SlideShare ist ein Scribd-Unternehmen logo
1 von 35
1
2
Prepared By
Md. Al-Amin-Al-Mehedi
Sr.System Engineer
Contact: mehedi480@gmail.com
+8801718161615
3
Content
 Introduction
 What is MANET ?
 Characteristic of MANET
 Routing protocol on MANET
 What is DSR protocol ?
 What is DSDV protocol ?
 What is AODV Protocol?
 Why We Use AODV Protocol?
 Security On AODV Protocol.
 Route discovery process of AODV
 Different attacks On AODV Protocol.
 Wormhole attack
 Colluding misrelay attack
 Replay attack
 False route error message
 What is DDOS Attacks?
 What is Black Hole Attack?
 Why AODV is vulnerable ?
 Conclusion
 Future Work
4
Introduction
Wireless ad-hoc networks are composed of
autonomous nodes that are self- managed
without any infrastructure. In this way, ad-hoc
networks have a dynamic topology such that
nodes can easily join or leave the network at
any time.
5
What is MANET?
A collection of wireless mobile hosts
forming a temporary network without the
aid of any established infrastructure. Each
node operates as both an end-system and
a router.
6
Characteristics of MANET
MANET characteristics:
Mobility and dynamic topology
Bandwidth-constrained
Energy-constrained
Prone to security threats
7
Routing protocol on MANET
The routing protocols for a MANET are:
Dynamic source routing protocol (DSR)
Destination-sequenced distance-vector routing
protocol (DSDV)
Ad hoc on-demand distance vector (AODV)
8
What is DSR Protocol?
The Dynamic Source Routing protocol
(DSR) is a simple and efficient routing
protocol designed specifically for use in
multi-hop wireless ad hoc networks of
mobile nodes.
9
What is DSDV protocol?
The DSDV described is a table-driven
proactive protocol. The basic
improvements made include freedom from
loops in routing tables, more dynamic and
less convergence time.
10
What is AODV Protocol?
Ad-hoc On-Demand Distance Vector
(AODV) is an on demand routing protocol.
which is used to find a route between the
source and destination node as needed.
11
Why We Use AODV Protocol?
We select AODV Protocol because:
 One of the leading protocols for MANET
 Uses sequence numbers to avoid loops
 Quick adaptation to dynamic networks
 Unicasting and multicasting is possible
 Avoids counting to infinity problem
12
Security Design Issues in AODV
In based on security issues of AODV protocol
divided in to three categories, they are:
Key Exchange
Secure Routing
Data Protection
13
Security Design Issues in AODV
(Cont…)
Key exchange:
Nodes can generate a Group Session Key
between immediate neighbors using a
suitable group keying protocol.
These session keys are used for securing
the routing process and data flow.
Thus authentication, confidentiality and
integrity are assured.
14
Security Design Issues in AODV
(Cont…)
Secure Routing (RREQ):
Fig1(a): Secure routing (RREQ)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
15
Security Design Issues in AODV
(Cont…)
Data Protection:
Node ‘x’ desiring to establish end-to-end secure
data channel, first establishes a session key Kxy
with ‘y’.
‘x’ symmetrically encrypts the data packet using
Kxy and transmits it over the secure route.
Intermediate nodes forward the packet in the
intended direction.
Node ‘y’ decrypts the encrypted data packet using
Kxy.
16
Security Design Issues in AODV
(Cont…)
Secure Routing (RREP):
Fig1(b): Secure routing (RREP)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
Kxy
17
Route discovery Process on
AODV protocol
Route request (RREQ):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.2 (a)
Fig.2 (b)
18
Route discovery Process on
AODV protocol
Route request (RREQ):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.2. (c) Fig.2. (d)
19
Route discovery Process on
AODV protocol
Routes reply (RREP):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.3 (a)
Fig.3 (b)
20
Different attacks On AODV
Protocol
Known attacks on AODV are:
 Wormhole attack
 Colluding misrelay attack
 Replay attacks.
 False route error.
 DDOS attack.
21
Wormhole attack
Wormhole attack:
In this attack, a pair of colluding attackers record
packets at one location and replay them at
another location using a private high speed
network. The seriousness of this attack is that it
can be launched against all communications that
provide authenticity and confidentiality.
22
Wormhole attack (Cont…)
RREQ
RREQ through wormhole
RREP
Wireless link
Wormhole link
Fig 4: Wormhole Attack
4 6 8
1 11
753 9
2
10
Attacker1 Attacker2
Target
23
Colluding misrelay attack
Colluding misrelay attack:
In colluding misrelay attack, multiple attackers
work in collusion to modify or drop routing
packets to disrupt routing operation in a MANET.
This attack is difficult to detect by using the
conventional methods such as watchdog and
path rater.
24
Colluding misrelay attack (Cont..)
Correct routing packet
Modified routing packet
Fig 5 : Colluding misrelay attack
1 2 3 4
Attacker1 Attacker2
25
Replay Attack
Replay Attack:
A replay attack is a form of network attack in
which a valid data transmission is maliciously
repeated or delayed. This is carried out either by
the originator or by an adversary who intercepts
the data and retransmits it, possibly as part of a
masquerade attack by IP packet substitution.
26
False Route Error Message
False Route Error Message:
The destination node or an intermediate node
along an active path moves or fails, the node
which precedes the broken link broadcast a
route error message to all active neighbors
which precede the broken link. The nodes then
invalidate the route for this destination in their
routing tables.
27
What Is DDOS Attacks?
Distributed Denial of Service (DDoS) attacks
involve breaking in to hundreds or thousands
of machines, so for this reason, this attack
called Distributed. This kind of attack,
consume more bandwidth and uses more
sources in network. One of the most important
attacks of DDoS attacks category is Black
hole attack.
28
What Is Black Hole Attack?
A black hole attack is a severe attack that
can be easily employed against routing in
mobile ad hoc networks. A black hole is a
malicious node that falsely replies for any
route requests without having active route to
specified destination and drops all the
receiving packets.
29
Caused of Black hole attack
Scenario before the black hole attack:
A B C D
Active Link
Non active Link
Fig 6. (a)
30
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
M gets control over
A-D communications
Step 1
Fig.6. (b)
31
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
Step 2
Black Hole
Packet Drop
Fig.6. (c)
32
Why AODV is vulnerable
AODV is particularly vulnerable due to its fundamental
characteristics, such as open medium, dynamic
topology, distributed cooperation, and constrained
capability.
Each mobile node operates not only as a host but
also as a router.
33
Conclusion
The performance of routing protocols AODV
depends heavily on much kind of attacks.
One of these attacks is Black hole attack.
This attack has high effect on AODV
protocol.
34
Future Work
For future work, I want to show the
performance of AODV protocol when it is
affected by the black hole attack. I will
use network simulator-2(NS-2) to show
the performance of AODV protocol during
black hole attack.
Study and analysis vurnerability of aodv protocol

Weitere ähnliche Inhalte

Was ist angesagt?

Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
journal ijrtem
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
ijdpsjournal
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attack
ijma
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 

Was ist angesagt? (20)

C0331215
C0331215C0331215
C0331215
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and Prevention
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
A43030104
A43030104A43030104
A43030104
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Review of black hole and grey hole attack
Review of black hole and grey hole attackReview of black hole and grey hole attack
Review of black hole and grey hole attack
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
B43040610
B43040610B43040610
B43040610
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 

Andere mochten auch

Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Ravi Teja P
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
Mehedi
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
Ashraf Uddin
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 

Andere mochten auch (18)

Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols
 
5G Service type and deployment scenarios
5G Service type and deployment scenarios5G Service type and deployment scenarios
5G Service type and deployment scenarios
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 

Ähnlich wie Study and analysis vurnerability of aodv protocol

An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
ijsrd.com
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
pijans
 

Ähnlich wie Study and analysis vurnerability of aodv protocol (20)

TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Injectionofattacksinmanets
InjectionofattacksinmanetsInjectionofattacksinmanets
Injectionofattacksinmanets
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
B017130508
B017130508B017130508
B017130508
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
E0432933
E0432933E0432933
E0432933
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok PanwarPerformance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
 

Kürzlich hochgeladen

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Kürzlich hochgeladen (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Study and analysis vurnerability of aodv protocol

  • 1. 1
  • 2. 2 Prepared By Md. Al-Amin-Al-Mehedi Sr.System Engineer Contact: mehedi480@gmail.com +8801718161615
  • 3. 3 Content  Introduction  What is MANET ?  Characteristic of MANET  Routing protocol on MANET  What is DSR protocol ?  What is DSDV protocol ?  What is AODV Protocol?  Why We Use AODV Protocol?  Security On AODV Protocol.  Route discovery process of AODV  Different attacks On AODV Protocol.  Wormhole attack  Colluding misrelay attack  Replay attack  False route error message  What is DDOS Attacks?  What is Black Hole Attack?  Why AODV is vulnerable ?  Conclusion  Future Work
  • 4. 4 Introduction Wireless ad-hoc networks are composed of autonomous nodes that are self- managed without any infrastructure. In this way, ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time.
  • 5. 5 What is MANET? A collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure. Each node operates as both an end-system and a router.
  • 6. 6 Characteristics of MANET MANET characteristics: Mobility and dynamic topology Bandwidth-constrained Energy-constrained Prone to security threats
  • 7. 7 Routing protocol on MANET The routing protocols for a MANET are: Dynamic source routing protocol (DSR) Destination-sequenced distance-vector routing protocol (DSDV) Ad hoc on-demand distance vector (AODV)
  • 8. 8 What is DSR Protocol? The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes.
  • 9. 9 What is DSDV protocol? The DSDV described is a table-driven proactive protocol. The basic improvements made include freedom from loops in routing tables, more dynamic and less convergence time.
  • 10. 10 What is AODV Protocol? Ad-hoc On-Demand Distance Vector (AODV) is an on demand routing protocol. which is used to find a route between the source and destination node as needed.
  • 11. 11 Why We Use AODV Protocol? We select AODV Protocol because:  One of the leading protocols for MANET  Uses sequence numbers to avoid loops  Quick adaptation to dynamic networks  Unicasting and multicasting is possible  Avoids counting to infinity problem
  • 12. 12 Security Design Issues in AODV In based on security issues of AODV protocol divided in to three categories, they are: Key Exchange Secure Routing Data Protection
  • 13. 13 Security Design Issues in AODV (Cont…) Key exchange: Nodes can generate a Group Session Key between immediate neighbors using a suitable group keying protocol. These session keys are used for securing the routing process and data flow. Thus authentication, confidentiality and integrity are assured.
  • 14. 14 Security Design Issues in AODV (Cont…) Secure Routing (RREQ): Fig1(a): Secure routing (RREQ) a b h c e f n p i y x g Ka Kb Kh Kn Kx Kx Kc Ke Kf Kp Kf Kg
  • 15. 15 Security Design Issues in AODV (Cont…) Data Protection: Node ‘x’ desiring to establish end-to-end secure data channel, first establishes a session key Kxy with ‘y’. ‘x’ symmetrically encrypts the data packet using Kxy and transmits it over the secure route. Intermediate nodes forward the packet in the intended direction. Node ‘y’ decrypts the encrypted data packet using Kxy.
  • 16. 16 Security Design Issues in AODV (Cont…) Secure Routing (RREP): Fig1(b): Secure routing (RREP) a b h c e f n p i y x g Ka Kb Kh Kn Kx Kx Kc Ke Kf Kp Kf Kg Kxy
  • 17. 17 Route discovery Process on AODV protocol Route request (RREQ): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.2 (a) Fig.2 (b)
  • 18. 18 Route discovery Process on AODV protocol Route request (RREQ): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.2. (c) Fig.2. (d)
  • 19. 19 Route discovery Process on AODV protocol Routes reply (RREP): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.3 (a) Fig.3 (b)
  • 20. 20 Different attacks On AODV Protocol Known attacks on AODV are:  Wormhole attack  Colluding misrelay attack  Replay attacks.  False route error.  DDOS attack.
  • 21. 21 Wormhole attack Wormhole attack: In this attack, a pair of colluding attackers record packets at one location and replay them at another location using a private high speed network. The seriousness of this attack is that it can be launched against all communications that provide authenticity and confidentiality.
  • 22. 22 Wormhole attack (Cont…) RREQ RREQ through wormhole RREP Wireless link Wormhole link Fig 4: Wormhole Attack 4 6 8 1 11 753 9 2 10 Attacker1 Attacker2 Target
  • 23. 23 Colluding misrelay attack Colluding misrelay attack: In colluding misrelay attack, multiple attackers work in collusion to modify or drop routing packets to disrupt routing operation in a MANET. This attack is difficult to detect by using the conventional methods such as watchdog and path rater.
  • 24. 24 Colluding misrelay attack (Cont..) Correct routing packet Modified routing packet Fig 5 : Colluding misrelay attack 1 2 3 4 Attacker1 Attacker2
  • 25. 25 Replay Attack Replay Attack: A replay attack is a form of network attack in which a valid data transmission is maliciously repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution.
  • 26. 26 False Route Error Message False Route Error Message: The destination node or an intermediate node along an active path moves or fails, the node which precedes the broken link broadcast a route error message to all active neighbors which precede the broken link. The nodes then invalidate the route for this destination in their routing tables.
  • 27. 27 What Is DDOS Attacks? Distributed Denial of Service (DDoS) attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. This kind of attack, consume more bandwidth and uses more sources in network. One of the most important attacks of DDoS attacks category is Black hole attack.
  • 28. 28 What Is Black Hole Attack? A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets.
  • 29. 29 Caused of Black hole attack Scenario before the black hole attack: A B C D Active Link Non active Link Fig 6. (a)
  • 30. 30 Caused of Black hole attack (Cont..) Scenario after the black hole attack: A B C D M M gets control over A-D communications Step 1 Fig.6. (b)
  • 31. 31 Caused of Black hole attack (Cont..) Scenario after the black hole attack: A B C D M Step 2 Black Hole Packet Drop Fig.6. (c)
  • 32. 32 Why AODV is vulnerable AODV is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Each mobile node operates not only as a host but also as a router.
  • 33. 33 Conclusion The performance of routing protocols AODV depends heavily on much kind of attacks. One of these attacks is Black hole attack. This attack has high effect on AODV protocol.
  • 34. 34 Future Work For future work, I want to show the performance of AODV protocol when it is affected by the black hole attack. I will use network simulator-2(NS-2) to show the performance of AODV protocol during black hole attack.

Hinweis der Redaktion

  1. Custom animation effects: sparkle (Basic) To reproduce the text on this slide, do the following: On the Home tab, in the Slides group, click Layout, and then click Blank. On the Insert tab, in the Text group, click Text Box. On the slide, drag to draw a text box. Enter text and select it. On the Home tab, in the Font group, in the Font list select Franklin Gothic Heavy, and then in the Font Size box, select 96 pt. On the Home tab, in the Paragraph group, click Center. Select the text box, and then under Drawing Tools, on the Format tab, in the WordArt Styles group, click Text Effects, point to Reflection, and under Reflection Variations select Tight Reflection, Touching (first row, the first option from the left). With the text box still selected, under Drawing Tools, on the Format tab, in the bottom right corner of the WordArt Styles group, click the Format Text Effects: Text Box dialog box launcher. In the Format Text Effects dialog box, click Text Fill in the left pane, select Gradient fill in the Text Fill pane, and then do the following: Click the button next to Preset colors, and then click Ocean (second row, second option from the left). In the Type list, select Linear. Click the button next to Direction, and then click Linear Up (second row, second option from the left). Also in the Format Text Effects dialog box, click 3-D Format in the left pane. In the 3-D Format pane, under Bevel, click the button next to Top, and then under Bevel click Circle (first row, first option from the left). To reproduce the first star on this slide, do the following: On the Home tab, in the Drawing group, click Shapes, and then under Stars and Banners click 4-Point Star (first row, third option from the left). On the slide, drag to draw a star. On the slide, drag the star onto the top of the first letter (in the example slide, it is “S”) in the text box. With the star still selected, drag the yellow diamond adjustment handle down to make the points thinner. On the Home tab, in the bottom right corner in the Drawing group, click the Format Shape dialog box launcher. In the Format Shape dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following: In the Type list, select Radial. Click the button next to Direction, and then click From Center (third option from the left). Under Gradient stops, click Add or Remove until two stops appear in the drop-down list. Also under Gradient stops, customize the gradient stops that you added as follows: Select Stop 1 from the list, and then do the following: In the Stop position box, enter 0%. Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left). Select Stop 2 from the list, and then do the following: In the Stop position box, enter 100%. Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left). In the Transparency box, enter 100%. Also in the Format Shape dialog box, click Line Color in the left pane, and in the Line Color pane click No line. Under Drawing Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, under Size and rotation do the following: In the Height box, enter 0.51”. In the Width box, enter 0.51”. In the Rotation box, enter 15°. To reproduce the other stars on this slide, do the following: On the slide, select the star. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate. On the slide, drag the second star until it slightly overlaps the edge of a letter in the text box. Change the size of the star in the Drawing Tools, on the Format tab, in the Size group. Repeat steps 1-3 for a total of five stars. To reproduce the animation effects on this slide, do the following: On the Animations tab, in the Animations group, click Custom Animation. On the slide, select the first star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn. Select the animation effect (grow & turn entrance effect for the first star). Under Modify: Grow & Turn, do the following: In the Start list, select With Previous. In the Speed list, select Very Fast. On the slide, select the first star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn. Select the second animation effect (grow & turn exit effect for the first star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.7. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the second star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn. Select the third animation effect (grow & turn entrance effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.2. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the second star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn. Select the fourth animation effect (grow & turn exit effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.9. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the third star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn. Select the fifth animation effect (grow & turn entrance effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.4. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the third star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn. Select the sixth animation effect (grow & turn exit effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 1.1. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn. Select the seventh animation effect (grow & turn entrance effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.8. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn. Select the eighth animation effect (grow & turn exit effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 1.4. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn. Select the ninth animation effect (grow & turn entrance effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 0.9. In the Speed list, select 0.5 seconds (Very Fast). On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following: Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn. Select the 10th animation effect (grow & turn exit effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following: In the Start list, select With Previous. In the Delay box enter 1.5. In the Speed list, select 0.5 seconds (Very Fast). To reproduce the background effects on this slide, do the following: Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following: In the Type list, select Radial. Click the button next to Direction, and then click From Center (third option from the left). Under Gradient stops, click Add or Remove until two stops appear in the drop-down list. Also under Gradient stops, customize the gradient stops that you added as follows: Select Stop 1 from the list, and then do the following: In the Stop position box, enter 0%. Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 35% (third row, second option from the left). Select Stop 2 from the list, and then do the following: In the Stop position box, enter 100%. Click the button next to Color, and then under Theme Colors click Black, Text 1 (first row, second option from the left).