Upload
abdullah-mukhtar
View
180
Download
3
Tags:
Embed Size (px)
Citation preview
Security on Mobile Ad-hoc Network
by
Abdullah Mukhtar(Network Security Engineer)
Outline
Introduction
Primary Goals of Security in MANET
Key management
Classification of attacks
Problems Arises in MANET
Introduction
• Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
• No existing fixed infrastructure or centralized administration –No base station.
• Mobile nodes are free to move randomly.
•Network topology changes frequently.
• May Operate as standalone fashion or also can be connected to the larger internet.
• Each node work as router.
• Multihop communication- node communicate with the
help of two or more node from source to destination.
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect
the system resources a number of security services are classified in five
categories:-
Authentication:- The process of identifying an individual , usually based on a
username and password.
Confidentially:- Confidentiality aims at protecting the data from disclosure to
unauthorized person.
Non repudiation:- Integrity guarantees that a message being transferred is never
corrupted.
Network attacks against confidentiality
Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
Integrity:- Integrity guarantees that a message being transferred is never corrupted.
Availability:- Its ensure that data ,network resources or network services are
available to legitimate user when required.
Continued…
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems.
Trust model:-Its must determine how much different element in the
network can trust each other.
Cryptosystem:- Public and symmetric key mechanism can be applied .
Key creation:- It must determine which parties are allowed to
generate key to themselves.
Key storage :- In adhoc network any network element may have to store
its own key and possibly key of other element as well.
Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Classification of attacks
Attacks on network are divided into two categories –
•Internal attack
•External attack.
In internal attacks, the adversary (attacker) wants to gain the normal access to the network
and participate the network activities, either by some malicious impersonation to get
the access to the network as a new node, or by directly compromising a current node
and using it as a basis to conduct its malicious behaviors
In external attacks, the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services.
MANETs are basically vulnerable to two different types of attacks: o active attacks o passive attacks.
Continued….
Some of the active attacks
• Black hole
• Byzantine
• Wormhole
• Spoofing attack
• Sybil
Fig1. Black hole problem
Fig 2. Wormhole attack Fig 3. Flooding attack
Problems Arises in MANET
The attacker may target the route maintenance process and advertise that an
operational link is broken.
One more problem is the attacker along an established route may drop the packet,
modify the content of packet or duplicates the packets it has already forwarded
Attack via network layer packet blasting ,in which the attacker injects a large amount
of junk packets in to the network, these packets waste a significant portion of
the network resources and introduce severe wireless channel contention and
network congestion in MANET
By attacking routing protocol the attacker can attract traffic towards certain destination
in the nodes under their control and cause the packet to be forwarded along a
route that is not optional.
The attacker can create routing loops in the network and introduce severe network
congestion and channel contention in certain areas
Continued…
Many colluding attracters may even prevent a source node from finding any route to the
destination and partition the Network.
A pair of attacker nodes may create a wormhole and shortcut the normal flows between
each other.
The attacker may advertise a route with a smaller distance metric than the actual distance
to the destination.
The existing ADHOC routing protocols such as ADHOC on Demand distance vector
(ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not
provide a trusted environment so a malicious attacker can readily become a router and
disrupt network operations by disobeying the protocol specifications.
References
1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET
Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622,
Vol. 4, Issue 5( Version 6), May 2014, pp.110-115.
2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”,
International journal of soft computing and engineering (ijsce) ISSN: 2231-2307
volume-2, issue-6, January 2013.
3. Stallings William(2000), network security essentials : applications and standards;
Pearson education
4. Stallings William (2003), cryptography and network security principles and practices;
Pearson education 3rd edition.
5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure
on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference
on advanced computing & communication technologies.
6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg
ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25,
2003.Proceedings
References continued…
7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” ,
Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-
hoc Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf
8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. “http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”.
9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in
wireless ad hoc networks” , IEEE communications magazine October 2002.
10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi,
Department of computer science and electrical engineering university of Maryland, baltimore
county.
Thank you