3. 3
Content
Introduction
What is MANET ?
Characteristic of MANET
Routing protocol on MANET
What is DSR protocol ?
What is DSDV protocol ?
What is AODV Protocol?
Why We Use AODV Protocol?
Security On AODV Protocol.
Route discovery process of AODV
Different attacks On AODV Protocol.
Wormhole attack
Colluding misrelay attack
Replay attack
False route error message
What is DDOS Attacks?
What is Black Hole Attack?
Why AODV is vulnerable ?
Conclusion
Future Work
4. 4
Introduction
Wireless ad-hoc networks are composed of
autonomous nodes that are self- managed
without any infrastructure. In this way, ad-hoc
networks have a dynamic topology such that
nodes can easily join or leave the network at
any time.
5. 5
What is MANET?
A collection of wireless mobile hosts
forming a temporary network without the
aid of any established infrastructure. Each
node operates as both an end-system and
a router.
6. 6
Characteristics of MANET
MANET characteristics:
Mobility and dynamic topology
Bandwidth-constrained
Energy-constrained
Prone to security threats
7. 7
Routing protocol on MANET
The routing protocols for a MANET are:
Dynamic source routing protocol (DSR)
Destination-sequenced distance-vector routing
protocol (DSDV)
Ad hoc on-demand distance vector (AODV)
8. 8
What is DSR Protocol?
The Dynamic Source Routing protocol
(DSR) is a simple and efficient routing
protocol designed specifically for use in
multi-hop wireless ad hoc networks of
mobile nodes.
9. 9
What is DSDV protocol?
The DSDV described is a table-driven
proactive protocol. The basic
improvements made include freedom from
loops in routing tables, more dynamic and
less convergence time.
10. 10
What is AODV Protocol?
Ad-hoc On-Demand Distance Vector
(AODV) is an on demand routing protocol.
which is used to find a route between the
source and destination node as needed.
11. 11
Why We Use AODV Protocol?
We select AODV Protocol because:
One of the leading protocols for MANET
Uses sequence numbers to avoid loops
Quick adaptation to dynamic networks
Unicasting and multicasting is possible
Avoids counting to infinity problem
12. 12
Security Design Issues in AODV
In based on security issues of AODV protocol
divided in to three categories, they are:
Key Exchange
Secure Routing
Data Protection
13. 13
Security Design Issues in AODV
(Cont…)
Key exchange:
Nodes can generate a Group Session Key
between immediate neighbors using a
suitable group keying protocol.
These session keys are used for securing
the routing process and data flow.
Thus authentication, confidentiality and
integrity are assured.
14. 14
Security Design Issues in AODV
(Cont…)
Secure Routing (RREQ):
Fig1(a): Secure routing (RREQ)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
15. 15
Security Design Issues in AODV
(Cont…)
Data Protection:
Node ‘x’ desiring to establish end-to-end secure
data channel, first establishes a session key Kxy
with ‘y’.
‘x’ symmetrically encrypts the data packet using
Kxy and transmits it over the secure route.
Intermediate nodes forward the packet in the
intended direction.
Node ‘y’ decrypts the encrypted data packet using
Kxy.
16. 16
Security Design Issues in AODV
(Cont…)
Secure Routing (RREP):
Fig1(b): Secure routing (RREP)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
Kxy
20. 20
Different attacks On AODV
Protocol
Known attacks on AODV are:
Wormhole attack
Colluding misrelay attack
Replay attacks.
False route error.
DDOS attack.
21. 21
Wormhole attack
Wormhole attack:
In this attack, a pair of colluding attackers record
packets at one location and replay them at
another location using a private high speed
network. The seriousness of this attack is that it
can be launched against all communications that
provide authenticity and confidentiality.
22. 22
Wormhole attack (Cont…)
RREQ
RREQ through wormhole
RREP
Wireless link
Wormhole link
Fig 4: Wormhole Attack
4 6 8
1 11
753 9
2
10
Attacker1 Attacker2
Target
23. 23
Colluding misrelay attack
Colluding misrelay attack:
In colluding misrelay attack, multiple attackers
work in collusion to modify or drop routing
packets to disrupt routing operation in a MANET.
This attack is difficult to detect by using the
conventional methods such as watchdog and
path rater.
25. 25
Replay Attack
Replay Attack:
A replay attack is a form of network attack in
which a valid data transmission is maliciously
repeated or delayed. This is carried out either by
the originator or by an adversary who intercepts
the data and retransmits it, possibly as part of a
masquerade attack by IP packet substitution.
26. 26
False Route Error Message
False Route Error Message:
The destination node or an intermediate node
along an active path moves or fails, the node
which precedes the broken link broadcast a
route error message to all active neighbors
which precede the broken link. The nodes then
invalidate the route for this destination in their
routing tables.
27. 27
What Is DDOS Attacks?
Distributed Denial of Service (DDoS) attacks
involve breaking in to hundreds or thousands
of machines, so for this reason, this attack
called Distributed. This kind of attack,
consume more bandwidth and uses more
sources in network. One of the most important
attacks of DDoS attacks category is Black
hole attack.
28. 28
What Is Black Hole Attack?
A black hole attack is a severe attack that
can be easily employed against routing in
mobile ad hoc networks. A black hole is a
malicious node that falsely replies for any
route requests without having active route to
specified destination and drops all the
receiving packets.
29. 29
Caused of Black hole attack
Scenario before the black hole attack:
A B C D
Active Link
Non active Link
Fig 6. (a)
30. 30
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
M gets control over
A-D communications
Step 1
Fig.6. (b)
31. 31
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
Step 2
Black Hole
Packet Drop
Fig.6. (c)
32. 32
Why AODV is vulnerable
AODV is particularly vulnerable due to its fundamental
characteristics, such as open medium, dynamic
topology, distributed cooperation, and constrained
capability.
Each mobile node operates not only as a host but
also as a router.
33. 33
Conclusion
The performance of routing protocols AODV
depends heavily on much kind of attacks.
One of these attacks is Black hole attack.
This attack has high effect on AODV
protocol.
34. 34
Future Work
For future work, I want to show the
performance of AODV protocol when it is
affected by the black hole attack. I will
use network simulator-2(NS-2) to show
the performance of AODV protocol during
black hole attack.
Hinweis der Redaktion
Custom animation effects: sparkle
(Basic)
To reproduce the text on this slide, do the following:
On the Home tab, in the Slides group, click Layout, and then click Blank.
On the Insert tab, in the Text group, click Text Box. On the slide, drag to draw a text box.
Enter text and select it. On the Home tab, in the Font group, in the Font list select Franklin Gothic Heavy, and then in the Font Size box, select 96 pt.
On the Home tab, in the Paragraph group, click Center.
Select the text box, and then under Drawing Tools, on the Format tab, in the WordArt Styles group, click Text Effects, point to Reflection, and under Reflection Variations select Tight Reflection, Touching (first row, the first option from the left).
With the text box still selected, under Drawing Tools, on the Format tab, in the bottom right corner of the WordArt Styles group, click the Format Text Effects: Text Box dialog box launcher. In the Format Text Effects dialog box, click Text Fill in the left pane, select Gradient fill in the Text Fill pane, and then do the following:
Click the button next to Preset colors, and then click Ocean (second row, second option from the left).
In the Type list, select Linear.
Click the button next to Direction, and then click Linear Up (second row, second option from the left).
Also in the Format Text Effects dialog box, click 3-D Format in the left pane. In the 3-D Format pane, under Bevel, click the button next to Top, and then under Bevel click Circle (first row, first option from the left).
To reproduce the first star on this slide, do the following:
On the Home tab, in the Drawing group, click Shapes, and then under Stars and Banners click 4-Point Star (first row, third option from the left). On the slide, drag to draw a star.
On the slide, drag the star onto the top of the first letter (in the example slide, it is “S”) in the text box.
With the star still selected, drag the yellow diamond adjustment handle down to make the points thinner.
On the Home tab, in the bottom right corner in the Drawing group, click the Format Shape dialog box launcher. In the Format Shape dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
In the Type list, select Radial.
Click the button next to Direction, and then click From Center (third option from the left).
Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
Also under Gradient stops, customize the gradient stops that you added as follows:
Select Stop 1 from the list, and then do the following:
In the Stop position box, enter 0%.
Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
Select Stop 2 from the list, and then do the following:
In the Stop position box, enter 100%.
Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
In the Transparency box, enter 100%.
Also in the Format Shape dialog box, click Line Color in the left pane, and in the Line Color pane click No line.
Under Drawing Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, under Size and rotation do the following:
In the Height box, enter 0.51”.
In the Width box, enter 0.51”.
In the Rotation box, enter 15°.
To reproduce the other stars on this slide, do the following:
On the slide, select the star. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate.
On the slide, drag the second star until it slightly overlaps the edge of a letter in the text box.
Change the size of the star in the Drawing Tools, on the Format tab, in the Size group.
Repeat steps 1-3 for a total of five stars.
To reproduce the animation effects on this slide, do the following:
On the Animations tab, in the Animations group, click Custom Animation.
On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the animation effect (grow & turn entrance effect for the first star). Under Modify: Grow & Turn, do the following:
In the Start list, select With Previous.
In the Speed list, select Very Fast.
On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the second animation effect (grow & turn exit effect for the first star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.7.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the third animation effect (grow & turn entrance effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.2.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the fourth animation effect (grow & turn exit effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.9.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the fifth animation effect (grow & turn entrance effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.4.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the sixth animation effect (grow & turn exit effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.1.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the seventh animation effect (grow & turn entrance effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.8.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the eighth animation effect (grow & turn exit effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.4.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the ninth animation effect (grow & turn entrance effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.9.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the 10th animation effect (grow & turn exit effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.5.
In the Speed list, select 0.5 seconds (Very Fast).
To reproduce the background effects on this slide, do the following:
Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
In the Type list, select Radial.
Click the button next to Direction, and then click From Center (third option from the left).
Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
Also under Gradient stops, customize the gradient stops that you added as follows:
Select Stop 1 from the list, and then do the following:
In the Stop position box, enter 0%.
Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 35% (third row, second option from the left).
Select Stop 2 from the list, and then do the following:
In the Stop position box, enter 100%.
Click the button next to Color, and then under Theme Colors click Black, Text 1 (first row, second option from the left).