Security of ad hoc networks
-
Upload
jayesh-rane -
Category
Technology
-
view
1.245 -
download
4
description
Transcript of Security of ad hoc networks
![Page 1: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/1.jpg)
Security of Ad-Hoc Networks
-Presented By-Jayesh Rane
R.C.Patel Institute of Technology, Shirpur.
-A Presentation on-
Converges ‘12
![Page 2: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/2.jpg)
2
Traditional Wireless Network
Infrastructure– base stations– high speed backbone– on-line servers
Network operators– operate and maintain the system– determine policies
Single-hop wireless communication
high speed backbonehigh speed backbone
basestation mobile
station
on-lineserver
Security in Ad-Hoc Networks
![Page 3: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/3.jpg)
Security in Ad-Hoc Networks 3
Wireless Ad-Hoc Networks
No infrastructure– no base stations– no backbone– no servers ( P2P)
No network operators– self-organization– self-configuration– self-healing
Multi-hop wireless communication
![Page 4: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/4.jpg)
Security in Ad-Hoc Networks 4
Motivation
Security is the most often cited concern with wireless networks
Wireless networks pose unique security problems
Power computation constraints are often higher in wireless networks, making security requirements different
![Page 5: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/5.jpg)
Security in Ad-Hoc Networks 5
Attacks on Ad-Hoc Networks
• Place of disclosure: Location disclosure Attacks that target Confidentiality requirements of the
ad hoc network.• A black hole: Attack malicious node and enters false answers route to route requests it
receives• Wormholes: It involves co-operation between the two malicious nodes that
participate in the network to appear one attacker.• Denial of Service: Specific instances of denial of service attacks include the routing table
overflow and the sleep deprivation torture.
![Page 6: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/6.jpg)
Security in Ad-Hoc Networks 6
Why Security Required?
Data confidentiality: keep data secret
Data integrity: prevent data from being altered
Data freshness: data must be recent
Data availability: data should be available on request
Data authentication: confirmation that data or request came from a specific, valid sender
![Page 7: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/7.jpg)
Security in Ad-Hoc Networks 7
Security Challenges
Vulnerability of channels Messages can be overheard and fake messages can be introduced into the
network
Vulnerability of nodes Nodes do not usually reside in physically protected places
Lack of infrastructure Special networks should operate independently of any fixed infrastructure.
Dynamic Topology The permanent changes of topology require sophisticated routing protocols
![Page 8: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/8.jpg)
Security in Ad-Hoc Networks 8
Solution against Attacks
1. Model Based on TTP(Third Trusted Party)
![Page 9: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/9.jpg)
Security in Ad-Hoc Networks 9
Solution against Attacks(cont…)
2. Secure Aware Protocol (For Blackhole Attack)
Improve the relevance of the routes
discovered by ad hoc routing protocols.
Embed security metric into the RREQ packet
Authenticated users belonging to same
trust level share a secret key
![Page 10: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/10.jpg)
Security in Ad-Hoc Networks 10
Solution against Attacks
3. Packet Leashes (for Wormhole Attacks)
The recipient of the packet is within a certain distance from the
sender
Each node must know its own location; all nodes must have loosely
synchronized clocks
![Page 11: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/11.jpg)
Security in Ad-Hoc Networks 11
Research Directions
• Decentralized public-key management schemes– using threshold cryptography– exploiting mobility and secure side channels
• Secure ad hoc routing– various schemes for authenticating routing information that is distributed or exchanged
among the nodes
• Incentives for co-operation– micro-payment based schemes– reputation based schemes
• Low cost cryptographic primitives (algorithms and protocols)
![Page 12: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/12.jpg)
Security in Ad-Hoc Networks 12
Conclusion
• Security in ad hoc networks is a very challenging issue• Basic Mechanisms
– Difficult to force the nodes to collaborate– No standard routing protocol yet
• Because of their characteristics, ad hoc networks, are open especially to Denial of service attacks
• Classical security solutions are not suited for ad hoc networks – Security services should be distributed
• Standard protocols?– At the moment no universal solution
![Page 13: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/13.jpg)
Security in Ad-Hoc Networks 13
Summary
Traditional Wireless Networks
Attacks on Ad-Hoc Networks
Solutions for Challenges» Model based on TTP» Protection against Black Holes» Protection against Wormholes
Wireless Ad-Hoc Networks
Research Directions Conclusion
Why Security Required? Security Challenges
![Page 14: Security of ad hoc networks](https://reader035.fdocuments.in/reader035/viewer/2022073117/557647eed8b42ac31b8b4f60/html5/thumbnails/14.jpg)
Security in Ad-Hoc Networks 14
QUESTIONS….?