of nodes has departed from the node's neighborhood since the last key broadcast. The certificate vouches for the public key. Additionally, the authenticity and freshness of the PKD packet are verified by a signature from the node that possesses and distributes the key. The PKD sequence number is set to the next available value, following the increasing values used for LSU packets. When the LSU-based key broadcast is used, no additional PKD signature is required. Nodes validate PKD packets only if they are not already aware of the originator's public key. Upon validation, E V and the corresponding source IP address are stored locally, along with the corresponding sequence number. 4 Each node can autonomously decide whether to validate a key broadcast or not. For example, if it communicates with a nearby destination, it might have no incentive to validate a PKD that originates from a node a large distance away. Similarly, a validation could be avoided if the node considers its topology view broad enough, or sufficient to support its communication. This could happen for a dense network or zone, when not all physically present links are necessary Protection from clogging DoS attacks In order to guarantee the responsiveness of the routing protocol, nodes maintain a priority ranking of their neighbors according to the rate of queries observed by NLP. The highest priority is assigned to the nodes generating (or relaying) requests with the lowest rate and vice versa. Quanta are allocated proportionally to the priorities and non-serviced, low-priority 4 This information is maintained in a FIFO manner. If the entire sequence is covered, a new key is generated and distributed, after the node voluntarily remains disconnected for a period equal to NLP s neighbor_lost. This temporary disconnection ensures that the possible change of the node s IP address does not cause neighbors to perceive this as a possible attack (i.e., spoofing of an IP address).
4 queries are eventually discarded. Within each class, queries are serviced in a round-robin manner TYPE RPKD RESERVED PKD_ZONE_RADIUS SLSP_LSU_SEQ PKD_SIGNATURE HOPS_TRAVERSED E V Figure 2: PKD packet Selfish or malicious nodes that broadcast requests at a very high rate are throttled back, first by their immediate neighbors and then by nodes farther from the source of potential misbehavior. On the other hand, non-malicious queries, that is, queries originating from benign nodes that regulate in a nonselfish manner the rate of their query generation, will be affected only for a period equal to the time it takes to update the priority (weight) assigned to a misbehaving neighbor. In the meantime, the round robin servicing of requests provides the assurance that benign requests will be relayed even amidst a "storm" of malicious or extraneous requests. Moreover, malicious floods of spurious PKD packets are countered by several mechanisms: (i) NLP imposes a bottleneck thanks to the lost neighbor timeout, (ii) PKD packets will not propagate more than R hops, unless they are carried farther by adversaries (e.g., when they don t update the hops_traversed field), (iii) nodes can autonomously decide whether to validate a public key or not (e.g., for an very high R), and (iv) PKD packets are also subject to restrictions imposed by the above-mentioned penalizing priority mechanism. 3. Discussion SLSP remains vulnerable to colluding attackers; two malicious nodes M 1, M 2 may be able to convince nodes in their zones of a non-existent (M 1, M 2 ) link. However, it is important that any coalition of adversaries can fabricate connectivity only among themselves. Furthermore, the use of a protocol such as SMT on top of SLSP will promptly reveal such forged links, unless the adversaries relay, i.e., tunnel data across such a virtual link. The use of public key cryptography may be a concern as well, especially for resource-constrained devices. Clearly, SLSP nodes should be able to perform public key operations. Since nodes periodically generate (sign) updates and receive (validate) updates more frequently, a cryptosystem with the properties of RSA would be preferable. Most importantly, SLSP provides for a number of ways nodes can minimize their processing while retaining the efficiency of the topology discovery. First, nodes reduce or increase their LSU broadcast period according to the network conditions. With the selection of the appropriate update strategy, a reduced rate of broadcasts does not affect the ability of nodes to maintain up-to-date connectivity information. Moreover, only a small fraction of PKD packets needs to be validated by nodes. Furthermore, the mechanisms that mitigate clogging denial of service attacks ensure that spurious traffic will not consume node resources. 4. Conclusions and future work We proposed a secure link state protocol (SLSP) for mobile ad hoc networks. SLSP is robust against individual Byzantine adversaries. Its secure neighbor discovery and the use of NLP strengthen SLSP against attacks that attempt to exhaust network and node resources. Furthermore, SLSP can operate with minimal or no interactions with a key management entity, while the credentials of only a subset of network nodes are necessary for each node to validate the connectivity information provided by its peers. The securing of the locally proactive topology discovery process by SLSP can be beneficial for MANET for a number of reasons. The security mechanisms of SLSP can adapt to a wide range of network conditions, and thus retain robustness along with efficiency. As the next step of our research, we will present a detailed performance evaluation of SLSP, both independently and as part of a hybrid framework (i.e., combine it with a secure reactive protocol), and for various network instances and node processing capabilities. References [1] B. Dahill, B.N. Levine, E. Royer, C. Shields. A Secure Routing Protocol for Ad Hoc Networks. Technical Report UM-CS , EE&CS, Univ. of Michigan, August [2] P. Papadimitratos and Z.J. Haas. "Secure Routing for Mobile Ad Hoc Networks," SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, [3] Y-C. Hu, A. Perrig, D. B. Johnson. Ariadne: A Secure On Demand Routing Protocol for Ad Hoc Networks. MobiCom 02, Sept , Atlanta, GA. [4] M.R. Pearlman and Z.J. Haas. Determining the Optimal Configuration of for the Zone Routing Protocol. IEEE JSAC, special issue on Ad-Hoc Networks, vol. 17, no.8, Aug [5] Y-C. Hu, D.B. Johnson, and A. Perrig. Secure efficient distance vector routing in mobile wireless ad hoc networks. Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02), Jun [6] P. Papadimitratos and Z.J. Haas. Secure Message Transmission for Mobile Ad Hoc Networks. Submitted for publication.
5 [7] W. Peng and X. Lu. On the reduction of broadcast redundancy in mobile ad hoc networks. Proceedings of MOBIHOC 00, Boston, MA, Aug [8] Z.J. Haas and M.R. Pearlman. The Performance of Query Control Schemes for the Zone Routing Protocol. ACM/IEEE Transactions on Networking, vol. 9, no. 4, pp , Aug [9] R. Perlman. Interconnections: Bridges and routers. Addison Wesley, Reading, MA (Aug 1997). [10] S. Murphy, et al. Retrofitting Security into Internet Infrastructure Protocols. Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX'00), [11] C. Partridge et al. FIRE: flexible Intra-AS routing environment. ACM SIGCOMM Computer Comm. Review, Vol. 30, Issue 4, Aug [12] P. Papadimitratos and Z.J. Haas, "Securing the Internet Routing Infrastructure, IEEE Communications Magazine, Vol. 40, No. 10, Oct [13] J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. IEEE ICNP 2001, Riverside, CA, Nov [14] J.P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. 2nd MobiHoc, CA, Oct [15] L. Zhou and Z.J. Haas. "Securing Ad Hoc Networks." IEEE Network Magazine, vol. 13, no.6, Nov./Dec [16] M. Hattig, Editor, Zero-conf IP Host Requirements, draft-ietfzeroconf-reqts-09.txt, IETF MANET Working Group, Aug. 31 st, [17] G. Montenegro and C. Canstellucia. SUCV Identifiers and Addresses. Draft-montenegro-sucv-02.txt, work in progress. [18] NIST, Fed. Inf. Proc. Standards. Secure Hash Standard. Pub. 180, May [19] R. Rivest. The MD5 Message-Digest Algorithm. RFC 1321, Apr [18] W. Stevens. Unix Network Programming. Prentice-Hall. [19] M. G. Zapata, N. Asokan. Securing Ad hoc Routing Protocols. 1 st ACM WiSe, Atlanta, GA, Sept. 28, 2002.
Robust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
Kaur et al., International Journal of Advanced Engineering Technology E-ISSN 0976-3945
Review Article A REVIEW ON DIFFERENT SECURE ROUTING PROTOCOLS AND SECURITY ATTACKS IN MOBILE AD HOC NETWORKS Kaur Sharndeep a, Gupta Anuj b Address for Correspondence a,b RIMT-IET, Mandi Gobindgarh, Punjab
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
A Review of Secure Ad-hoc Routing
www..org 30 A Review of Secure Ad-hoc Routing Tannu Arora 1, Deepika Arora 2 1 Computer Science, M.D.U/GIET, Sonipat, Haryana, India [email protected] 2 Computer Science, C.D.L.U, Sirsa, Haryana, India
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)
A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks
A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks João P. Vilela and João Barros Departament of Computer Science and Laboratory of Artificial Intelligence and Computer
Tema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
Securing Ad hoc Routing Protocols
Securing Ad hoc Routing Protocols Frank Kargl Stefan Schlott Andreas Klenk Alfred Geiss Michael Weber Department of Media Informatics, University of Ulm, Germany Email: [email protected]
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Routing Protocols Security in Ah Hoc Networks
Routing Protocols Security in Ah Hoc Networks Ebrahim Mohammed Louis Dargin Oakland University School of Computer Science and Engineering CSE 681 Information Security [email protected] [email protected]
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks
ISSN (Print) : 2319-594 ISSN (Online) : 2278-121 Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks Shawkat K. Guirguis 1, Ommelhana S.Saaid 2 Professor of Computer Science
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
EFS: Enhanced FACES Protocol for Secure Routing In MANET
EFS: Enhanced FACES Protocol for Secure Routing In MANET Geethu Bastian Department of Information Technology Rajagiri School of Engineering & Technology, Rajagiri Valley P O Kochi-39, India [email protected]
The International Arab Journal of Information Technology, Vol. 4, No. 1, January 2007 17 Routing Security in Open/Dynamic Mobile Ad Hoc Networks Jameela Al-Jaroodi College of Information Technology, United
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network
ISSN (Online) : 2278-1021 Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network D. Rajasekaran 1, S.Saravanan
Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review
Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review Monika M.Tech Student Department of CSE The Technological Institute of Textile & Science Bhiwani, Haryana Mukesh Kumar Assisstant Professor
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
mlab: A Mobile Ad Hoc Network Test Bed
mlab: A Mobile Ad Hoc Network Test Bed A. Karygiannis and E. Antonakakis National Institute of Standards and Technology {karygiannis, manos}@nist.gov Abstract Over the last few years, research in the area
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)
Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) Rakesh Kumar Singh Scientist-C, G.B. Pant Institute of Himalayan Environment & Development, Almora-263 643, Uttarakhand,
Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks
Acta Polytechnica Hungarica Vol. 8, No. 6, 2011 Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks Liana Khamis Qabajeh, Miss Laiha Mat Kiah Faculty of Computer Science and Information
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
SECURE DATA TRANSMISSION USING MOBILE AD-HOC NETWORK
SECURE DATA TRANSMISSION USING MOBILE AD-HOC NETWORK (S.SARANYA,MCA-II YEAR, IFET College of Engineering.) ABSTRACT: A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
