rm presentation on research paper

27
Security Issues in Mobile Ad Hoc Networks Wenjia Li and Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County

Upload: zeeshan-ahmed

Post on 24-Apr-2015

67 views

Category:

Technology


0 download

DESCRIPTION

research method presentation

TRANSCRIPT

Page 1: Rm presentation on research paper

Security Issues in Mobile Ad Hoc Networks

Wenjia Li and Anupam Joshi Department of Computer Science and Electrical

Engineering

University of Maryland, Baltimore County

Page 2: Rm presentation on research paper

Group 2 Members

Zeeshan Ahmed 11051556-003

Rashid Nawaz11051556-004

Muhammad Bilal11051556-025

Page 3: Rm presentation on research paper

IntroductionA MOBILE AD HOC NETWORK (MANET) IS A SYSTEM OF WIRELESS MOBILE NODES THAT DYNAMICALLY SELF-ORGANIZE IN ARBITRARY AND TEMPORARY NETWORK TOPOLOGIES

IN THE MOBILE AD HOC NETWORK, NODES CAN DIRECTLY COMMUNICATE WITH ALL THE OTHER NODES WITHIN THEIR RADIO RANGES; WHEREAS NODES THAT NOT IN THE DIRECT COMMUNICATION RANGE USE INTERMEDIATE NODE(S) TO COMMUNICATE WITH EACH OTHER

Page 4: Rm presentation on research paper

Current Problems

Lack of Secure Boundaries: There is not such a clear secure boundary in the mobile ad hoc network,

which can be compared with the traditional wired network. This vulnerability originates from the nature of the mobile ad hoc network: freedom to join, leave and move inside the network.

there is no need for an adversary to gain the physical access to visit the network: once the adversary is in the radio range of any other nodes in the mobile ad hoc network, it can communicate with those nodes in its radio range and thus join the network automatically.

As a result, the mobile ad hoc network does not provide the so-called secure boundary to protect the network from some potentially dangerous network accesses.

Page 5: Rm presentation on research paper

Current ProblemsTHREATS FROM COMPROMISED NODES INSIDE THE NETWORK: MOBILE NODES ARE AUTONOMOUS UNITS THAT CAN JOIN OR LEAVE THE NETWORK WITH FREEDOM, BECAUSE OF THE MOBILITY OF THE AD HOC NETWORK

A COMPROMISED NODE CAN FREQUENTLY CHANGE ITS ATTACK TARGET AND PERFORM MALICIOUS BEHAVIOR TO DIFFERENT NODE IN THE NETWORK

IT IS VERY DIFFICULT TO TRACK THE MALICIOUS BEHAVIOR PERFORMED BY A COMPROMISED NODE ESPECIALLY IN A LARGE SCALE AD HOC NETWORK.

THREATS FROM COMPROMISED NODES INSIDE THE NETWORK ARE FAR MORE DANGEROUS THAN THE ATTACKS FROM OUTSIDE THE NETWORK, AND THESE ATTACKS ARE MUCH HARDER TO DETECT BECAUSE THEY COME FROM THE COMPROMISED NODES

Page 6: Rm presentation on research paper

Current ProblemsLACK OF CENTRALIZED MANAGEMENT FACILITY:

Ad hoc networks do not have a centralized piece of management machinery such as a name server

First of all, the absence of centralized management machinery makes the detection of attacks

A very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large scale ad hoc network

Therefore, malicious failures will be more difficult to detect, especially when adversaries change their attack pattern and their attack target in different periods of time

RESTRICTED POWER SUPPLY: The first problem that may be caused by the restricted power supply

is denial-of-service attacks

Since the adversary knows that the target node is battery-restricted, either it can continuously send additional packets to the target

Page 7: Rm presentation on research paper

Literature Review In this paper, we discuss security issues and their current

solutions in the mobile ad hoc network. There are numerous security threats that disturb the development of it.

We first analyze the main vulnerabilities in the mobile ad hoc networks, then survey the current security solutions for the mobile ad hoc network.

Page 8: Rm presentation on research paper

Problem DefinitionMobile ad-hoc network have open media nature, the mobile ad hoc networks are much more prone to all kind of security risks, such as information disclosure, intrusion, or even denial of service. The security needs in the mobile ad hoc networks are much higher than those in the traditional wired networks. The problems in the

Page 9: Rm presentation on research paper

Attack Types in MANETThere are numerous kinds of attacks in the mobile ad hoc network, almost all of which can be classified as the following two types.

External Attack: External attacks, in which the attacker aims to propagate fake routing information or disturb nodes from providing services.

This type of attack can be prevented and detected by the security methods such as membership authentication or firewall

Internal Attack: Internal attacks, in which the adversary wants to gain the normal access to the network and participate the network activities,

Page 10: Rm presentation on research paper

Internal AttackMain internal attack types that emerge in the mobile ad hoc networks are as following:

Impersonation

Eavesdropping

Routing attacks

Attacks on routing protocols

Attacks on packet delivery Selfishness

Denial of service

Page 11: Rm presentation on research paper

Internal AttackImpersonation: in this attack the adversary can capture some nodes in the network and make them look like benign nodes. In this way, the compromised nodes can join the network as the normal nodes and begin to conduct the malicious behaviors such as propagate fake routing information and gain inappropriate priority to access some confidential information.

Eavesdropping: The goal of eavesdropping is to obtain some confidential information that should be kept secret during the communication. Because such data are very important to the security state of the nodes, they should be kept away from the unauthorized access.

Page 12: Rm presentation on research paper

Internal AttackRouting Attack:Attacks against routing are generally classified into two categories:

Attacks on routing protocols:

Attacks on routing protocols aim to block the propagation of the routing information to the victim

The main influences brought by the attacks against routing protocols include network partition, routing loop and route hijack

Attacks on packet delivery:

Attacks on packet forwarding try to disturb the packet delivery along a predefined path.

Denial of service:

Denial-of-service is attack in which the adversary sends out overwhelming network traffic to the victim to exhaust its battery power.

Page 13: Rm presentation on research paper

Security Schemes in MANET

security schemes that aim to handle different kinds of attack listed in the previous section are as following.

Schemes:1. Intrusion Detection Techniques

2. Cluster-based Intrusion Detection Technique

Page 14: Rm presentation on research paper

Intrusion Detection Technique

Intrusion detection system: An Intrusion Detection System (or IDS) generally detects unwanted manipulations in the systems.

every node in the mobile ad hoc networks participates in the intrusion detection and response activities by detecting signs of intrusion behavior locally and independently, which are performed by the built-in IDS agent.

Page 15: Rm presentation on research paper

Intrusion Detection TechniquesIDS Agent:

IDS agent track the possible traces of the intruderand detect anomaly in the system.

IDS Agent Components:

An IDS agent consist of the following components Local data collection module

Local detection engine

Cooperative detection engine

Intrusion response module

Page 16: Rm presentation on research paper

Intrusion Detection TechniquesIDS Components

Local data collection module:

local data collection module mainly deals with the data gathering issue in which the real time audit data come from the various sources.

Local detection engine:

Local detection engine, which examines the local data collected by the local data collection module and inspects if there is any anomaly shown in the data.

Cooperative detection engine;

Cooperative detection engine, which works with other IDS agents when there are some needs to find more evidences for some suspicious anomaly detected in some certain nodes

Intrusion response module:

Intrusion response module, which deals with the response to the intrusion when it has been confirmed.

Page 17: Rm presentation on research paper

Cluster Based Intrusion Detection Techniques

A MANET can be organized into a number of clusters in such a way that every node is a member of at least one cluster, and there will be only one node per cluster that will take care of the monitoring issue in a certain period of time, which is generally called cluster head.

It is necessary to ensure the fairness and efficiency of the cluster selection process.

Fairness:

Fairness contains two levels of meanings: the probability of every node in the cluster to be selected as the cluster head should be equal, and each node should act as the cluster node for the same amount of time.

Efficiency:

Efficiency of the process means that there should be some methods that can select a node from the cluster periodically with high efficiency.

Page 18: Rm presentation on research paper

Cluster Based Intrusion Detection Techniques

Cluster formation protocol:Cluster formation protocol consist of four states:

States: initial

Clique

Done

lost

Page 19: Rm presentation on research paper

What is Wormhole Attacks?

Attacker records packets (or bits) at one location in the network, tunnels them to another location and replays them there into the network which creates great confusion to the routing issue in mobile ad hoc network because the nodes that get the replayed packets cannot distinguish it from the genuine routing packets.

Page 20: Rm presentation on research paper

Defending Wormhole:

Packet leash as a general mechanism for detecting and, thus defending against wormhole attacks.

A leash is any information that is added to a packet designed to restrict the packet’s maximum allowed transmission distance.

There are two main leashes, which are geographical leashes and temporal leashes.

Geographical leash ensures that the recipient of the packet is within a certain distance from the sender.

Temporal leash ensures that the packet has an upper bound on its lifetime, which restricts the maximum travel distance, since the packet can travel at most at the speed-of-light.

Page 21: Rm presentation on research paper

What is Rush Attack?

Rushing attack is a new attack that results in denial-of-service.

This attack is also particularly damaging because it can be performed by a relatively weak attacker.

Page 22: Rm presentation on research paper

Defending Rush Attack:

Secure Neighbor Detection & Secure Route Delegation : Secure Neighbor Detection allows each neighbor to verify that the

other is within a given maximum transmission range.

A node A forwarding a ROUTE REQUEST determines that node B is a neighbor (that is, is within the allowable range), it signs a Route Delegation message, allowing node B to forward the ROUTE REQUEST.

When node B determines that node A is within the allowable range, it signs an Accept Delegation message.

In this way, the neighborhood relationships between nodes can be verified and guaranteed to be genuine.

Page 23: Rm presentation on research paper

Watchdog: Watchdog determines misbehavior by copying packets to be forwarded

into a buffer and monitoring the behavior of the adjacent node to these packets.

Watchdog decide if the adjacent node forwards the packets without modifications or not. If the packets that are match with the observing node’s buffer, then they are discarded; whereas packets that stay in the buffer beyond a timeout period without any successful match are flagged as having been dropped or modified.

The node responsible for forwarding the packet is then noted as being suspicious. If the number of violations becomes greater than a certain predetermined threshold, the violating node is marked as being malicious.

Page 24: Rm presentation on research paper

Pathrater: Pathrater on an individual node works to rate all of the known nodes in a

particular network with respect to their reliabilities.

Ratings are made, and updated, from a particular node’s perspective. Nodes start with a neutral rating that is modified over time based on observed reliable or unreliable behavior during packet routing.

Nodes that are observed by watchdog to have misbehaved are given an immediate rating of -100.

It should be distinguished that misbehavior is detected as packet mishandling/modification, whereas unreliable behavior is detected as link breaks.

Page 25: Rm presentation on research paper

Conclusion: Due to the mobility and open media nature, the mobile ad hoc networks are

much more prone to all kind of security risks, such as denial of service.

we briefly introduce the basic characteristics of the mobile ad hoc network. Because of the emergence of the concept pervasive computing, there is an increasing need for the network users to get connection with the world anytime at anywhere.

There are some typical and dangerous vulnerabilities in the mobile ad hoc networks, most of which are caused by the characteristics of the Manet.

we introduce the current security solutions for the mobile ad hoc networks. We start with the discussion on the security criteria in mobile ad hoc network, which acts as a guidance to the security-related research works in this area.

we talk about the main attack types that threaten the current Manet.

In the end, we discuss several security techniques that can help protect the mobile ad hoc networks from external and internal security threats.

Page 26: Rm presentation on research paper

Future Work:

There are some points that can be further explored in the future, such as some aspects of the intrusion detection techniques can get further improved and need to explore deeper in this research area.

Page 27: Rm presentation on research paper

Thank You