security issues in manet
DESCRIPTION
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.TRANSCRIPT
![Page 1: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/1.jpg)
Security Attack In MANET
Nitin Verma
2011BTechCSE005
![Page 2: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/2.jpg)
What is MANET ?
• MANET is a type of multi-hop network, infrastructure less and the most important self organizing.
• Due to its wireless and distributed nature there is a great challenge for system security designers.
![Page 3: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/3.jpg)
Characteristics
• Dynamic Topologies
• Energy-constrained Operation
• Limited Bandwidth
![Page 4: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/4.jpg)
Continued…
• Note : One of the main characteristic of MANET’s with respect to security design point of view is the lack of clear line defence.
• There is no well defined rule or place where traffic from different nodes should be monitored or access control mechanisms can be enforced. Due to this, there is no any defence line that separates inside network from the outside network
![Page 5: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/5.jpg)
Challanges
• Movability
• Routing :
PRO-ACTIVE
RE-ACTIVE
HYBRID
![Page 6: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/6.jpg)
Security service
• Authentication : means correct identity is known to communicating authority.
• Confidentiality : means message information is kept secure from unauthorized access.
• Integrity : means message is unaltered during the communication between two parties.
![Page 7: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/7.jpg)
Types of attack
• Active Attack
• Passive Attack
![Page 8: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/8.jpg)
Active attack
• Attacker attempt to modify the data being exchange in network.
• It may disrupts the normal functioning of network.
• In active attack, the intruders can modify the packets, inject the packets, drop the packet or it can use various features of network to launch the attack.
![Page 9: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/9.jpg)
Passive attack
• Attackers snoop the data exchanged in network without altering it.
• This attack target the confidentiality attribute of system.
• It is very difficult to detect because the operation of network is not affected by this kind of attack.
![Page 10: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/10.jpg)
Attacks in manet
• Attacks in MANET can also be classified as :-
• External attack : Carried out by node that do not belong to the domain of the network.
• Internal attack : It is from compromised nodes, which are actually part of the network.
![Page 11: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/11.jpg)
Black hole attack
• A black-hole is a malicious node that falsely replies for route request without having an active route to the destination and exploits the routing protocol to advertise itself as having shortest route to destination.
• By advertising the shortest route, source station starts sending data through the black hole node and it becomes the active element in route.
![Page 12: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/12.jpg)
Wormhole attack
• In this attack, an attacker records packets at one location in the network & tunnel them to another location.
• When an wormhole attack is used against an on-demand routing protocol the attack could prevent the discovery of any routes other than through the wormhole.
![Page 13: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/13.jpg)
Sleep Deprivation
• It is also called as resource consumption attack.
• An attacker can attempt to consume battery life by requesting excessive route discovery, or by forwarding unnecessary packet to the victim node.
![Page 14: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/14.jpg)
Eavesdropping
• The main goal of eavesdropping is obtain to confidential information that should be kept secret during the communication.
• This confidential information may include the location, public key, private key or even password of nodes.
![Page 15: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/15.jpg)
Flooding attack
• RREQ Flooding
• Data Flooding
![Page 16: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/16.jpg)
RREQ flooding
• In the RREQ flooding attack, the attacker broadcast the many RREQ packet for the IP which does not exist in the network.
• Effects :
Consumes network bandwidth.
Consumes node battery power.
![Page 17: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/17.jpg)
Data flooding
• In this, data packets are used to flood the network.
• Effects
Hard to detect.
Can be detected by the application layer.
![Page 18: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/18.jpg)
Security mechanism
• Preventive Mechanism : Conventional authentication & encryption scheme based on cryptography.
Cryptography
Hash function
Digital signature
• Reactive Mechanism : An intrusion detection system is used as second line of defence.
Anomaly based IDS
Signature based IDS
![Page 19: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/19.jpg)
conclusion
• Due to mobility & open media nature, the mobile ad-hoc networks are more prone to security threat compared to the wired network.
• Therefore security need are higher in mobile ad-hoc networks as compared to traditional networks.
![Page 20: Security Issues in MANET](https://reader035.vdocument.in/reader035/viewer/2022081504/5576365cd8b42a015c8b4f67/html5/thumbnails/20.jpg)