SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Security on Mobile Ad-hoc Network 
by 
Abdullah Mukhtar 
(Network Security Engineer)
Outline 
 Introduction 
 Primary Goals of Security in MANET 
 Key management 
 Classification of attacks 
 Problems Arises in MANET
Introduction 
• Mobile ad hoc networks are formed dynamically by an 
autonomous system of mobile nodes that are connected 
via wireless links. 
• Multihop communication- node communicate with the 
help of two or more node from source to destination. 
• No existing fixed infrastructure or centralized administration 
–No base station. 
• Mobile nodes are free to move randomly. 
•Network topology changes frequently. 
• May Operate as standalone fashion or also can be connected to the larger internet. 
• Each node work as router.
Primary Goals of Security in MANET 
To assure a reliable data transfer over the communication networks and to protect 
the system resources a number of security services are classified in five 
categories:- 
Authentication:- The process of identifying an individual , usually based on a 
username and password. 
Confidentially:- Confidentiality aims at protecting the data from disclosure to 
unauthorized person. 
Network attacks against confidentiality 
Packet capturing 
Password attack 
Port scanning 
Dumpster Diving 
Wiretapping 
Phishing and Pharming 
Non repudiation:- Integrity guarantees that a message being transferred is never 
corrupted.
Continued… 
Integrity:- Integrity guarantees that a message being transferred is never corrupted. 
 network attack against integrity 
 Salami attack 
 trust relationship attacks 
 Man in the middle attack 
 Session hijacking attacks 
Availability:- Its ensure that data ,network resources or network services are 
available to legitimate user when required. 
 network attack against availability 
 Denial of services attacks 
 Distributed denial of services attack 
 SYN flood attacks and ICMP flood attacks 
 Electrical power attacks 
 Server Room environment attacks
Key management 
The security in networking is in many cases dependent on proper key management. 
Key management consists of various services, of which each is vital for the security 
of the networking systems. 
 Trust model:-Its must determine how much different element in the 
network can trust each other. 
 Cryptosystem:- Public and symmetric key mechanism can be applied . 
 Key creation:- It must determine which parties are allowed to 
generate key to themselves. 
 Key storage :- In adhoc network any network element may have to store 
its own key and possibly key of other element as well. 
 Key distribution:- The key management service must ensure that the 
generated keys are securely distributed to their owners.
Classification of attacks 
Attacks on network are divided into two categories – 
•Internal attack 
•External attack. 
In internal attacks, the adversary (attacker) wants to gain the normal access to the network 
and participate the network activities, either by some malicious impersonation to get 
the access to the network as a new node, or by directly compromising a current node 
and using it as a basis to conduct its malicious behaviors 
In external attacks, the attacker aims to cause congestion, propagate fake routing 
information or disturb nodes from providing services. 
MANETs are basically vulnerable to two different types of attacks: 
o active attacks 
o passive attacks.
Continued…. 
 Some of the active attacks 
• Black hole 
• Byzantine 
• Wormhole 
• Spoofing attack 
• Sybil 
Fig1. Black hole problem 
Fig 2. Wormhole attack Fig 3. Flooding attack
Problems Arises in MANET 
The attacker may target the route maintenance process and advertise that an 
operational link is broken. 
One more problem is the attacker along an established route may drop the packet, 
modify the content of packet or duplicates the packets it has already forwarded 
 Attack via network layer packet blasting ,in which the attacker injects a large amount 
of junk packets in to the network, these packets waste a significant portion of 
the network resources and introduce severe wireless channel contention and 
network congestion in MANET 
By attacking routing protocol the attacker can attract traffic towards certain destination 
in the nodes under their control and cause the packet to be forwarded along a 
route that is not optional. 
The attacker can create routing loops in the network and introduce severe network 
congestion and channel contention in certain areas
Continued… 
 Many colluding attracters may even prevent a source node from finding any route to the 
destination and partition the Network. 
 A pair of attacker nodes may create a wormhole and shortcut the normal flows between 
each other. 
 The attacker may advertise a route with a smaller distance metric than the actual distance 
to the destination. 
 The existing ADHOC routing protocols such as ADHOC on Demand distance vector 
(ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not 
provide a trusted environment so a malicious attacker can readily become a router and 
disrupt network operations by disobeying the protocol specifications.
References 
1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET 
Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622, 
Vol. 4, Issue 5( Version 6), May 2014, pp.110-115. 
2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”, 
International journal of soft computing and engineering (ijsce) ISSN: 2231-2307 
volume-2, issue-6, January 2013. 
3. StallingsWilliam(2000), network security essentials : applications and standards; 
Pearson education 
4. StallingsWilliam (2003), cryptography and network security principles and practices; 
Pearson education 3rd edition. 
5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure 
on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference 
on advanced computing & communication technologies. 
6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg 
ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25, 
2003.Proceedings
References continued… 
7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” , 
Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-hoc 
Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf 
8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. 
“http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”. 
9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in 
wireless ad hoc networks” , IEEE communications magazine October 2002. 
10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi, 
Department of computer science and electrical engineering university of Maryland, baltimore 
county.
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothidivyajyothi405
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 

Was ist angesagt? (20)

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Grayhole
GrayholeGrayhole
Grayhole
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Presentation1
Presentation1Presentation1
Presentation1
 
Manet
ManetManet
Manet
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 

Andere mochten auch

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Bio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersBio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersChris Dagdigian
 
I Rmag Guide Sept09
I Rmag Guide Sept09I Rmag Guide Sept09
I Rmag Guide Sept09Eric Hill
 
The Expansive Hospital Game
The Expansive Hospital GameThe Expansive Hospital Game
The Expansive Hospital GameUTFPR
 
How Sweco creates operationally high performance buildings and reduce client...
How Sweco creates  operationally high performance buildings and reduce client...How Sweco creates  operationally high performance buildings and reduce client...
How Sweco creates operationally high performance buildings and reduce client...Carita Kottila
 
Presentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanPresentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanWhitbags
 
2nd Qatar BIM User Day Document Control and Collaboration Technologies
2nd Qatar BIM User Day  Document Control and Collaboration Technologies2nd Qatar BIM User Day  Document Control and Collaboration Technologies
2nd Qatar BIM User Day Document Control and Collaboration TechnologiesBIM User Day
 
Space based BIM technology
Space based BIM technologySpace based BIM technology
Space based BIM technologySeungkyu Yang
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
BIM at Stanford - Building Success
BIM at Stanford - Building SuccessBIM at Stanford - Building Success
BIM at Stanford - Building SuccessJason Holbrook, PMP
 
The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
BIM for Lifecycle Asset Management
BIM for Lifecycle Asset ManagementBIM for Lifecycle Asset Management
BIM for Lifecycle Asset ManagementEdwin Bartlett
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 

Andere mochten auch (17)

8. eBook #8 time theft
8. eBook #8 time theft8. eBook #8 time theft
8. eBook #8 time theft
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Bio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersBio-IT for Core Facility Managers
Bio-IT for Core Facility Managers
 
I Rmag Guide Sept09
I Rmag Guide Sept09I Rmag Guide Sept09
I Rmag Guide Sept09
 
The Expansive Hospital Game
The Expansive Hospital GameThe Expansive Hospital Game
The Expansive Hospital Game
 
How Sweco creates operationally high performance buildings and reduce client...
How Sweco creates  operationally high performance buildings and reduce client...How Sweco creates  operationally high performance buildings and reduce client...
How Sweco creates operationally high performance buildings and reduce client...
 
Presentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanPresentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclan
 
2nd Qatar BIM User Day Document Control and Collaboration Technologies
2nd Qatar BIM User Day  Document Control and Collaboration Technologies2nd Qatar BIM User Day  Document Control and Collaboration Technologies
2nd Qatar BIM User Day Document Control and Collaboration Technologies
 
What does BIM mean to a maintenance technician? Beyond the hype, a practical ...
What does BIM mean to a maintenance technician? Beyond the hype, a practical ...What does BIM mean to a maintenance technician? Beyond the hype, a practical ...
What does BIM mean to a maintenance technician? Beyond the hype, a practical ...
 
Space based BIM technology
Space based BIM technologySpace based BIM technology
Space based BIM technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
BIM at Stanford - Building Success
BIM at Stanford - Building SuccessBIM at Stanford - Building Success
BIM at Stanford - Building Success
 
The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
BIM for Lifecycle Asset Management
BIM for Lifecycle Asset ManagementBIM for Lifecycle Asset Management
BIM for Lifecycle Asset Management
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Manet
ManetManet
Manet
 

Ähnlich wie Abdullah Mukhtar ppt

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)IRJET Journal
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networkseditor1knowledgecuddle
 
A Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsA Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsijsrd.com
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksIRJET Journal
 
Rm presentation on research paper
Rm presentation on research paperRm presentation on research paper
Rm presentation on research paperZeeshan Ahmed
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETEFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Ähnlich wie Abdullah Mukhtar ppt (20)

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
T04506110115
T04506110115T04506110115
T04506110115
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
A Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsA Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETs
 
E0432933
E0432933E0432933
E0432933
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
Rm presentation on research paper
Rm presentation on research paperRm presentation on research paper
Rm presentation on research paper
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETEFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Kürzlich hochgeladen

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 

Kürzlich hochgeladen (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Abdullah Mukhtar ppt

  • 1. Security on Mobile Ad-hoc Network by Abdullah Mukhtar (Network Security Engineer)
  • 2. Outline  Introduction  Primary Goals of Security in MANET  Key management  Classification of attacks  Problems Arises in MANET
  • 3. Introduction • Mobile ad hoc networks are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links. • Multihop communication- node communicate with the help of two or more node from source to destination. • No existing fixed infrastructure or centralized administration –No base station. • Mobile nodes are free to move randomly. •Network topology changes frequently. • May Operate as standalone fashion or also can be connected to the larger internet. • Each node work as router.
  • 4. Primary Goals of Security in MANET To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:- Authentication:- The process of identifying an individual , usually based on a username and password. Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person. Network attacks against confidentiality Packet capturing Password attack Port scanning Dumpster Diving Wiretapping Phishing and Pharming Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
  • 5. Continued… Integrity:- Integrity guarantees that a message being transferred is never corrupted.  network attack against integrity  Salami attack  trust relationship attacks  Man in the middle attack  Session hijacking attacks Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.  network attack against availability  Denial of services attacks  Distributed denial of services attack  SYN flood attacks and ICMP flood attacks  Electrical power attacks  Server Room environment attacks
  • 6. Key management The security in networking is in many cases dependent on proper key management. Key management consists of various services, of which each is vital for the security of the networking systems.  Trust model:-Its must determine how much different element in the network can trust each other.  Cryptosystem:- Public and symmetric key mechanism can be applied .  Key creation:- It must determine which parties are allowed to generate key to themselves.  Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.  Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
  • 7. Classification of attacks Attacks on network are divided into two categories – •Internal attack •External attack. In internal attacks, the adversary (attacker) wants to gain the normal access to the network and participate the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors In external attacks, the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services. MANETs are basically vulnerable to two different types of attacks: o active attacks o passive attacks.
  • 8. Continued….  Some of the active attacks • Black hole • Byzantine • Wormhole • Spoofing attack • Sybil Fig1. Black hole problem Fig 2. Wormhole attack Fig 3. Flooding attack
  • 9. Problems Arises in MANET The attacker may target the route maintenance process and advertise that an operational link is broken. One more problem is the attacker along an established route may drop the packet, modify the content of packet or duplicates the packets it has already forwarded  Attack via network layer packet blasting ,in which the attacker injects a large amount of junk packets in to the network, these packets waste a significant portion of the network resources and introduce severe wireless channel contention and network congestion in MANET By attacking routing protocol the attacker can attract traffic towards certain destination in the nodes under their control and cause the packet to be forwarded along a route that is not optional. The attacker can create routing loops in the network and introduce severe network congestion and channel contention in certain areas
  • 10. Continued…  Many colluding attracters may even prevent a source node from finding any route to the destination and partition the Network.  A pair of attacker nodes may create a wormhole and shortcut the normal flows between each other.  The attacker may advertise a route with a smaller distance metric than the actual distance to the destination.  The existing ADHOC routing protocols such as ADHOC on Demand distance vector (ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not provide a trusted environment so a malicious attacker can readily become a router and disrupt network operations by disobeying the protocol specifications.
  • 11. References 1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 5( Version 6), May 2014, pp.110-115. 2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”, International journal of soft computing and engineering (ijsce) ISSN: 2231-2307 volume-2, issue-6, January 2013. 3. StallingsWilliam(2000), network security essentials : applications and standards; Pearson education 4. StallingsWilliam (2003), cryptography and network security principles and practices; Pearson education 3rd edition. 5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference on advanced computing & communication technologies. 6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25, 2003.Proceedings
  • 12. References continued… 7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” , Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf 8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. “http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”. 9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in wireless ad hoc networks” , IEEE communications magazine October 2002. 10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi, Department of computer science and electrical engineering university of Maryland, baltimore county.

Hinweis der Redaktion

  1. Referrences
  2. References continued…