SlideShare una empresa de Scribd logo
1 de 28
Various Security Attacks in
Mobile Ad-hoc Networks
Prepared by:
Kishan N. Patel
OUTLINE
Overview Of Manet
Manet Challenges
Routing Protocols
Routing Attacks
Proactive Routing Protocol
Reactive Routing Protocol
Hybrid Routing Protocol
Classification Of Attacks
I. Data Traffic Attacks
II. Control Traffic Attacksc
Conclusion
OVERVIEW OF MANET
 A mobile ad hoc network (MANET) is a continuously self-
configuring, infrastructure-less network of mobile devices
connected without wires.
 Host movement is frequent.
 Topology changes frequently.
 No cellular infrastructure. Multi-hop wireless links.
 Data must be routed via intermediate nodes.
A
B A
B
MANET CHALLENGES
Packet loss due to transmission errors
 Variable capacity links
 Frequent disconnections/partitions
 Limited communication bandwidth
 Broadcast nature of the communications
 Dynamically changing topologies/routes
 Lack of mobility awareness by system/applications
 Short battery lifetime
 Limited capacities
ROUTING PROTOCOLS
 Ad hoc routing protocols can be classified as either proactive or
reactive depending on the method used to discover and maintain
routes.
 Proactive routing protocols discover and maintain a complete set of
routes for the lifetime of the network.
 In contrast, reactive routing protocols only find routes when
needed, and maintain those routes for the duration of
communication.
 The primary objective of a routing protocol must be to set up an
optimal route that has minimal overhead and consume minimum
bandwidth
TYPE PROTOCOL
Proactive
(Table-driven)
DSDV, OLSR,
WRP, CGSR, FSR
Reactive
(On-demand)
AODV, DSR,
ACOR, ABR
Hybrid
TORA, ZRP,
ARPAM, OORP,
HSR, CGSR,
ROUTING ATTACKS
 Due to lack of trusted centralized administration, limited bandwidth,
limited power, wireless links, dynamic topology and easy
eavesdropping MANETs are more susceptible to security attacks
than existing conventional networks.
 An attacker can violate them by passively or actively attacking on
Ad hoc Networks.
 Both active and passive attacks can be launched on any layer of the
network protocol stack on Ad hoc networks.
PROACTIVE ROUTING
PROTOCOL
 In networks utilizing a proactive routing protocol, every node
maintains one or more tables representing the entire topology of the
network. These tables are updated regularly in order to maintain a
up-to-date routing information from each node to every other node.
 The main disadvantages of such algorithms are:
1. Respective amount of data for maintenance.
2. Slow reaction on restructuring and failures.
REACTIVE ROUTING PROTOCOL
 This type of protocol combines the advantages of proactive and
reactive routing. The routing is initially established with some
proactively prospected routes and then serves the demand from
additionally activated nodes through reactive flooding. The choice
of one or the other method requires predetermination for typical
cases. The main disadvantages of such algorithms are:
1. Advantage depends on number of other nodes activated.
2. Reaction to traffic demand depends on gradient of traffic volume.
HYBRID ROUTING PROTOCOL
 Hybrid Routing is a third classification of routing algorithm.
 Hybrid routing protocols use distance-vectors for more accurate
metrics to determine the best paths to destination networks, and
report routing information only when there is a change in the
topology of the network.
TYPES OF ATTACKS EXAMPLE
Passive
Attacks
Traffic analysis,
Traffic monitoring and
eavesdropping
Active
Attacks
Modification,
impersonation,
fabrication,
jamming and message replay
CLASSIFICATION OF ATTACKS
 we have categorized the presently existing attacks into two broad
categories: DATA traffic attacks and CONTROL traffic attacks.
 This classification is based on their common characteristics and
attack goals.
 For example:
Black-Hole attack drops packets every time.
Gray-Hole attack also drops packets but its action is based on two
conditions: time or sender node.
DATA Traffic Attack
 DATA traffic attack deals either in nodes dropping data packets
passing through them or in delaying of forwarding of the data
packets.
 Some types of attacks choose victim packets for dropping while
some of them drop all of them irrespective of sender nodes.
 This may highly degrade the quality of service and increases end to
end delay.
 This also causes significant loss of important data.
 For e.g., a 100Mbps wireless link can behave as 1Mbps connection.
Moreover, unless there is a redundant path around the erratic node,
some of the nodes can be unreachable from each other altogether.
Black-Hole Attack
 In this attack, a malicious node acts like a Black hole, dropping all
data packets passing through it as like matter and energy disappears
from our universe in a black hole. If the attacking node is a
connecting node of two connecting components of that network,
then it effectively separates the ne
 Here the Black-Hole node separates the network into two Parts:
1. Collecting multiple RREP messages (from more than two nodes)
and thus hoping multiple redundant paths to the destination node
and then buffering the packets until a safe route is found.
2. Maintaining a table in each node with previous sequence number
in increasing order. Each node before forwarding packets increases
the sequence number. The sender node broadcasts RREQ to its
neighbors and once this RREQ reaches the destination, it replies
with a RREP with last packet sequence number. If the intermediate
node finds that RREP contains a wrong sequence number, it
understands that somewhere something went wrong.
Cooperative Black-Hole Attack
 This attack is similar to Black-Hole attack, but more than one
malicious node tries to disrupt the network simultaneously.
 It is one of the most severe DATA traffic attack and can totally
disrupt the operation of an Ad Hoc network.
 Mostly the only solution becomes finding alternating route to the
destination, if at all exists.
 Detection method is similar to ordinary Black-Hole attack. In
addition another solution is securing routing and node discovery in
MANET by any suitable protocol such as SAODV, SNRP, SND,
SRDP etc.
 Since each node is already trusted, black hole node should not be
appearing in the network.
Gray-Hole Attack
 Gray-Hole attack has its own characteristic behavior. It too drops
DATA packets, but node’s malicious activity is limited to certain
conditions or trigger.
 Two most common type of behavior:
1. Node dependent attack – drops DATA packets destined towards a
certain victim node or coming from certain node while for other
nodes it behaves normally by routing DATA packets to the
destination nodes correctly.
2. Time dependent attack – drops DATA packets based on some
predetermined/trigger time while behaving normally during the
other instances.
Jellyfish Attack
 Jellyfish attack is somewhat different from Black-Hole & Gray-
Hole attack. Instead of blindly dropping the data packets, it delays
them before finally delivering them.
 It may even scramble the order of packets in which they are
received and sends it in random order.
 This disrupts the normal flow control mechanism used by nodes for
reliable transmission. Jellyfish attack can result in significant end to
end delay and thereby degrading QoS. Few of the methods used by
attacker in this attack:
CONTROL Traffic Attack
 Mobile Ad-Hoc Network (MANET) is inherently vulnerable to
attack due to its fundamental characteristics, such as open medium,
distributed nodes, autonomy of nodes participation in network
(nodes can join and leave the network on its will), lack of
centralized authority which can enforce security on the network,
distributed co-ordination and cooperation.
Worm Hole Attack
 Worm hole, in cosmological term, connects two distant points in
space via a shortcut route.
 In the same way in MANET also one or more attacking node can
disrupt routing by short-circuiting the network, thereby disrupting
usual flow of packets.
 If this link becomes the lowest cost path to the destination then
these malicious nodes will always be chosen while sending packets
to that destination.
 The attacking node then can either monitor the traffic or can even
disrupt the flow (via one of the DATA traffic attack).
HELLO Flood Attack
 The attacker node floods the network with a high quality route with
a powerful transmitter.
 So, every node can forward their packets towards this node hoping
it to be a better route to destination. Some can forward packets for
those destinations which are out of the reach of the attacker node.
 A single high power transmitter can convince that all the nodes are
his neighbor.
 The attacker node need not generate a legitimate traffic; it can just
perform a selective replay attack as its power overwhelms other
transceivers.
Bogus Registration Attack
 A Bogus registration attack is an active attack in which an attacker
disguises itself as another node either by sending stolen beacon or
generating such false beacons to register himself with a node as a
neighbor.
 Once registered, it can snoop transmitted packets or may disrupt the
network altogether.
 But this type of attack is difficult to achieve as the attacker needs to
intimately know the masquerading nodes identity and network
topology .
Man in Middle Attack
 In Man in Middle attack, the attacker node creeps into a valid route
and tries to sniff packets flowing through it.
 To perform man in middle attack, the attacker first needs to be part
of that route.
 It can do that by either temporarily disrupting the route by
deregistering a node by sending malicious disassociation beacon
captured previously or registering itself in next route timeout event.
 One way of protecting packets flowing through MANET from
prying eyes is encrypting each packet. Though key distribution
becomes a security issue.
Rushing Attack
 Each node before transmitting its data, first establishes a valid route to
destination.
 Sender node broadcasts a RREQ (route request) message in
neighborhood and valid routes replies with RREP (route reply) with
proper route information.
 Some of the protocols use duplicate suppression mechanism to limit the
route request and reply chatter in the network. Rushing attack exploits
this duplicate suppression mechanism.
 Rushing attacker quickly forwards with a malicious RREP on behalf of
some other node skipping any proper processing /
 Due to duplicate suppression, actual valid RREP message from valid
node will be discarded and consequently the attacking node becomes
part of the route .
 In rushing attack, attacker node does send packets to proper node after
its own filtering is done, so from outside the network behaves normally
as if nothing happened. But it might increase the delay in packet
delivering to destination node
Cache Poisoning Attack
 Generally in AODV, each node keeps few of its most recent
transmission routes until timeout occurs for each entry. So each
route lingers for some time in node’s memory.
 If some malicious node performs a routing attack then they will
stay in node’s route table until timeout occurs or a better route is
found. An attacker node can advertise a zero metric to all of its
destinations.
 Such route will not be overwritten unless timeout occurs.
 It can even advertise itself as a route to a distant node which is out
of its reach. Once it becomes a part of the route, the attacker node
can perform its malicious activity.
 Effect of Cache poisoning can be limited by either adding boundary
leashes or by token authentication. Also each node can maintain its
friend-foe list based on historical statistics of neighboring nodes
performance.
Sybil Attack
 Sybil attack manifests itself by faking multiple identities by
pretending to be consisting of multiple nodes in the network.
 So one single node can assume the role of multiple nodes and can
monitor or hamper multiple nodes at a time.
 If Sybil attack is performed over a blackmailing attack, then level of
disruption can be quite high. Success in Sybil attack depends on
how the identities are generated in the system.
Conclusion
 We categorize the different types of ad hoc security attacks based on
their characteristics to reduce the mitigation period. By bringing the
attacks under these two categories the complicacy of naming also
reduces.
 We have look on the existing algorithms needed to avoid the attacks
and have tried to bind the attacks into categories according to that .
THANK YOU

Más contenido relacionado

La actualidad más candente

Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

La actualidad más candente (20)

Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 

Destacado

Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
Kunal Prajapati
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
prjpublications
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
Sohebuzzaman Khan
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 

Destacado (20)

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Grayhole
GrayholeGrayhole
Grayhole
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
MANET
MANETMANET
MANET
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Draft v3
Draft v3Draft v3
Draft v3
 
Osi model
Osi modelOsi model
Osi model
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Combiend curves of surveying
Combiend curves of surveyingCombiend curves of surveying
Combiend curves of surveying
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Manet
ManetManet
Manet
 

Similar a Various Security Attacks in mobile ad hoc networks

An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
ijsrd.com
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
IJERD Editor
 

Similar a Various Security Attacks in mobile ad hoc networks (20)

Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A SurveyDetecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 

Más de Kishan Patel (7)

Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
ONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESS
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Universal Description, Discovery and Integration
Universal Description, Discovery and IntegrationUniversal Description, Discovery and Integration
Universal Description, Discovery and Integration
 
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc Networks
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Podcasting
PodcastingPodcasting
Podcasting
 

Último

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Various Security Attacks in mobile ad hoc networks

  • 1. Various Security Attacks in Mobile Ad-hoc Networks Prepared by: Kishan N. Patel
  • 2. OUTLINE Overview Of Manet Manet Challenges Routing Protocols Routing Attacks Proactive Routing Protocol Reactive Routing Protocol Hybrid Routing Protocol Classification Of Attacks I. Data Traffic Attacks II. Control Traffic Attacksc Conclusion
  • 3. OVERVIEW OF MANET  A mobile ad hoc network (MANET) is a continuously self- configuring, infrastructure-less network of mobile devices connected without wires.  Host movement is frequent.  Topology changes frequently.  No cellular infrastructure. Multi-hop wireless links.  Data must be routed via intermediate nodes. A B A B
  • 4. MANET CHALLENGES Packet loss due to transmission errors  Variable capacity links  Frequent disconnections/partitions  Limited communication bandwidth  Broadcast nature of the communications  Dynamically changing topologies/routes  Lack of mobility awareness by system/applications  Short battery lifetime  Limited capacities
  • 5. ROUTING PROTOCOLS  Ad hoc routing protocols can be classified as either proactive or reactive depending on the method used to discover and maintain routes.  Proactive routing protocols discover and maintain a complete set of routes for the lifetime of the network.  In contrast, reactive routing protocols only find routes when needed, and maintain those routes for the duration of communication.  The primary objective of a routing protocol must be to set up an optimal route that has minimal overhead and consume minimum bandwidth
  • 6. TYPE PROTOCOL Proactive (Table-driven) DSDV, OLSR, WRP, CGSR, FSR Reactive (On-demand) AODV, DSR, ACOR, ABR Hybrid TORA, ZRP, ARPAM, OORP, HSR, CGSR,
  • 7. ROUTING ATTACKS  Due to lack of trusted centralized administration, limited bandwidth, limited power, wireless links, dynamic topology and easy eavesdropping MANETs are more susceptible to security attacks than existing conventional networks.  An attacker can violate them by passively or actively attacking on Ad hoc Networks.  Both active and passive attacks can be launched on any layer of the network protocol stack on Ad hoc networks.
  • 8. PROACTIVE ROUTING PROTOCOL  In networks utilizing a proactive routing protocol, every node maintains one or more tables representing the entire topology of the network. These tables are updated regularly in order to maintain a up-to-date routing information from each node to every other node.  The main disadvantages of such algorithms are: 1. Respective amount of data for maintenance. 2. Slow reaction on restructuring and failures.
  • 9. REACTIVE ROUTING PROTOCOL  This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are: 1. Advantage depends on number of other nodes activated. 2. Reaction to traffic demand depends on gradient of traffic volume.
  • 10. HYBRID ROUTING PROTOCOL  Hybrid Routing is a third classification of routing algorithm.  Hybrid routing protocols use distance-vectors for more accurate metrics to determine the best paths to destination networks, and report routing information only when there is a change in the topology of the network.
  • 11. TYPES OF ATTACKS EXAMPLE Passive Attacks Traffic analysis, Traffic monitoring and eavesdropping Active Attacks Modification, impersonation, fabrication, jamming and message replay
  • 12. CLASSIFICATION OF ATTACKS  we have categorized the presently existing attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks.  This classification is based on their common characteristics and attack goals.  For example: Black-Hole attack drops packets every time. Gray-Hole attack also drops packets but its action is based on two conditions: time or sender node.
  • 13.
  • 14. DATA Traffic Attack  DATA traffic attack deals either in nodes dropping data packets passing through them or in delaying of forwarding of the data packets.  Some types of attacks choose victim packets for dropping while some of them drop all of them irrespective of sender nodes.  This may highly degrade the quality of service and increases end to end delay.  This also causes significant loss of important data.  For e.g., a 100Mbps wireless link can behave as 1Mbps connection. Moreover, unless there is a redundant path around the erratic node, some of the nodes can be unreachable from each other altogether.
  • 15. Black-Hole Attack  In this attack, a malicious node acts like a Black hole, dropping all data packets passing through it as like matter and energy disappears from our universe in a black hole. If the attacking node is a connecting node of two connecting components of that network, then it effectively separates the ne  Here the Black-Hole node separates the network into two Parts: 1. Collecting multiple RREP messages (from more than two nodes) and thus hoping multiple redundant paths to the destination node and then buffering the packets until a safe route is found. 2. Maintaining a table in each node with previous sequence number in increasing order. Each node before forwarding packets increases the sequence number. The sender node broadcasts RREQ to its neighbors and once this RREQ reaches the destination, it replies with a RREP with last packet sequence number. If the intermediate node finds that RREP contains a wrong sequence number, it understands that somewhere something went wrong.
  • 16. Cooperative Black-Hole Attack  This attack is similar to Black-Hole attack, but more than one malicious node tries to disrupt the network simultaneously.  It is one of the most severe DATA traffic attack and can totally disrupt the operation of an Ad Hoc network.  Mostly the only solution becomes finding alternating route to the destination, if at all exists.  Detection method is similar to ordinary Black-Hole attack. In addition another solution is securing routing and node discovery in MANET by any suitable protocol such as SAODV, SNRP, SND, SRDP etc.  Since each node is already trusted, black hole node should not be appearing in the network.
  • 17. Gray-Hole Attack  Gray-Hole attack has its own characteristic behavior. It too drops DATA packets, but node’s malicious activity is limited to certain conditions or trigger.  Two most common type of behavior: 1. Node dependent attack – drops DATA packets destined towards a certain victim node or coming from certain node while for other nodes it behaves normally by routing DATA packets to the destination nodes correctly. 2. Time dependent attack – drops DATA packets based on some predetermined/trigger time while behaving normally during the other instances.
  • 18. Jellyfish Attack  Jellyfish attack is somewhat different from Black-Hole & Gray- Hole attack. Instead of blindly dropping the data packets, it delays them before finally delivering them.  It may even scramble the order of packets in which they are received and sends it in random order.  This disrupts the normal flow control mechanism used by nodes for reliable transmission. Jellyfish attack can result in significant end to end delay and thereby degrading QoS. Few of the methods used by attacker in this attack:
  • 19. CONTROL Traffic Attack  Mobile Ad-Hoc Network (MANET) is inherently vulnerable to attack due to its fundamental characteristics, such as open medium, distributed nodes, autonomy of nodes participation in network (nodes can join and leave the network on its will), lack of centralized authority which can enforce security on the network, distributed co-ordination and cooperation.
  • 20. Worm Hole Attack  Worm hole, in cosmological term, connects two distant points in space via a shortcut route.  In the same way in MANET also one or more attacking node can disrupt routing by short-circuiting the network, thereby disrupting usual flow of packets.  If this link becomes the lowest cost path to the destination then these malicious nodes will always be chosen while sending packets to that destination.  The attacking node then can either monitor the traffic or can even disrupt the flow (via one of the DATA traffic attack).
  • 21. HELLO Flood Attack  The attacker node floods the network with a high quality route with a powerful transmitter.  So, every node can forward their packets towards this node hoping it to be a better route to destination. Some can forward packets for those destinations which are out of the reach of the attacker node.  A single high power transmitter can convince that all the nodes are his neighbor.  The attacker node need not generate a legitimate traffic; it can just perform a selective replay attack as its power overwhelms other transceivers.
  • 22. Bogus Registration Attack  A Bogus registration attack is an active attack in which an attacker disguises itself as another node either by sending stolen beacon or generating such false beacons to register himself with a node as a neighbor.  Once registered, it can snoop transmitted packets or may disrupt the network altogether.  But this type of attack is difficult to achieve as the attacker needs to intimately know the masquerading nodes identity and network topology .
  • 23. Man in Middle Attack  In Man in Middle attack, the attacker node creeps into a valid route and tries to sniff packets flowing through it.  To perform man in middle attack, the attacker first needs to be part of that route.  It can do that by either temporarily disrupting the route by deregistering a node by sending malicious disassociation beacon captured previously or registering itself in next route timeout event.  One way of protecting packets flowing through MANET from prying eyes is encrypting each packet. Though key distribution becomes a security issue.
  • 24. Rushing Attack  Each node before transmitting its data, first establishes a valid route to destination.  Sender node broadcasts a RREQ (route request) message in neighborhood and valid routes replies with RREP (route reply) with proper route information.  Some of the protocols use duplicate suppression mechanism to limit the route request and reply chatter in the network. Rushing attack exploits this duplicate suppression mechanism.  Rushing attacker quickly forwards with a malicious RREP on behalf of some other node skipping any proper processing /  Due to duplicate suppression, actual valid RREP message from valid node will be discarded and consequently the attacking node becomes part of the route .  In rushing attack, attacker node does send packets to proper node after its own filtering is done, so from outside the network behaves normally as if nothing happened. But it might increase the delay in packet delivering to destination node
  • 25. Cache Poisoning Attack  Generally in AODV, each node keeps few of its most recent transmission routes until timeout occurs for each entry. So each route lingers for some time in node’s memory.  If some malicious node performs a routing attack then they will stay in node’s route table until timeout occurs or a better route is found. An attacker node can advertise a zero metric to all of its destinations.  Such route will not be overwritten unless timeout occurs.  It can even advertise itself as a route to a distant node which is out of its reach. Once it becomes a part of the route, the attacker node can perform its malicious activity.  Effect of Cache poisoning can be limited by either adding boundary leashes or by token authentication. Also each node can maintain its friend-foe list based on historical statistics of neighboring nodes performance.
  • 26. Sybil Attack  Sybil attack manifests itself by faking multiple identities by pretending to be consisting of multiple nodes in the network.  So one single node can assume the role of multiple nodes and can monitor or hamper multiple nodes at a time.  If Sybil attack is performed over a blackmailing attack, then level of disruption can be quite high. Success in Sybil attack depends on how the identities are generated in the system.
  • 27. Conclusion  We categorize the different types of ad hoc security attacks based on their characteristics to reduce the mitigation period. By bringing the attacks under these two categories the complicacy of naming also reduces.  We have look on the existing algorithms needed to avoid the attacks and have tried to bind the attacks into categories according to that .