Wormhole attack UNDER MANETs& ITS DETECTION

29
Presented by- Ms. Ritika Sharma Student, M.tech III/II, Semester/Year

description

INTRODUCTIONTo the ad-hoc networksTo MANETsRouting in MANETsSecurity in MANETsSimulation backgroundMANET using AODV ROUTING PROTOCOLFeaturesMode of operationMANET under WORMHOLE ATTACK USING AODVProblem StatementProblem DefinitionWormhole in AODV

Transcript of Wormhole attack UNDER MANETs& ITS DETECTION

Presented by-Ms. Ritika SharmaStudent, M.tech III/II, Semester/Year

OUTLINEOUTLINE INTRODUCTION

To the ad-hoc networks To MANETs Routing in MANETs Security in MANETs Simulation background

MANET using AODV ROUTING PROTOCOL Features Mode of operation

MANET under WORMHOLE ATTACK USING AODV Problem Statement Problem Definition Wormhole in AODV

OUTLINE Contd.

PREVENTION TECHNIQUES FOR WORMHOLE IN MANETs Types of Wormhole attack Types of prevention technique Technique to be Implemented in project

INTRODUCTION To the Ad-hoc networks: -1. Characteristics- Ad-hoc is Latin and means "for this purpose". No fixed infrastructure & Dynamic changing topology.

Mobile devices join/leave the network unexpectedly; they can also move freely

Energy-constrained & Limited bandwidth Each node also serves as router

Help to relay packets received from neighbors Interoperation with the Internet.

INTRODUCTION Contd.

2. Types of Ad-hoc networks-

Ad-hoc Networks

1. Mobile Ad-hoc Networks (MANETs)

2. Wireless Mesh Networks (WMNs)

3. Wireless Sensor Networks (WSNs)

INTRODUCTION Contd. Mobile Ad-hoc networks (MANETs): -

1. Characteristics- Host movement & topology change is frequent.

No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes. This forms a random topology with rapid & unpredictable

changes. Routers move randomly free Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-

induced disasters, military conflicts, emergency medical situations, etc.

INTRODUCTION Contd. Architectural difference between a

Wireless mobile network & a MANET

v Mobile nodes

Access points

Backbone

Wireless Mobile Network

MANET

INTRODUCTION Contd.

2. Types of MANET-

Types of MANET

1. Vehicular Ad-hoc

Networks (VANETs)

2. Intelligent Vehicular Ad-hoc

Networks (InVANETs

)

3. Internet based

Mobile Ad-hoc

Networks (iMANETs)

4. Wi-maxIEEE

802.16

INTRODUCTION Contd.

3. Challenges in MANET-

Limitations of the Wireless Network packet loss due to transmission errors variable capacity links frequent disconnections/partitions limited communication channel Broadcast nature of the communications

Limitations Imposed by Mobility dynamically changing topologies/routes lack of mobility awareness by system/applications

Limitations of the Mobile Node short battery lifetime limited capacities

INTRODUCTION Contd. Routing in MANET: -

1.Routing Protocols- The classification of various routing protocols that

are used in MANET is shown below-

DSDV WRP AODV

DSR LMR ABR CGSR

TORA SSR

Ad-hoc network routing protocols

Position-BasedTopology-Based

Pro-active (Table driven)

Reactive (Source initiated on-

demand)

INTRODUCTION Contd.

Proactive routing Classic routing strategies: link state, distance

vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control

information E.g. DSDV, WRP, TBRPF, OLSR, etc.

Reactive routing Only discover routes to destinations on-

demand Consume much less bandwidth but experience

substantial delay E.g. DSR, AODV, TORA, etc.

INTRODUCTION Contd.

2. Routing Algorithms-

INTRODUCTION Contd. Security in MANETs: -Security in MANETs: -1.Security Requirements in MANETs-

Authorization and Key Management Data Confidentiality Data Integrity Non-repudiation

2. MANETs Security aspects- Routing security Data forwarding security Link layer security Key management Intrusion detection systems (IDSs)

INTRODUCTION Contd.

3. Threats: -3. Threats: -Attacks-

Misbehaviour

Types

Passive attacks Active attacks

Replication

FabricationImpersonati

on

Modification

Information disclosure

MANET USING AODV ROUTING MANET USING AODV ROUTING PROTOCOLPROTOCOL

FeaturesFeatures: -: - AODV maintains routing tables at the nodes, so

that data packets do not have to contain routes. In AODV, routes are maintained only between

nodes which need to communicate. ROUTE REQUEST (RREQ)-When node S wants to

send a packet to node D, but does not know a route to D, node S initiates a route discovery.

Source node S floods(broadcasts) Route Request (RREQ) .

Each node appends own identifier when forwarding RREQ.

When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source.

MANET USING AODV ROUTING MANET USING AODV ROUTING PROTOCOLPROTOCOL

Contd. Contd. ROUTE REPLY (RREP)-When the intended

destination receives a Route Request, it replies by sending a Route Reply (RREP).

Route Reply travels along the reverse path set-up when Route Request is forwarded.

Mode of operation: -Mode of operation: - The following figure shows the basic route

establishments in MANETs employing AODV .- RREQ, RREP & Forward link.

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL

Contd.Contd.S-SourceS-Source

D-DestinationD-Destination

B

A

S E

F

H

J

D

C

G

IK

M

N

L

-- Represents a node that has received RREQ for D from S

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

M

N

L

Route Requests in AODVBroadcasts transmission

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

M

N

L

Route Requests in AODVBroadcasts transmission

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

Route Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Represents links on Reverse Path

M

N

L

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

Reverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

M

N

L

• Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

Reverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

M

N

L

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd. Reverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

M

N

L

•Node D does not forward RREQ, because node D is the intended target of the RREQ

MANET USING AODV ROUTINGMANET USING AODV ROUTING PROTOCOL PROTOCOL Contd.Contd.

Forward Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

M

N

L

Forward links are setup when RREP travels along the reverse path.

Represents a link on the forward path.

MANET UNDER WORMHOLE ATTACK USING AODV

Problem Statement: - Wireless networks are particularly vulnerable to a

Powerful attack known as the wormhole attack. In our project we will develop a new trust based

that prevents wormhole attacks on a wireless network.

A few existing Protocols (like e.g.) detect wormhole attacks but they require highly specialized equipment not found on most wireless devices.

This project aims to develop a defence against Wormhole attacks that does not require as a significant amount of specialized equipment.

MANET UNDER WORMHOLE ATTACK IN AODV Contd.

Problem Definition: - To set up a wormhole attack, an attacker places

two or more transceivers at different locations on a wireless network as shown in figure1 as follows. Figure- Set-up of a wormhole attack

MANET UNDER WORMHOLE ATTACK IN AODV Contd.

After setting up a wormhole, an attacker can disrupt routing to direct packets through the wormhole using a technique known as selective forwarding[10] depicted in Figure . Selective forwarding

MANET UNDER WORMHOLE ATTACK IN AODV Contd.

Wormhole in AODV: - In scenarios where the colluding nodes (M1,M2) are not the

immediate neighbours of the source (S) and destination (D) nodes. Wormhole creation in such a scenario is generally accomplished using the following steps: Step 1-Sustained Routes between Colluding Nodes (M1 &

M2). Step 2-Fallacious Response to Source Node Route Requests . Step 3-Route Development till the Destination Node. Step 4-Deception through Gratuitous Route Replies .

DETECTION OF WORMHOLE IN MANET

Contd. Types of Wormhole attack: - Wormhole using Packet Encapsulation Wormhole using High Power Transmission Wormhole using Packet Relay Wormhole using Protocol Deviation

Types of Detection Technique: - Link Frequency Analysis Trust-based models

Technique to be Implemented in project: - In our project we will implement both the techniques mentioned above .