SlideShare una empresa de Scribd logo
1 de 14
-A Presentation on-



Security of Ad-Hoc
    Networks

             -Presented By-
               Jayesh Rane
    R.C.Patel Institute of Technology,
                 Shirpur.
Traditional Wireless Network


                                                          high speed backbone
 Infrastructure                          on-line
   – base stations                        server

   – high speed backbone
   – on-line servers
 Network operators
   – operate and maintain the system
   – determine policies
 Single-hop wireless
  communication
                                                base
                                                                                mobile
                                                station
                                                                                station
                                                                                     2
                                Security in Ad-Hoc Networks
Wireless Ad-Hoc Networks


 No infrastructure
   – no base stations
   – no backbone
   – no servers ( P2P)
 No network operators
   – self-organization
   – self-configuration
   – self-healing
 Multi-hop wireless
  communication
                          Security in Ad-Hoc Networks   3
Motivation


 Security is the most often cited concern with wireless
  networks

 Wireless networks pose unique security problems

 Power computation constraints are often higher in
  wireless networks, making security requirements
  different




                      Security in Ad-Hoc Networks          4
Attacks on Ad-Hoc Networks

• Place of disclosure:
  Location disclosure Attacks that target Confidentiality requirements of the
  ad hoc network.
• A black hole:
   Attack malicious node and enters false answers route to route requests it
  receives
• Wormholes:
  It involves co-operation between the two malicious nodes that
  participate in the network to appear one attacker.
• Denial of Service:
  Specific instances of denial of service attacks include the routing table
  overflow and the sleep deprivation torture.

                             Security in Ad-Hoc Networks                        5
Why Security Required?

 Data confidentiality: keep data secret

 Data integrity: prevent data from being altered

 Data freshness: data must be recent

 Data availability: data should be available on request
 Data authentication: confirmation that data or request
                           came from a specific, valid sender




                         Security in Ad-Hoc Networks            6
Security Challenges

 Vulnerability of channels
  Messages can be overheard and fake messages can be introduced into the
  network
 Vulnerability of nodes
  Nodes do not usually reside in physically protected places
 Lack of infrastructure
   Special networks should operate independently of any fixed infrastructure.

 Dynamic Topology
  The permanent changes of topology require sophisticated routing protocols



                            Security in Ad-Hoc Networks                         7
Solution against Attacks

1. Model Based on TTP(Third Trusted Party)




                     Security in Ad-Hoc Networks   8
Solution against Attacks(cont…)

2. Secure Aware Protocol (For Blackhole Attack)

                          Improve the relevance of the routes
                             discovered by ad hoc routing protocols.

                          Embed security metric into the RREQ packet

                          Authenticated users belonging to same
                             trust level share a secret key




                     Security in Ad-Hoc Networks                       9
Solution against Attacks

3. Packet Leashes (for Wormhole Attacks)


    The recipient of the packet is within a certain distance from the
     sender
    Each node must know its own location; all nodes must have loosely
     synchronized clocks




                           Security in Ad-Hoc Networks                   10
Research Directions

• Decentralized public-key management schemes
   – using threshold cryptography
   – exploiting mobility and secure side channels

• Secure ad hoc routing
   – various schemes for authenticating routing information that is distributed or
     exchanged among the nodes

• Incentives for co-operation
   – micro-payment based schemes
   – reputation based schemes

• Low cost cryptographic primitives (algorithms and protocols)



                              Security in Ad-Hoc Networks                            11
Conclusion

• Security in ad hoc networks is a very challenging issue
• Basic Mechanisms
    – Difficult to force the nodes to collaborate
    – No standard routing protocol yet
• Because of their characteristics, ad hoc networks, are open
  especially to Denial of service attacks
• Classical security solutions are not suited for ad hoc networks
    – Security services should be distributed
• Standard protocols?
    – At the moment no universal solution




                             Security in Ad-Hoc Networks            12
Summary
   Traditional Wireless Networks
   Wireless Ad-Hoc Networks
   Attacks on Ad-Hoc Networks
   Why Security Required?
   Security Challenges
   Solutions for Challenges
         » Model based on TTP
         » Protection against Black Holes
         » Protection against Wormholes
   Research Directions
   Conclusion



                          Security in Ad-Hoc Networks   13
Security in Ad-Hoc Networks   14

Más contenido relacionado

La actualidad más candente

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 

La actualidad más candente (20)

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
TinyOS
TinyOSTinyOS
TinyOS
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 

Destacado

Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of TrustYousof Alsatom
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

Destacado (10)

Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
Network security
Network securityNetwork security
Network security
 

Similar a Security of ad hoc networks

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Networkgaurav kumar
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 

Similar a Security of ad hoc networks (20)

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Paper1
Paper1Paper1
Paper1
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
D0961927
D0961927D0961927
D0961927
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
Presentation1
Presentation1Presentation1
Presentation1
 

Último

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Último (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Security of ad hoc networks

  • 1. -A Presentation on- Security of Ad-Hoc Networks -Presented By- Jayesh Rane R.C.Patel Institute of Technology, Shirpur.
  • 2. Traditional Wireless Network high speed backbone  Infrastructure on-line – base stations server – high speed backbone – on-line servers  Network operators – operate and maintain the system – determine policies  Single-hop wireless communication base mobile station station 2 Security in Ad-Hoc Networks
  • 3. Wireless Ad-Hoc Networks  No infrastructure – no base stations – no backbone – no servers ( P2P)  No network operators – self-organization – self-configuration – self-healing  Multi-hop wireless communication Security in Ad-Hoc Networks 3
  • 4. Motivation  Security is the most often cited concern with wireless networks  Wireless networks pose unique security problems  Power computation constraints are often higher in wireless networks, making security requirements different Security in Ad-Hoc Networks 4
  • 5. Attacks on Ad-Hoc Networks • Place of disclosure: Location disclosure Attacks that target Confidentiality requirements of the ad hoc network. • A black hole: Attack malicious node and enters false answers route to route requests it receives • Wormholes: It involves co-operation between the two malicious nodes that participate in the network to appear one attacker. • Denial of Service: Specific instances of denial of service attacks include the routing table overflow and the sleep deprivation torture. Security in Ad-Hoc Networks 5
  • 6. Why Security Required?  Data confidentiality: keep data secret  Data integrity: prevent data from being altered  Data freshness: data must be recent  Data availability: data should be available on request  Data authentication: confirmation that data or request came from a specific, valid sender Security in Ad-Hoc Networks 6
  • 7. Security Challenges  Vulnerability of channels Messages can be overheard and fake messages can be introduced into the network  Vulnerability of nodes Nodes do not usually reside in physically protected places  Lack of infrastructure Special networks should operate independently of any fixed infrastructure.  Dynamic Topology The permanent changes of topology require sophisticated routing protocols Security in Ad-Hoc Networks 7
  • 8. Solution against Attacks 1. Model Based on TTP(Third Trusted Party) Security in Ad-Hoc Networks 8
  • 9. Solution against Attacks(cont…) 2. Secure Aware Protocol (For Blackhole Attack)  Improve the relevance of the routes discovered by ad hoc routing protocols.  Embed security metric into the RREQ packet  Authenticated users belonging to same trust level share a secret key Security in Ad-Hoc Networks 9
  • 10. Solution against Attacks 3. Packet Leashes (for Wormhole Attacks)  The recipient of the packet is within a certain distance from the sender  Each node must know its own location; all nodes must have loosely synchronized clocks Security in Ad-Hoc Networks 10
  • 11. Research Directions • Decentralized public-key management schemes – using threshold cryptography – exploiting mobility and secure side channels • Secure ad hoc routing – various schemes for authenticating routing information that is distributed or exchanged among the nodes • Incentives for co-operation – micro-payment based schemes – reputation based schemes • Low cost cryptographic primitives (algorithms and protocols) Security in Ad-Hoc Networks 11
  • 12. Conclusion • Security in ad hoc networks is a very challenging issue • Basic Mechanisms – Difficult to force the nodes to collaborate – No standard routing protocol yet • Because of their characteristics, ad hoc networks, are open especially to Denial of service attacks • Classical security solutions are not suited for ad hoc networks – Security services should be distributed • Standard protocols? – At the moment no universal solution Security in Ad-Hoc Networks 12
  • 13. Summary  Traditional Wireless Networks  Wireless Ad-Hoc Networks  Attacks on Ad-Hoc Networks  Why Security Required?  Security Challenges  Solutions for Challenges » Model based on TTP » Protection against Black Holes » Protection against Wormholes  Research Directions  Conclusion Security in Ad-Hoc Networks 13
  • 14. Security in Ad-Hoc Networks 14