SlideShare a Scribd company logo
Security on Mobile Ad-hoc Network 
by 
Abdullah Mukhtar 
(Network Security Engineer)
Outline 
 Introduction 
 Primary Goals of Security in MANET 
 Key management 
 Classification of attacks 
 Problems Arises in MANET
Introduction 
• Mobile ad hoc networks are formed dynamically by an 
autonomous system of mobile nodes that are connected 
via wireless links. 
• Multihop communication- node communicate with the 
help of two or more node from source to destination. 
• No existing fixed infrastructure or centralized administration 
–No base station. 
• Mobile nodes are free to move randomly. 
•Network topology changes frequently. 
• May Operate as standalone fashion or also can be connected to the larger internet. 
• Each node work as router.
Primary Goals of Security in MANET 
To assure a reliable data transfer over the communication networks and to protect 
the system resources a number of security services are classified in five 
categories:- 
Authentication:- The process of identifying an individual , usually based on a 
username and password. 
Confidentially:- Confidentiality aims at protecting the data from disclosure to 
unauthorized person. 
Network attacks against confidentiality 
Packet capturing 
Password attack 
Port scanning 
Dumpster Diving 
Wiretapping 
Phishing and Pharming 
Non repudiation:- Integrity guarantees that a message being transferred is never 
corrupted.
Continued… 
Integrity:- Integrity guarantees that a message being transferred is never corrupted. 
 network attack against integrity 
 Salami attack 
 trust relationship attacks 
 Man in the middle attack 
 Session hijacking attacks 
Availability:- Its ensure that data ,network resources or network services are 
available to legitimate user when required. 
 network attack against availability 
 Denial of services attacks 
 Distributed denial of services attack 
 SYN flood attacks and ICMP flood attacks 
 Electrical power attacks 
 Server Room environment attacks
Key management 
The security in networking is in many cases dependent on proper key management. 
Key management consists of various services, of which each is vital for the security 
of the networking systems. 
 Trust model:-Its must determine how much different element in the 
network can trust each other. 
 Cryptosystem:- Public and symmetric key mechanism can be applied . 
 Key creation:- It must determine which parties are allowed to 
generate key to themselves. 
 Key storage :- In adhoc network any network element may have to store 
its own key and possibly key of other element as well. 
 Key distribution:- The key management service must ensure that the 
generated keys are securely distributed to their owners.
Classification of attacks 
Attacks on network are divided into two categories – 
•Internal attack 
•External attack. 
In internal attacks, the adversary (attacker) wants to gain the normal access to the network 
and participate the network activities, either by some malicious impersonation to get 
the access to the network as a new node, or by directly compromising a current node 
and using it as a basis to conduct its malicious behaviors 
In external attacks, the attacker aims to cause congestion, propagate fake routing 
information or disturb nodes from providing services. 
MANETs are basically vulnerable to two different types of attacks: 
o active attacks 
o passive attacks.
Continued…. 
 Some of the active attacks 
• Black hole 
• Byzantine 
• Wormhole 
• Spoofing attack 
• Sybil 
Fig1. Black hole problem 
Fig 2. Wormhole attack Fig 3. Flooding attack
Problems Arises in MANET 
The attacker may target the route maintenance process and advertise that an 
operational link is broken. 
One more problem is the attacker along an established route may drop the packet, 
modify the content of packet or duplicates the packets it has already forwarded 
 Attack via network layer packet blasting ,in which the attacker injects a large amount 
of junk packets in to the network, these packets waste a significant portion of 
the network resources and introduce severe wireless channel contention and 
network congestion in MANET 
By attacking routing protocol the attacker can attract traffic towards certain destination 
in the nodes under their control and cause the packet to be forwarded along a 
route that is not optional. 
The attacker can create routing loops in the network and introduce severe network 
congestion and channel contention in certain areas
Continued… 
 Many colluding attracters may even prevent a source node from finding any route to the 
destination and partition the Network. 
 A pair of attacker nodes may create a wormhole and shortcut the normal flows between 
each other. 
 The attacker may advertise a route with a smaller distance metric than the actual distance 
to the destination. 
 The existing ADHOC routing protocols such as ADHOC on Demand distance vector 
(ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not 
provide a trusted environment so a malicious attacker can readily become a router and 
disrupt network operations by disobeying the protocol specifications.
References 
1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET 
Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622, 
Vol. 4, Issue 5( Version 6), May 2014, pp.110-115. 
2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”, 
International journal of soft computing and engineering (ijsce) ISSN: 2231-2307 
volume-2, issue-6, January 2013. 
3. StallingsWilliam(2000), network security essentials : applications and standards; 
Pearson education 
4. StallingsWilliam (2003), cryptography and network security principles and practices; 
Pearson education 3rd edition. 
5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure 
on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference 
on advanced computing & communication technologies. 
6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg 
ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25, 
2003.Proceedings
References continued… 
7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” , 
Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-hoc 
Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf 
8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. 
“http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”. 
9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in 
wireless ad hoc networks” , IEEE communications magazine October 2002. 
10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi, 
Department of computer science and electrical engineering university of Maryland, baltimore 
county.
Thank you

More Related Content

PPT
Attacks in MANET
PPTX
Security of ad hoc networks
PPTX
Various Security Attacks in mobile ad hoc networks
PPT
Flooding attack manet
PPTX
Protocol manet
PPTX
Security Issues in MANET
PPT
Security in mobile ad hoc networks
PPTX
Security issues in manet
Attacks in MANET
Security of ad hoc networks
Various Security Attacks in mobile ad hoc networks
Flooding attack manet
Protocol manet
Security Issues in MANET
Security in mobile ad hoc networks
Security issues in manet

What's hot (20)

PDF
Attacks on mobile ad hoc networks
PDF
Blackhole attack in Manet
PPTX
Manet - The Art of Networking without a Network
PPT
ad-hoc network by divyajyothi
PPTX
Study of security attacks in manet
PPTX
NetSim Webinar on Network Attacks and Detection
PPTX
Ad-Hoc Networks
PPTX
Wormhole attack
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PDF
Thesis on Mobile Ad-hoc Network (MANET)
PPTX
Grayhole
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PPTX
Mobile ad hoc network
PDF
An intrusion detection system for detecting malicious nodes in manet using tr...
PDF
Wormhole attack detection algorithms in wireless network coding systems
PPT
Ad-HOc presentation
PPTX
Presentation1
PPTX
PDF
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Attacks on mobile ad hoc networks
Blackhole attack in Manet
Manet - The Art of Networking without a Network
ad-hoc network by divyajyothi
Study of security attacks in manet
NetSim Webinar on Network Attacks and Detection
Ad-Hoc Networks
Wormhole attack
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Thesis on Mobile Ad-hoc Network (MANET)
Grayhole
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Mobile ad hoc network
An intrusion detection system for detecting malicious nodes in manet using tr...
Wormhole attack detection algorithms in wireless network coding systems
Ad-HOc presentation
Presentation1
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Ad

Viewers also liked (17)

PDF
8. eBook #8 time theft
PPTX
Mobile Ad hoc Networks
PDF
Bio-IT for Core Facility Managers
PDF
I Rmag Guide Sept09
PPT
The Expansive Hospital Game
PPTX
How Sweco creates operationally high performance buildings and reduce client...
PDF
Presentation to BIM Lancashire Conference 2013 @uclan
PDF
2nd Qatar BIM User Day Document Control and Collaboration Technologies
PDF
What does BIM mean to a maintenance technician? Beyond the hype, a practical ...
PDF
Space based BIM technology
PPTX
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
PPTX
BIM at Stanford - Building Success
PDF
The Benefits of Using a Biometric Timeclock in Workforce Management
PPTX
BIM for Lifecycle Asset Management
PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
PPTX
Manet ppt
PPT
8. eBook #8 time theft
Mobile Ad hoc Networks
Bio-IT for Core Facility Managers
I Rmag Guide Sept09
The Expansive Hospital Game
How Sweco creates operationally high performance buildings and reduce client...
Presentation to BIM Lancashire Conference 2013 @uclan
2nd Qatar BIM User Day Document Control and Collaboration Technologies
What does BIM mean to a maintenance technician? Beyond the hype, a practical ...
Space based BIM technology
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
BIM at Stanford - Building Success
The Benefits of Using a Biometric Timeclock in Workforce Management
BIM for Lifecycle Asset Management
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Manet ppt
Ad

Similar to Abdullah Mukhtar ppt (20)

PDF
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
PDF
T04506110115
PPTX
Mobile slide
PDF
1705 1708
PDF
1705 1708
PDF
An Overview of security issues in Mobile Ad hoc Networks
PDF
A Review Paper on Network Layer attacks in MANETs
PDF
Injection of Attacks in MANETs
PDF
E0432933
PDF
JCC_2015120915212763
PDF
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
PPTX
Rm presentation on research paper
PDF
IRJET- Analysis of Router Poisoning using Network Attacks
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
PDF
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
PDF
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
PDF
Investigation of detection & prevention sinkhole attack in manet
PDF
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
PPTX
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
T04506110115
Mobile slide
1705 1708
1705 1708
An Overview of security issues in Mobile Ad hoc Networks
A Review Paper on Network Layer attacks in MANETs
Injection of Attacks in MANETs
E0432933
JCC_2015120915212763
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Rm presentation on research paper
IRJET- Analysis of Router Poisoning using Network Attacks
International Journal of Computational Engineering Research(IJCER)
An ids scheme against black hole attack to secure aomdv routing in manet
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
Investigation of detection & prevention sinkhole attack in manet
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Network Attacks - (Information Assurance and Security)BS in Information Techn...

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
additive manufacturing of ss316l using mig welding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
web development for engineering and engineering
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Mechanical Engineering MATERIALS Selection
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Geodesy 1.pptx...............................................
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
additive manufacturing of ss316l using mig welding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
bas. eng. economics group 4 presentation 1.pptx
web development for engineering and engineering
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mechanical Engineering MATERIALS Selection
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Geodesy 1.pptx...............................................
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Abdullah Mukhtar ppt

  • 1. Security on Mobile Ad-hoc Network by Abdullah Mukhtar (Network Security Engineer)
  • 2. Outline  Introduction  Primary Goals of Security in MANET  Key management  Classification of attacks  Problems Arises in MANET
  • 3. Introduction • Mobile ad hoc networks are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links. • Multihop communication- node communicate with the help of two or more node from source to destination. • No existing fixed infrastructure or centralized administration –No base station. • Mobile nodes are free to move randomly. •Network topology changes frequently. • May Operate as standalone fashion or also can be connected to the larger internet. • Each node work as router.
  • 4. Primary Goals of Security in MANET To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:- Authentication:- The process of identifying an individual , usually based on a username and password. Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person. Network attacks against confidentiality Packet capturing Password attack Port scanning Dumpster Diving Wiretapping Phishing and Pharming Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
  • 5. Continued… Integrity:- Integrity guarantees that a message being transferred is never corrupted.  network attack against integrity  Salami attack  trust relationship attacks  Man in the middle attack  Session hijacking attacks Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.  network attack against availability  Denial of services attacks  Distributed denial of services attack  SYN flood attacks and ICMP flood attacks  Electrical power attacks  Server Room environment attacks
  • 6. Key management The security in networking is in many cases dependent on proper key management. Key management consists of various services, of which each is vital for the security of the networking systems.  Trust model:-Its must determine how much different element in the network can trust each other.  Cryptosystem:- Public and symmetric key mechanism can be applied .  Key creation:- It must determine which parties are allowed to generate key to themselves.  Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.  Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
  • 7. Classification of attacks Attacks on network are divided into two categories – •Internal attack •External attack. In internal attacks, the adversary (attacker) wants to gain the normal access to the network and participate the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors In external attacks, the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services. MANETs are basically vulnerable to two different types of attacks: o active attacks o passive attacks.
  • 8. Continued….  Some of the active attacks • Black hole • Byzantine • Wormhole • Spoofing attack • Sybil Fig1. Black hole problem Fig 2. Wormhole attack Fig 3. Flooding attack
  • 9. Problems Arises in MANET The attacker may target the route maintenance process and advertise that an operational link is broken. One more problem is the attacker along an established route may drop the packet, modify the content of packet or duplicates the packets it has already forwarded  Attack via network layer packet blasting ,in which the attacker injects a large amount of junk packets in to the network, these packets waste a significant portion of the network resources and introduce severe wireless channel contention and network congestion in MANET By attacking routing protocol the attacker can attract traffic towards certain destination in the nodes under their control and cause the packet to be forwarded along a route that is not optional. The attacker can create routing loops in the network and introduce severe network congestion and channel contention in certain areas
  • 10. Continued…  Many colluding attracters may even prevent a source node from finding any route to the destination and partition the Network.  A pair of attacker nodes may create a wormhole and shortcut the normal flows between each other.  The attacker may advertise a route with a smaller distance metric than the actual distance to the destination.  The existing ADHOC routing protocols such as ADHOC on Demand distance vector (ADDV), Dynamic Source Routing (DSR), Wireless MAC protocols such as (802.11) do not provide a trusted environment so a malicious attacker can readily become a router and disrupt network operations by disobeying the protocol specifications.
  • 11. References 1. Khushboo Sawant, Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET Environment”, Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 5( Version 6), May 2014, pp.110-115. 2. Sarvesh tanwar, Prema k.v ,“ threats & security issues in ad hoc network: a survey report”, International journal of soft computing and engineering (ijsce) ISSN: 2231-2307 volume-2, issue-6, January 2013. 3. StallingsWilliam(2000), network security essentials : applications and standards; Pearson education 4. StallingsWilliam (2003), cryptography and network security principles and practices; Pearson education 3rd edition. 5. Akshai aggarwal, Savita Gandhi, Nirbhay chaubey, Keyurbhai a jani, “trust based secure on demand routing protocol (tsdrp) for MANETs” , 2014 fourth international conference on advanced computing & communication technologies. 6. Refik molva , Pietro Michiardi “security in ad hoc networks” Springer Berlin Heidelberg ifip-tc6 8th international conference, pwc 2003, Venice, Italy, September 23-25, 2003.Proceedings
  • 12. References continued… 7. Pradeep Rai, Shubha Singh, “A Review of ‘MANET’s Security Aspects and Challenges” , Asst. Prof., Asst. Prof. of Kanpur Institute of Technology, IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010, www.ijcaonline.org/manets/number4/SPE89T.pdf 8. R.Praveen Sam, Dr. B.Stephen Charles, Dr. P. Chandrasekhar Reddy. “http://www.acadjournal.com/2007/V21/Part6/p3/index1.html”. 9. Hongmei deng, Wei li, and dharma p. Agrawal, university of Cincinnati ,“ routing security in wireless ad hoc networks” , IEEE communications magazine October 2002. 10. “Security issues in mobile ad hoc networks a survey” Wenjia li and Anupam joshi, Department of computer science and electrical engineering university of Maryland, baltimore county.

Editor's Notes

  • #12: Referrences
  • #13: References continued…