security issues in manet

Post on 09-Jun-2015

371 Views

Category:

Engineering

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.

TRANSCRIPT

Security Attack In MANET

Nitin Verma

2011BTechCSE005

What is MANET ?

• MANET is a type of multi-hop network, infrastructure less and the most important self organizing.

• Due to its wireless and distributed nature there is a great challenge for system security designers.

Characteristics

• Dynamic Topologies

• Energy-constrained Operation

• Limited Bandwidth

Continued…

• Note : One of the main characteristic of MANET’s with respect to security design point of view is the lack of clear line defence.

• There is no well defined rule or place where traffic from different nodes should be monitored or access control mechanisms can be enforced. Due to this, there is no any defence line that separates inside network from the outside network

Challanges

• Movability

• Routing :

PRO-ACTIVE

RE-ACTIVE

HYBRID

Security service

• Authentication : means correct identity is known to communicating authority.

• Confidentiality : means message information is kept secure from unauthorized access.

• Integrity : means message is unaltered during the communication between two parties.

Types of attack

• Active Attack

• Passive Attack

Active attack

• Attacker attempt to modify the data being exchange in network.

• It may disrupts the normal functioning of network.

• In active attack, the intruders can modify the packets, inject the packets, drop the packet or it can use various features of network to launch the attack.

Passive attack

• Attackers snoop the data exchanged in network without altering it.

• This attack target the confidentiality attribute of system.

• It is very difficult to detect because the operation of network is not affected by this kind of attack.

Attacks in manet

• Attacks in MANET can also be classified as :-

• External attack : Carried out by node that do not belong to the domain of the network.

• Internal attack : It is from compromised nodes, which are actually part of the network.

Black hole attack

• A black-hole is a malicious node that falsely replies for route request without having an active route to the destination and exploits the routing protocol to advertise itself as having shortest route to destination.

• By advertising the shortest route, source station starts sending data through the black hole node and it becomes the active element in route.

Wormhole attack

• In this attack, an attacker records packets at one location in the network & tunnel them to another location.

• When an wormhole attack is used against an on-demand routing protocol the attack could prevent the discovery of any routes other than through the wormhole.

Sleep Deprivation

• It is also called as resource consumption attack.

• An attacker can attempt to consume battery life by requesting excessive route discovery, or by forwarding unnecessary packet to the victim node.

Eavesdropping

• The main goal of eavesdropping is obtain to confidential information that should be kept secret during the communication.

• This confidential information may include the location, public key, private key or even password of nodes.

Flooding attack

• RREQ Flooding

• Data Flooding

RREQ flooding

• In the RREQ flooding attack, the attacker broadcast the many RREQ packet for the IP which does not exist in the network.

• Effects :

Consumes network bandwidth.

Consumes node battery power.

Data flooding

• In this, data packets are used to flood the network.

• Effects

Hard to detect.

Can be detected by the application layer.

Security mechanism

• Preventive Mechanism : Conventional authentication & encryption scheme based on cryptography.

Cryptography

Hash function

Digital signature

• Reactive Mechanism : An intrusion detection system is used as second line of defence.

Anomaly based IDS

Signature based IDS

conclusion

• Due to mobility & open media nature, the mobile ad-hoc networks are more prone to security threat compared to the wired network.

• Therefore security need are higher in mobile ad-hoc networks as compared to traditional networks.

top related