SlideShare una empresa de Scribd logo
1 de 41
Routing Security in Ad Hoc
         Wireless Networks
            Presented by

            J.Jaffer Basha
            M.Elanthendral

           II Year – CSE
Sree Sowdambika College of Engineering
           Aruppukottai
Wireless Networks


   Wireless networks provide rapid, access to
    information and computing,      limiting the
    barriers of distance, time, and location for
    many applications ranging from collaborative,
    distributed mobile computing to disaster
    recovery
Ad Hoc Wireless Networks

   Collection of wireless mobile hosts forming a
    temporary network

   Every device has the role of router and actively
    participates in data forwarding.

   Communication between two nodes can be
    performed directly if the destination is within the
    sender’s   transmission    range,    or    through
    intermediate nodes acting as routers if the
    destination is outside sender’s transmission
    range.
Characteristics of
        Ad Hoc Wireless Networks
   Characteristics which differentiate Ad Hoc
    wireless networks from other networks are:
       Dynamic Network Topology
       Distributed Operations
       Limited Energy Resources
Routing

   Routing is an important operation for data
    exchange between wireless devices.

   Main routing responsibilities are exchanging the
    routing information, finding a feasible path
    between source and destination.
Routing Protocol
   The major requirements of a routing protocol are
       Minimum route acquisition delay
       Quick route reconfiguration in case of path breaks
       Loop-Free routing
       Distributed routing protocol
       Low control overhead
       Scalability with network size
       QoS support as demanded by the application
       Support of time sensitive traffic
       Security and Privacy.
Routing Protocols in Ad Hoc
                Wireless Networks
   The design of routing protocols should take these
    factors into consideration.

   Based on the routing information update mechanism,
    routing protocols in ad hoc wireless networks can be
    classified as

       Proactive (or table-driven) protocols
       Reactive (or on-demand) protocols
       Hybrid routing protocols.
Proactive Routing Protocols

   Nodes exchange routing information periodically
    to maintain accurate routing information.

   The path can be computed rapidly based on the
    updated information available in the routing
    table.

   The algorithm used is DSDV.
DSDV

   Finds shortest paths between nodes using Bellman-Ford
    algorithm.

   Each node maintains a routing table

   For each entry, the following fields are maintained:

       the destination address
       next hop on the shortest path to that destination
       a destination sequence number
DSDV

   Sequence     numbers    are  used   for
    preventing loop formation.
   Each entry in the routing table has a
    sequence number.
   If a node receives an update with a
    smaller sequence number, then that
    update is ignored.
   Path is adopted if it has a greater
    sequence number, or if it has the same
    sequence number but a lower metric.
DSDV

     Destination   Next   Metric   Seq. Nr   Install Time
          A         A       0      A-550       001000
          B         B       1      B-102       001200
          C         B       3       C-588      001200
          D         B       4      D-312       001200


   When a broken link is detected, the node
    creates a routing update with next odd
    sequence number and metric value of
    infinity.
Reactive Routing Protocol
   A route discovery mechanism is initiated only when a
    node does not know a path to a destination it wants
    to communicate with.

   Perform better with significantly lower overheads
    than proactive routing protocols

   Has two main operations
       Route discovery
       Route maintenance

   Various reactive protocols have been proposed
       Ad Hoc On-demand Distance Vector (AODV)
       Dynamic Source Routing (DSR)
DSR
   Is a source routing protocol, each data packet
    carries the source-destination path in its
    header.

   Using this information, intermediate nodes can
    determine who is the next hop this packet
    should be forwarded to.

   Every entry has an expiration time after which
    the entry is deleted in order to avoid stale
    information.
   Each Route Request contains sequence number
    generated by source node, to prevent loop
    formation.

   An intermediate node checks the sequence
    number, and forwards the Route Request only if
    this message is not a duplicate.

   Receiving the Route Reply, the sender starts
    sending data to the receiver.
   If a node detects a failure, it sends a Route
    Error message to the source.

   All routes that contain this hop are truncated.

   If the source does not have an alternative path
    to the destination, it has to re-initiate the path
    discovery mechanism.
   DSR has several optimization techniques.

       Know a path to the destination to reply to
        the Route Request message instead of
        forwarding the request.

       Path discovery can use an expanding ring
        search mechanism when sending the Route
        Request messages in close destinations, thus
        avoiding broadcasting in the whole network.
Hybrid Routing Protocols
    Some routing protocols are hybrid          of
     proactive and reactive mechanisms.

     examples of hybrid routing protocols:
       Zone Routing Protocol (ZRP)
       Core Extraction Distributed Ad Hoc Routing
        Protocol (CEDAR)
Zone Routing Protocol (ZRP)
   The network is divided in zones .
   The intra-zone routing protocol is a proactive
    routing protocol, the inter-zone routing protocol is
    a reactive routing protocol.
   When a node transmit data to a destination within
    the same zone, then this is done using the
    proactive routing protocol.
   If the destination is in another zone, then the
    source node border casts the Route Request until it
    reaches the destination zone.
   Node of the destination zone sends then back a
    Route Reply message.
   If a broken link is detected, the path reconstruction
    can be done locally
Security Attacks on
             Routing Protocol

   Secure system can be achieved by preventing
    attacks or by detecting them and providing a
    mechanism to recover for those attacks.

   Attacks on ad hoc wireless networks can be
    classified as
      Active attacks

      Passive attacks
Passive Attacks


   Intruder snoops the data exchanged without
    altering it.

   The goal of the attacker is to obtain information
    that is being transmitted.

   These attackers are difficult to detect, since the
    network is not disrupted

   Powerful encryption mechanism can alleviate
    these attackers.
Active Attack

   Attacker actively   participates   in   disrupting
    network services.

   Attack by modifying packets or by introducing
    false information in the ad hoc network.

   Confuses routing procedures and degrades
    network performance. Active attacks can be
    divided into
      Internal Attack
      External Attack
Internal Attack


   From compromised nodes that       were   once
    legitimate part of the network.

   Since they are part of the network, they are
    much more severe and difficult to detect when
    compared to external attacks.
External Attack

   Carried by nodes that are not legitimate part of
    the network.

   Such attacks can be defended by using
    encryption, firewalls and source authentication.
Attacks using Impersonation

   An intruder consume another node resources or
    to disturb normal network operation.

   An attacker node achieves impersonation by
    misrepresenting its identity.

   This can be done by changing its own IP or MAC
    address to that of some other legitimate node.

   Some strong authentication procedures can be
    used to stop attacks by impersonation.
Impersonation
        Man-in-the-Middle Attack
   The attacker can impersonate the receiver with
    respect to the sender, and the sender with
    respect to the receiver.

   without having either of them realize that they
    have been attacked.
Attacks using Modification
   This attack disrupts the routing function by
    having the attacker illegally modifying the
    content of the messages.

   Misrouting Attack: A non-legitimate node
    sends data packet to the wrong destination.

   Detour Attack: The traffic is diverted to other
    routes that appear to be shorter and might
    contain malicious nodes which could create
    other attacks.

   Blackmail Attack: Causes false identification
    of a good node as malicious node.
Attacks using Fabrication

   An intruder generates false routing messages,
    such as routing updates and route error
    messages, in order to disturb network operation
    or to consume other node resources.
Security Mechanism and
      Solutions for Routing Protocol
   Message encryption and digital signatures are two
    important mechanisms for data integrity and user
    authentication.
   There are two types of data encryption mechanisms
      Symmetric

      Asymmetric

   Symmetric : Use the same key (the secret key) for
    encryption and decryption of a message
   Asymmetric : Use one key (the public key) to
    encrypt a message and another key (the private key)
    to decrypt it.
   Message Authentication Code (MAC) is used.
   Cryptographic checksum, computed by the
    message initiator as a function of the secret key
    and the message being transmitted and it is
    appended to the message.
   The recipient re-computes the MAC in the
    similar fashion.
   If the MAC computed by the receiver matches
    the MAC received with the message then the
    recipient is assured that the message was not
    modified.
Secure Efficient Ad hoc
          Distance Vector
   Secure Efficient Ad hoc Distance Vector (SEAD)
    is a proactive routing protocol, based on the
    design of DSDV.

   SEAD routing tables maintain a hash value for
    each entry.
   The key feature of the proposed security protocol
    is the use one-way hash chain function H.
   Each node computes a list of hash values h0, h1,
    ・ ・ ・ , hn, where hi = H(hi−1) and 0 < i ≤ n,
    based on an initial random value h0.
    If a node knows H and a trusted value hn, then
    it can authenticate any other value hi, 0 < i ≤ n
    by successively applying the hash function H and
    then comparing the result with hn.
   To authenticate, a node adds a hash value to
    each routing table entry.

   For a metric j and a sequence number i, the
    hash value hn−i+j is used to authenticate the
    routing update entry for that sequence number

   Since an attacker cannot compute a hash value
    with a smaller index than the advertised value.
ARIADNE
   Design of ARIADNE is based on DSR.
   It assumes that sender and receiver share
    secret keys for message authentication.
   The initiator (or sender) includes a MAC
    computed with an end-to-end key and the
    target (or destination) verifies the authenticity
    and freshness of the request using the shared
    key.
   Pre-hop hashing mechanism, a one-way hash
    function that verifies that no hop is omitted, is
    also used in Ariadne.
   Provides a strong defense against attacks that
    modify and fabricate routing information.
Security Aware Routing (SAR)

   Is an on demand routing protocol based on
    AODV
   The initiator of the route in SAR includes a
    security metric in the route request.
   This security metric is the minimum trust
    level of the nodes that can participate in
    the route discovery.
   Only those nodes that have this minimum
    security level can participate in the route
    discovery.
   All other nodes that are below that trust
    level will drop the request packets.
   SAR uses sequence numbers and timestamps to
    stop replay attacks.

   Threats like interception and subversion can be
    prevented by trust level key authentication.

   Modification and fabrication attacks can be
    prevented
Secure Routing Protocol (SRP)

   SRP defends against attacks that disrupt the
    route discovery process.
   Set up a security association without the
    need of cryptographic validation of the
    communication data by the intermediate
    nodes.
   SRP assumes that this SA can be achieved
    through a shared key KST between the
    source S and target T.
   The SRP uses an additional header called SRP
    header to the underlying routing protocol
    packet.
   SRP header contains the following fields:
       the query sequence number QSEC
       query identifier number QID
       96 bit MAC field
   Discard a route request message if SRP header
    is missing.
   Otherwise, forward the request towards
    destination after extracting QID, source, and
    destination address.
   When the target T receives request packet, it
    verifies.
   If QSEC >=QMAX, the request is dropped.
   Otherwise it calculates the keyed hash of the
    request fields and if the output matches SRP
    MAC then authenticity of the sender and
    integrity of the request are verified.
   If the two routes match then S calculates the
    MAC by using the replied route, the SRP header
    fields, and the secure key between source and
    destination.
   If the two MAC match then the validation is
    successful and it confirms that the reply did
    came from the destination T.
Security Protocols for Sensor
            Network (SPINS)
   It provides important network services like
      data confidentiality

      two party data authentication

      data freshness

      Through Secure Network Encryption Protocol
       (SNEP) and secure broadcast through Micro
       Timed     Efficient  Stream     Loss-tolerant
       Authentication (μTESLA).
   μTESLA an enhanced version of TESLA,
    uses symmetric cryptographic techniques
    for    authentications   and    asymmetry
    cryptography     only  for   the   delayed
    disclosure of keys.
CONCLUSION
   Achieving a secure routing protocol is an
    important task that is being challenged by the
    unique characteristics of an ad hoc wireless
    network.
   In this paper we discuss security services and
    challenges in an ad hoc wireless network
    environment.
   The current security mechanisms, each defeats
    one or few routing attacks. Designing routing
    protocols resistant to multiple attacks remains a
    challenging task.
THANK YOU

Más contenido relacionado

La actualidad más candente

Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Remote Procedure Call in Distributed System
Remote Procedure Call in Distributed SystemRemote Procedure Call in Distributed System
Remote Procedure Call in Distributed SystemPoojaBele1
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; callingRUpaliLohar
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 

La actualidad más candente (20)

Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Remote Procedure Call in Distributed System
Remote Procedure Call in Distributed SystemRemote Procedure Call in Distributed System
Remote Procedure Call in Distributed System
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Mac layer
Mac  layerMac  layer
Mac layer
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; calling
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Advance Network Technologies
Advance Network TechnologiesAdvance Network Technologies
Advance Network Technologies
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 

Destacado

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Farmacoepi Course Leiden 0210 Part 2
Farmacoepi Course Leiden 0210   Part 2Farmacoepi Course Leiden 0210   Part 2
Farmacoepi Course Leiden 0210 Part 2RobHeerdink
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16Spiro Vellore
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 

Destacado (20)

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Manet
ManetManet
Manet
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
MANET
MANETMANET
MANET
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Packet filtering using jpcap
Packet filtering using jpcapPacket filtering using jpcap
Packet filtering using jpcap
 
Farmacoepi Course Leiden 0210 Part 2
Farmacoepi Course Leiden 0210   Part 2Farmacoepi Course Leiden 0210   Part 2
Farmacoepi Course Leiden 0210 Part 2
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Hybrid wireless protocols
Hybrid wireless protocolsHybrid wireless protocols
Hybrid wireless protocols
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Manet
ManetManet
Manet
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 

Similar a Ad-HOc presentation

Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkIRJET Journal
 

Similar a Ad-HOc presentation (20)

Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Aodv
AodvAodv
Aodv
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
I1802046780
I1802046780I1802046780
I1802046780
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 

Más de Elanthendral Mariappan (7)

Image+processing
Image+processingImage+processing
Image+processing
 
Ex11 mini project
Ex11 mini projectEx11 mini project
Ex11 mini project
 
Ex3 lisp likelist in java
Ex3 lisp likelist in javaEx3 lisp likelist in java
Ex3 lisp likelist in java
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Ad-HOc presentation

  • 1. Routing Security in Ad Hoc Wireless Networks Presented by J.Jaffer Basha M.Elanthendral II Year – CSE Sree Sowdambika College of Engineering Aruppukottai
  • 2. Wireless Networks  Wireless networks provide rapid, access to information and computing, limiting the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery
  • 3. Ad Hoc Wireless Networks  Collection of wireless mobile hosts forming a temporary network  Every device has the role of router and actively participates in data forwarding.  Communication between two nodes can be performed directly if the destination is within the sender’s transmission range, or through intermediate nodes acting as routers if the destination is outside sender’s transmission range.
  • 4. Characteristics of Ad Hoc Wireless Networks  Characteristics which differentiate Ad Hoc wireless networks from other networks are:  Dynamic Network Topology  Distributed Operations  Limited Energy Resources
  • 5. Routing  Routing is an important operation for data exchange between wireless devices.  Main routing responsibilities are exchanging the routing information, finding a feasible path between source and destination.
  • 6. Routing Protocol  The major requirements of a routing protocol are  Minimum route acquisition delay  Quick route reconfiguration in case of path breaks  Loop-Free routing  Distributed routing protocol  Low control overhead  Scalability with network size  QoS support as demanded by the application  Support of time sensitive traffic  Security and Privacy.
  • 7. Routing Protocols in Ad Hoc Wireless Networks  The design of routing protocols should take these factors into consideration.  Based on the routing information update mechanism, routing protocols in ad hoc wireless networks can be classified as  Proactive (or table-driven) protocols  Reactive (or on-demand) protocols  Hybrid routing protocols.
  • 8. Proactive Routing Protocols  Nodes exchange routing information periodically to maintain accurate routing information.  The path can be computed rapidly based on the updated information available in the routing table.  The algorithm used is DSDV.
  • 9. DSDV  Finds shortest paths between nodes using Bellman-Ford algorithm.  Each node maintains a routing table  For each entry, the following fields are maintained:  the destination address  next hop on the shortest path to that destination  a destination sequence number
  • 10. DSDV  Sequence numbers are used for preventing loop formation.  Each entry in the routing table has a sequence number.  If a node receives an update with a smaller sequence number, then that update is ignored.  Path is adopted if it has a greater sequence number, or if it has the same sequence number but a lower metric.
  • 11. DSDV Destination Next Metric Seq. Nr Install Time A A 0 A-550 001000 B B 1 B-102 001200 C B 3 C-588 001200 D B 4 D-312 001200  When a broken link is detected, the node creates a routing update with next odd sequence number and metric value of infinity.
  • 12. Reactive Routing Protocol  A route discovery mechanism is initiated only when a node does not know a path to a destination it wants to communicate with.  Perform better with significantly lower overheads than proactive routing protocols  Has two main operations  Route discovery  Route maintenance  Various reactive protocols have been proposed  Ad Hoc On-demand Distance Vector (AODV)  Dynamic Source Routing (DSR)
  • 13. DSR  Is a source routing protocol, each data packet carries the source-destination path in its header.  Using this information, intermediate nodes can determine who is the next hop this packet should be forwarded to.  Every entry has an expiration time after which the entry is deleted in order to avoid stale information.
  • 14. Each Route Request contains sequence number generated by source node, to prevent loop formation.  An intermediate node checks the sequence number, and forwards the Route Request only if this message is not a duplicate.  Receiving the Route Reply, the sender starts sending data to the receiver.
  • 15. If a node detects a failure, it sends a Route Error message to the source.  All routes that contain this hop are truncated.  If the source does not have an alternative path to the destination, it has to re-initiate the path discovery mechanism.
  • 16. DSR has several optimization techniques.  Know a path to the destination to reply to the Route Request message instead of forwarding the request.  Path discovery can use an expanding ring search mechanism when sending the Route Request messages in close destinations, thus avoiding broadcasting in the whole network.
  • 17. Hybrid Routing Protocols  Some routing protocols are hybrid of proactive and reactive mechanisms.  examples of hybrid routing protocols:  Zone Routing Protocol (ZRP)  Core Extraction Distributed Ad Hoc Routing Protocol (CEDAR)
  • 18. Zone Routing Protocol (ZRP)  The network is divided in zones .  The intra-zone routing protocol is a proactive routing protocol, the inter-zone routing protocol is a reactive routing protocol.  When a node transmit data to a destination within the same zone, then this is done using the proactive routing protocol.  If the destination is in another zone, then the source node border casts the Route Request until it reaches the destination zone.  Node of the destination zone sends then back a Route Reply message.  If a broken link is detected, the path reconstruction can be done locally
  • 19. Security Attacks on Routing Protocol  Secure system can be achieved by preventing attacks or by detecting them and providing a mechanism to recover for those attacks.  Attacks on ad hoc wireless networks can be classified as  Active attacks  Passive attacks
  • 20. Passive Attacks  Intruder snoops the data exchanged without altering it.  The goal of the attacker is to obtain information that is being transmitted.  These attackers are difficult to detect, since the network is not disrupted  Powerful encryption mechanism can alleviate these attackers.
  • 21. Active Attack  Attacker actively participates in disrupting network services.  Attack by modifying packets or by introducing false information in the ad hoc network.  Confuses routing procedures and degrades network performance. Active attacks can be divided into  Internal Attack  External Attack
  • 22. Internal Attack  From compromised nodes that were once legitimate part of the network.  Since they are part of the network, they are much more severe and difficult to detect when compared to external attacks.
  • 23. External Attack  Carried by nodes that are not legitimate part of the network.  Such attacks can be defended by using encryption, firewalls and source authentication.
  • 24. Attacks using Impersonation  An intruder consume another node resources or to disturb normal network operation.  An attacker node achieves impersonation by misrepresenting its identity.  This can be done by changing its own IP or MAC address to that of some other legitimate node.  Some strong authentication procedures can be used to stop attacks by impersonation.
  • 25. Impersonation Man-in-the-Middle Attack  The attacker can impersonate the receiver with respect to the sender, and the sender with respect to the receiver.  without having either of them realize that they have been attacked.
  • 26. Attacks using Modification  This attack disrupts the routing function by having the attacker illegally modifying the content of the messages.  Misrouting Attack: A non-legitimate node sends data packet to the wrong destination.  Detour Attack: The traffic is diverted to other routes that appear to be shorter and might contain malicious nodes which could create other attacks.  Blackmail Attack: Causes false identification of a good node as malicious node.
  • 27. Attacks using Fabrication  An intruder generates false routing messages, such as routing updates and route error messages, in order to disturb network operation or to consume other node resources.
  • 28. Security Mechanism and Solutions for Routing Protocol  Message encryption and digital signatures are two important mechanisms for data integrity and user authentication.  There are two types of data encryption mechanisms  Symmetric  Asymmetric  Symmetric : Use the same key (the secret key) for encryption and decryption of a message  Asymmetric : Use one key (the public key) to encrypt a message and another key (the private key) to decrypt it.
  • 29. Message Authentication Code (MAC) is used.  Cryptographic checksum, computed by the message initiator as a function of the secret key and the message being transmitted and it is appended to the message.  The recipient re-computes the MAC in the similar fashion.  If the MAC computed by the receiver matches the MAC received with the message then the recipient is assured that the message was not modified.
  • 30. Secure Efficient Ad hoc Distance Vector  Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of DSDV.  SEAD routing tables maintain a hash value for each entry.
  • 31. The key feature of the proposed security protocol is the use one-way hash chain function H.  Each node computes a list of hash values h0, h1, ・ ・ ・ , hn, where hi = H(hi−1) and 0 < i ≤ n, based on an initial random value h0.  If a node knows H and a trusted value hn, then it can authenticate any other value hi, 0 < i ≤ n by successively applying the hash function H and then comparing the result with hn.
  • 32. To authenticate, a node adds a hash value to each routing table entry.  For a metric j and a sequence number i, the hash value hn−i+j is used to authenticate the routing update entry for that sequence number  Since an attacker cannot compute a hash value with a smaller index than the advertised value.
  • 33. ARIADNE  Design of ARIADNE is based on DSR.  It assumes that sender and receiver share secret keys for message authentication.  The initiator (or sender) includes a MAC computed with an end-to-end key and the target (or destination) verifies the authenticity and freshness of the request using the shared key.  Pre-hop hashing mechanism, a one-way hash function that verifies that no hop is omitted, is also used in Ariadne.  Provides a strong defense against attacks that modify and fabricate routing information.
  • 34. Security Aware Routing (SAR)  Is an on demand routing protocol based on AODV  The initiator of the route in SAR includes a security metric in the route request.  This security metric is the minimum trust level of the nodes that can participate in the route discovery.  Only those nodes that have this minimum security level can participate in the route discovery.  All other nodes that are below that trust level will drop the request packets.
  • 35. SAR uses sequence numbers and timestamps to stop replay attacks.  Threats like interception and subversion can be prevented by trust level key authentication.  Modification and fabrication attacks can be prevented
  • 36. Secure Routing Protocol (SRP)  SRP defends against attacks that disrupt the route discovery process.  Set up a security association without the need of cryptographic validation of the communication data by the intermediate nodes.  SRP assumes that this SA can be achieved through a shared key KST between the source S and target T.
  • 37. The SRP uses an additional header called SRP header to the underlying routing protocol packet.  SRP header contains the following fields:  the query sequence number QSEC  query identifier number QID  96 bit MAC field  Discard a route request message if SRP header is missing.  Otherwise, forward the request towards destination after extracting QID, source, and destination address.
  • 38. When the target T receives request packet, it verifies.  If QSEC >=QMAX, the request is dropped.  Otherwise it calculates the keyed hash of the request fields and if the output matches SRP MAC then authenticity of the sender and integrity of the request are verified.  If the two routes match then S calculates the MAC by using the replied route, the SRP header fields, and the secure key between source and destination.  If the two MAC match then the validation is successful and it confirms that the reply did came from the destination T.
  • 39. Security Protocols for Sensor Network (SPINS)  It provides important network services like  data confidentiality  two party data authentication  data freshness  Through Secure Network Encryption Protocol (SNEP) and secure broadcast through Micro Timed Efficient Stream Loss-tolerant Authentication (μTESLA).  μTESLA an enhanced version of TESLA, uses symmetric cryptographic techniques for authentications and asymmetry cryptography only for the delayed disclosure of keys.
  • 40. CONCLUSION  Achieving a secure routing protocol is an important task that is being challenged by the unique characteristics of an ad hoc wireless network.  In this paper we discuss security services and challenges in an ad hoc wireless network environment.  The current security mechanisms, each defeats one or few routing attacks. Designing routing protocols resistant to multiple attacks remains a challenging task.