SlideShare a Scribd company logo
Routing Security in Ad Hoc
         Wireless Networks
            Presented by

            J.Jaffer Basha
            M.Elanthendral

           II Year – CSE
Sree Sowdambika College of Engineering
           Aruppukottai
Wireless Networks


   Wireless networks provide rapid, access to
    information and computing,      limiting the
    barriers of distance, time, and location for
    many applications ranging from collaborative,
    distributed mobile computing to disaster
    recovery
Ad Hoc Wireless Networks

   Collection of wireless mobile hosts forming a
    temporary network

   Every device has the role of router and actively
    participates in data forwarding.

   Communication between two nodes can be
    performed directly if the destination is within the
    sender’s   transmission    range,    or    through
    intermediate nodes acting as routers if the
    destination is outside sender’s transmission
    range.
Characteristics of
        Ad Hoc Wireless Networks
   Characteristics which differentiate Ad Hoc
    wireless networks from other networks are:
       Dynamic Network Topology
       Distributed Operations
       Limited Energy Resources
Routing

   Routing is an important operation for data
    exchange between wireless devices.

   Main routing responsibilities are exchanging the
    routing information, finding a feasible path
    between source and destination.
Routing Protocol
   The major requirements of a routing protocol are
       Minimum route acquisition delay
       Quick route reconfiguration in case of path breaks
       Loop-Free routing
       Distributed routing protocol
       Low control overhead
       Scalability with network size
       QoS support as demanded by the application
       Support of time sensitive traffic
       Security and Privacy.
Routing Protocols in Ad Hoc
                Wireless Networks
   The design of routing protocols should take these
    factors into consideration.

   Based on the routing information update mechanism,
    routing protocols in ad hoc wireless networks can be
    classified as

       Proactive (or table-driven) protocols
       Reactive (or on-demand) protocols
       Hybrid routing protocols.
Proactive Routing Protocols

   Nodes exchange routing information periodically
    to maintain accurate routing information.

   The path can be computed rapidly based on the
    updated information available in the routing
    table.

   The algorithm used is DSDV.
DSDV

   Finds shortest paths between nodes using Bellman-Ford
    algorithm.

   Each node maintains a routing table

   For each entry, the following fields are maintained:

       the destination address
       next hop on the shortest path to that destination
       a destination sequence number
DSDV

   Sequence     numbers    are  used   for
    preventing loop formation.
   Each entry in the routing table has a
    sequence number.
   If a node receives an update with a
    smaller sequence number, then that
    update is ignored.
   Path is adopted if it has a greater
    sequence number, or if it has the same
    sequence number but a lower metric.
DSDV

     Destination   Next   Metric   Seq. Nr   Install Time
          A         A       0      A-550       001000
          B         B       1      B-102       001200
          C         B       3       C-588      001200
          D         B       4      D-312       001200


   When a broken link is detected, the node
    creates a routing update with next odd
    sequence number and metric value of
    infinity.
Reactive Routing Protocol
   A route discovery mechanism is initiated only when a
    node does not know a path to a destination it wants
    to communicate with.

   Perform better with significantly lower overheads
    than proactive routing protocols

   Has two main operations
       Route discovery
       Route maintenance

   Various reactive protocols have been proposed
       Ad Hoc On-demand Distance Vector (AODV)
       Dynamic Source Routing (DSR)
DSR
   Is a source routing protocol, each data packet
    carries the source-destination path in its
    header.

   Using this information, intermediate nodes can
    determine who is the next hop this packet
    should be forwarded to.

   Every entry has an expiration time after which
    the entry is deleted in order to avoid stale
    information.
   Each Route Request contains sequence number
    generated by source node, to prevent loop
    formation.

   An intermediate node checks the sequence
    number, and forwards the Route Request only if
    this message is not a duplicate.

   Receiving the Route Reply, the sender starts
    sending data to the receiver.
   If a node detects a failure, it sends a Route
    Error message to the source.

   All routes that contain this hop are truncated.

   If the source does not have an alternative path
    to the destination, it has to re-initiate the path
    discovery mechanism.
   DSR has several optimization techniques.

       Know a path to the destination to reply to
        the Route Request message instead of
        forwarding the request.

       Path discovery can use an expanding ring
        search mechanism when sending the Route
        Request messages in close destinations, thus
        avoiding broadcasting in the whole network.
Hybrid Routing Protocols
    Some routing protocols are hybrid          of
     proactive and reactive mechanisms.

     examples of hybrid routing protocols:
       Zone Routing Protocol (ZRP)
       Core Extraction Distributed Ad Hoc Routing
        Protocol (CEDAR)
Zone Routing Protocol (ZRP)
   The network is divided in zones .
   The intra-zone routing protocol is a proactive
    routing protocol, the inter-zone routing protocol is
    a reactive routing protocol.
   When a node transmit data to a destination within
    the same zone, then this is done using the
    proactive routing protocol.
   If the destination is in another zone, then the
    source node border casts the Route Request until it
    reaches the destination zone.
   Node of the destination zone sends then back a
    Route Reply message.
   If a broken link is detected, the path reconstruction
    can be done locally
Security Attacks on
             Routing Protocol

   Secure system can be achieved by preventing
    attacks or by detecting them and providing a
    mechanism to recover for those attacks.

   Attacks on ad hoc wireless networks can be
    classified as
      Active attacks

      Passive attacks
Passive Attacks


   Intruder snoops the data exchanged without
    altering it.

   The goal of the attacker is to obtain information
    that is being transmitted.

   These attackers are difficult to detect, since the
    network is not disrupted

   Powerful encryption mechanism can alleviate
    these attackers.
Active Attack

   Attacker actively   participates   in   disrupting
    network services.

   Attack by modifying packets or by introducing
    false information in the ad hoc network.

   Confuses routing procedures and degrades
    network performance. Active attacks can be
    divided into
      Internal Attack
      External Attack
Internal Attack


   From compromised nodes that       were   once
    legitimate part of the network.

   Since they are part of the network, they are
    much more severe and difficult to detect when
    compared to external attacks.
External Attack

   Carried by nodes that are not legitimate part of
    the network.

   Such attacks can be defended by using
    encryption, firewalls and source authentication.
Attacks using Impersonation

   An intruder consume another node resources or
    to disturb normal network operation.

   An attacker node achieves impersonation by
    misrepresenting its identity.

   This can be done by changing its own IP or MAC
    address to that of some other legitimate node.

   Some strong authentication procedures can be
    used to stop attacks by impersonation.
Impersonation
        Man-in-the-Middle Attack
   The attacker can impersonate the receiver with
    respect to the sender, and the sender with
    respect to the receiver.

   without having either of them realize that they
    have been attacked.
Attacks using Modification
   This attack disrupts the routing function by
    having the attacker illegally modifying the
    content of the messages.

   Misrouting Attack: A non-legitimate node
    sends data packet to the wrong destination.

   Detour Attack: The traffic is diverted to other
    routes that appear to be shorter and might
    contain malicious nodes which could create
    other attacks.

   Blackmail Attack: Causes false identification
    of a good node as malicious node.
Attacks using Fabrication

   An intruder generates false routing messages,
    such as routing updates and route error
    messages, in order to disturb network operation
    or to consume other node resources.
Security Mechanism and
      Solutions for Routing Protocol
   Message encryption and digital signatures are two
    important mechanisms for data integrity and user
    authentication.
   There are two types of data encryption mechanisms
      Symmetric

      Asymmetric

   Symmetric : Use the same key (the secret key) for
    encryption and decryption of a message
   Asymmetric : Use one key (the public key) to
    encrypt a message and another key (the private key)
    to decrypt it.
   Message Authentication Code (MAC) is used.
   Cryptographic checksum, computed by the
    message initiator as a function of the secret key
    and the message being transmitted and it is
    appended to the message.
   The recipient re-computes the MAC in the
    similar fashion.
   If the MAC computed by the receiver matches
    the MAC received with the message then the
    recipient is assured that the message was not
    modified.
Secure Efficient Ad hoc
          Distance Vector
   Secure Efficient Ad hoc Distance Vector (SEAD)
    is a proactive routing protocol, based on the
    design of DSDV.

   SEAD routing tables maintain a hash value for
    each entry.
   The key feature of the proposed security protocol
    is the use one-way hash chain function H.
   Each node computes a list of hash values h0, h1,
    ・ ・ ・ , hn, where hi = H(hi−1) and 0 < i ≤ n,
    based on an initial random value h0.
    If a node knows H and a trusted value hn, then
    it can authenticate any other value hi, 0 < i ≤ n
    by successively applying the hash function H and
    then comparing the result with hn.
   To authenticate, a node adds a hash value to
    each routing table entry.

   For a metric j and a sequence number i, the
    hash value hn−i+j is used to authenticate the
    routing update entry for that sequence number

   Since an attacker cannot compute a hash value
    with a smaller index than the advertised value.
ARIADNE
   Design of ARIADNE is based on DSR.
   It assumes that sender and receiver share
    secret keys for message authentication.
   The initiator (or sender) includes a MAC
    computed with an end-to-end key and the
    target (or destination) verifies the authenticity
    and freshness of the request using the shared
    key.
   Pre-hop hashing mechanism, a one-way hash
    function that verifies that no hop is omitted, is
    also used in Ariadne.
   Provides a strong defense against attacks that
    modify and fabricate routing information.
Security Aware Routing (SAR)

   Is an on demand routing protocol based on
    AODV
   The initiator of the route in SAR includes a
    security metric in the route request.
   This security metric is the minimum trust
    level of the nodes that can participate in
    the route discovery.
   Only those nodes that have this minimum
    security level can participate in the route
    discovery.
   All other nodes that are below that trust
    level will drop the request packets.
   SAR uses sequence numbers and timestamps to
    stop replay attacks.

   Threats like interception and subversion can be
    prevented by trust level key authentication.

   Modification and fabrication attacks can be
    prevented
Secure Routing Protocol (SRP)

   SRP defends against attacks that disrupt the
    route discovery process.
   Set up a security association without the
    need of cryptographic validation of the
    communication data by the intermediate
    nodes.
   SRP assumes that this SA can be achieved
    through a shared key KST between the
    source S and target T.
   The SRP uses an additional header called SRP
    header to the underlying routing protocol
    packet.
   SRP header contains the following fields:
       the query sequence number QSEC
       query identifier number QID
       96 bit MAC field
   Discard a route request message if SRP header
    is missing.
   Otherwise, forward the request towards
    destination after extracting QID, source, and
    destination address.
   When the target T receives request packet, it
    verifies.
   If QSEC >=QMAX, the request is dropped.
   Otherwise it calculates the keyed hash of the
    request fields and if the output matches SRP
    MAC then authenticity of the sender and
    integrity of the request are verified.
   If the two routes match then S calculates the
    MAC by using the replied route, the SRP header
    fields, and the secure key between source and
    destination.
   If the two MAC match then the validation is
    successful and it confirms that the reply did
    came from the destination T.
Security Protocols for Sensor
            Network (SPINS)
   It provides important network services like
      data confidentiality

      two party data authentication

      data freshness

      Through Secure Network Encryption Protocol
       (SNEP) and secure broadcast through Micro
       Timed     Efficient  Stream     Loss-tolerant
       Authentication (μTESLA).
   μTESLA an enhanced version of TESLA,
    uses symmetric cryptographic techniques
    for    authentications   and    asymmetry
    cryptography     only  for   the   delayed
    disclosure of keys.
CONCLUSION
   Achieving a secure routing protocol is an
    important task that is being challenged by the
    unique characteristics of an ad hoc wireless
    network.
   In this paper we discuss security services and
    challenges in an ad hoc wireless network
    environment.
   The current security mechanisms, each defeats
    one or few routing attacks. Designing routing
    protocols resistant to multiple attacks remains a
    challenging task.
THANK YOU

More Related Content

PPTX
Cdma2000
PPTX
Cognitive radio networks
PPTX
PPTX
Handover in Mobile Computing
PPT
Mobile Computing UNIT-I TO III
PPTX
PPT
Wireless routing protocols
PDF
Issues in routing protocol
Cdma2000
Cognitive radio networks
Handover in Mobile Computing
Mobile Computing UNIT-I TO III
Wireless routing protocols
Issues in routing protocol

What's hot (20)

PPTX
Adhoc Wireless Network
PDF
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
PPTX
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
PPTX
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
PPT
Umts system architecture
PPTX
Mobile Ad hoc Networks
PPTX
Frequency Reuse
PPSX
Mac protocols of adhoc network
PPTX
Gprs architecture
PDF
EC8702 adhoc and wireless sensor networks iv ece
PPTX
Lte(long term evolution) 4G LTE
PDF
Wireless communication, UNIT 3, EC students, 8th sem
PPT
Mobile Radio Propagations
PPTX
Wsn unit-1-ppt
PPTX
Broadband isdn
PPTX
PPTX
Gsm architecture
PPT
Data link control
Adhoc Wireless Network
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Umts system architecture
Mobile Ad hoc Networks
Frequency Reuse
Mac protocols of adhoc network
Gprs architecture
EC8702 adhoc and wireless sensor networks iv ece
Lte(long term evolution) 4G LTE
Wireless communication, UNIT 3, EC students, 8th sem
Mobile Radio Propagations
Wsn unit-1-ppt
Broadband isdn
Gsm architecture
Data link control
Ad

Viewers also liked (20)

PPTX
Ad-Hoc Networks
PDF
Lecture 5 6 .ad hoc network
PPTX
Ad hoc networks
PPTX
Mobile ad hoc network
PPT
PDF
Ad hoc Networks
PPT
Mobile Ad hoc network
PDF
Lecture 11 14. Adhoc routing protocols cont..
PPT
PPTX
Manet ppt
PPTX
Routing Protocols in WSN
PPSX
Adhoc and routing protocols
DOC
Packet filtering using jpcap
PPT
Farmacoepi Course Leiden 0210 Part 2
PPT
Day 9 routing
PPTX
Energy Efficient Routing Approaches in Ad-hoc Networks
PDF
Hybrid wireless protocols
PDF
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
PDF
IEEE HARDWARE TITLES 2015-16
PPTX
Review on design of advanced opportunistics routing in manet
Ad-Hoc Networks
Lecture 5 6 .ad hoc network
Ad hoc networks
Mobile ad hoc network
Ad hoc Networks
Mobile Ad hoc network
Lecture 11 14. Adhoc routing protocols cont..
Manet ppt
Routing Protocols in WSN
Adhoc and routing protocols
Packet filtering using jpcap
Farmacoepi Course Leiden 0210 Part 2
Day 9 routing
Energy Efficient Routing Approaches in Ad-hoc Networks
Hybrid wireless protocols
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
IEEE HARDWARE TITLES 2015-16
Review on design of advanced opportunistics routing in manet
Ad

Similar to Ad-HOc presentation (20)

PDF
Lecture 9 10 .mobile ad-hoc routing protocols
PPTX
PDF
A Survey on Secured Routing In AD HOC Networks for Various Attacks
PDF
International Journal of Engineering Research and Development
PPTX
Mane ts
PPT
Manet By Vikas mainanwal
DOCX
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
PDF
Unit8 tgb
DOC
Routing security in ad hoc wireless network
PDF
Routing in Mobile Ad hoc Networks
PDF
manet.pdf
PDF
Security threats in manets a review
PDF
SZRP.pdf
PPTX
PPTX
MobileAdHocRoutingProtocols.pptx
PDF
Secure routing Adhoc Networks
PDF
Ad-hoc routing protocols
PPTX
Adhoc Sensor Networks1.pptx
PPTX
Introduction to mobile ad hoc network (m.a.net)
Lecture 9 10 .mobile ad-hoc routing protocols
A Survey on Secured Routing In AD HOC Networks for Various Attacks
International Journal of Engineering Research and Development
Mane ts
Manet By Vikas mainanwal
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
Unit8 tgb
Routing security in ad hoc wireless network
Routing in Mobile Ad hoc Networks
manet.pdf
Security threats in manets a review
SZRP.pdf
MobileAdHocRoutingProtocols.pptx
Secure routing Adhoc Networks
Ad-hoc routing protocols
Adhoc Sensor Networks1.pptx
Introduction to mobile ad hoc network (m.a.net)

More from Elanthendral Mariappan (6)

DOC
Image+processing
DOC
Ex11 mini project
RTF
Ex3 lisp likelist in java
DOC
DOC
Autonomic computer
DOC
Autonomic computer
Image+processing
Ex11 mini project
Ex3 lisp likelist in java
Autonomic computer
Autonomic computer

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Ad-HOc presentation

  • 1. Routing Security in Ad Hoc Wireless Networks Presented by J.Jaffer Basha M.Elanthendral II Year – CSE Sree Sowdambika College of Engineering Aruppukottai
  • 2. Wireless Networks  Wireless networks provide rapid, access to information and computing, limiting the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery
  • 3. Ad Hoc Wireless Networks  Collection of wireless mobile hosts forming a temporary network  Every device has the role of router and actively participates in data forwarding.  Communication between two nodes can be performed directly if the destination is within the sender’s transmission range, or through intermediate nodes acting as routers if the destination is outside sender’s transmission range.
  • 4. Characteristics of Ad Hoc Wireless Networks  Characteristics which differentiate Ad Hoc wireless networks from other networks are:  Dynamic Network Topology  Distributed Operations  Limited Energy Resources
  • 5. Routing  Routing is an important operation for data exchange between wireless devices.  Main routing responsibilities are exchanging the routing information, finding a feasible path between source and destination.
  • 6. Routing Protocol  The major requirements of a routing protocol are  Minimum route acquisition delay  Quick route reconfiguration in case of path breaks  Loop-Free routing  Distributed routing protocol  Low control overhead  Scalability with network size  QoS support as demanded by the application  Support of time sensitive traffic  Security and Privacy.
  • 7. Routing Protocols in Ad Hoc Wireless Networks  The design of routing protocols should take these factors into consideration.  Based on the routing information update mechanism, routing protocols in ad hoc wireless networks can be classified as  Proactive (or table-driven) protocols  Reactive (or on-demand) protocols  Hybrid routing protocols.
  • 8. Proactive Routing Protocols  Nodes exchange routing information periodically to maintain accurate routing information.  The path can be computed rapidly based on the updated information available in the routing table.  The algorithm used is DSDV.
  • 9. DSDV  Finds shortest paths between nodes using Bellman-Ford algorithm.  Each node maintains a routing table  For each entry, the following fields are maintained:  the destination address  next hop on the shortest path to that destination  a destination sequence number
  • 10. DSDV  Sequence numbers are used for preventing loop formation.  Each entry in the routing table has a sequence number.  If a node receives an update with a smaller sequence number, then that update is ignored.  Path is adopted if it has a greater sequence number, or if it has the same sequence number but a lower metric.
  • 11. DSDV Destination Next Metric Seq. Nr Install Time A A 0 A-550 001000 B B 1 B-102 001200 C B 3 C-588 001200 D B 4 D-312 001200  When a broken link is detected, the node creates a routing update with next odd sequence number and metric value of infinity.
  • 12. Reactive Routing Protocol  A route discovery mechanism is initiated only when a node does not know a path to a destination it wants to communicate with.  Perform better with significantly lower overheads than proactive routing protocols  Has two main operations  Route discovery  Route maintenance  Various reactive protocols have been proposed  Ad Hoc On-demand Distance Vector (AODV)  Dynamic Source Routing (DSR)
  • 13. DSR  Is a source routing protocol, each data packet carries the source-destination path in its header.  Using this information, intermediate nodes can determine who is the next hop this packet should be forwarded to.  Every entry has an expiration time after which the entry is deleted in order to avoid stale information.
  • 14. Each Route Request contains sequence number generated by source node, to prevent loop formation.  An intermediate node checks the sequence number, and forwards the Route Request only if this message is not a duplicate.  Receiving the Route Reply, the sender starts sending data to the receiver.
  • 15. If a node detects a failure, it sends a Route Error message to the source.  All routes that contain this hop are truncated.  If the source does not have an alternative path to the destination, it has to re-initiate the path discovery mechanism.
  • 16. DSR has several optimization techniques.  Know a path to the destination to reply to the Route Request message instead of forwarding the request.  Path discovery can use an expanding ring search mechanism when sending the Route Request messages in close destinations, thus avoiding broadcasting in the whole network.
  • 17. Hybrid Routing Protocols  Some routing protocols are hybrid of proactive and reactive mechanisms.  examples of hybrid routing protocols:  Zone Routing Protocol (ZRP)  Core Extraction Distributed Ad Hoc Routing Protocol (CEDAR)
  • 18. Zone Routing Protocol (ZRP)  The network is divided in zones .  The intra-zone routing protocol is a proactive routing protocol, the inter-zone routing protocol is a reactive routing protocol.  When a node transmit data to a destination within the same zone, then this is done using the proactive routing protocol.  If the destination is in another zone, then the source node border casts the Route Request until it reaches the destination zone.  Node of the destination zone sends then back a Route Reply message.  If a broken link is detected, the path reconstruction can be done locally
  • 19. Security Attacks on Routing Protocol  Secure system can be achieved by preventing attacks or by detecting them and providing a mechanism to recover for those attacks.  Attacks on ad hoc wireless networks can be classified as  Active attacks  Passive attacks
  • 20. Passive Attacks  Intruder snoops the data exchanged without altering it.  The goal of the attacker is to obtain information that is being transmitted.  These attackers are difficult to detect, since the network is not disrupted  Powerful encryption mechanism can alleviate these attackers.
  • 21. Active Attack  Attacker actively participates in disrupting network services.  Attack by modifying packets or by introducing false information in the ad hoc network.  Confuses routing procedures and degrades network performance. Active attacks can be divided into  Internal Attack  External Attack
  • 22. Internal Attack  From compromised nodes that were once legitimate part of the network.  Since they are part of the network, they are much more severe and difficult to detect when compared to external attacks.
  • 23. External Attack  Carried by nodes that are not legitimate part of the network.  Such attacks can be defended by using encryption, firewalls and source authentication.
  • 24. Attacks using Impersonation  An intruder consume another node resources or to disturb normal network operation.  An attacker node achieves impersonation by misrepresenting its identity.  This can be done by changing its own IP or MAC address to that of some other legitimate node.  Some strong authentication procedures can be used to stop attacks by impersonation.
  • 25. Impersonation Man-in-the-Middle Attack  The attacker can impersonate the receiver with respect to the sender, and the sender with respect to the receiver.  without having either of them realize that they have been attacked.
  • 26. Attacks using Modification  This attack disrupts the routing function by having the attacker illegally modifying the content of the messages.  Misrouting Attack: A non-legitimate node sends data packet to the wrong destination.  Detour Attack: The traffic is diverted to other routes that appear to be shorter and might contain malicious nodes which could create other attacks.  Blackmail Attack: Causes false identification of a good node as malicious node.
  • 27. Attacks using Fabrication  An intruder generates false routing messages, such as routing updates and route error messages, in order to disturb network operation or to consume other node resources.
  • 28. Security Mechanism and Solutions for Routing Protocol  Message encryption and digital signatures are two important mechanisms for data integrity and user authentication.  There are two types of data encryption mechanisms  Symmetric  Asymmetric  Symmetric : Use the same key (the secret key) for encryption and decryption of a message  Asymmetric : Use one key (the public key) to encrypt a message and another key (the private key) to decrypt it.
  • 29. Message Authentication Code (MAC) is used.  Cryptographic checksum, computed by the message initiator as a function of the secret key and the message being transmitted and it is appended to the message.  The recipient re-computes the MAC in the similar fashion.  If the MAC computed by the receiver matches the MAC received with the message then the recipient is assured that the message was not modified.
  • 30. Secure Efficient Ad hoc Distance Vector  Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of DSDV.  SEAD routing tables maintain a hash value for each entry.
  • 31. The key feature of the proposed security protocol is the use one-way hash chain function H.  Each node computes a list of hash values h0, h1, ・ ・ ・ , hn, where hi = H(hi−1) and 0 < i ≤ n, based on an initial random value h0.  If a node knows H and a trusted value hn, then it can authenticate any other value hi, 0 < i ≤ n by successively applying the hash function H and then comparing the result with hn.
  • 32. To authenticate, a node adds a hash value to each routing table entry.  For a metric j and a sequence number i, the hash value hn−i+j is used to authenticate the routing update entry for that sequence number  Since an attacker cannot compute a hash value with a smaller index than the advertised value.
  • 33. ARIADNE  Design of ARIADNE is based on DSR.  It assumes that sender and receiver share secret keys for message authentication.  The initiator (or sender) includes a MAC computed with an end-to-end key and the target (or destination) verifies the authenticity and freshness of the request using the shared key.  Pre-hop hashing mechanism, a one-way hash function that verifies that no hop is omitted, is also used in Ariadne.  Provides a strong defense against attacks that modify and fabricate routing information.
  • 34. Security Aware Routing (SAR)  Is an on demand routing protocol based on AODV  The initiator of the route in SAR includes a security metric in the route request.  This security metric is the minimum trust level of the nodes that can participate in the route discovery.  Only those nodes that have this minimum security level can participate in the route discovery.  All other nodes that are below that trust level will drop the request packets.
  • 35. SAR uses sequence numbers and timestamps to stop replay attacks.  Threats like interception and subversion can be prevented by trust level key authentication.  Modification and fabrication attacks can be prevented
  • 36. Secure Routing Protocol (SRP)  SRP defends against attacks that disrupt the route discovery process.  Set up a security association without the need of cryptographic validation of the communication data by the intermediate nodes.  SRP assumes that this SA can be achieved through a shared key KST between the source S and target T.
  • 37. The SRP uses an additional header called SRP header to the underlying routing protocol packet.  SRP header contains the following fields:  the query sequence number QSEC  query identifier number QID  96 bit MAC field  Discard a route request message if SRP header is missing.  Otherwise, forward the request towards destination after extracting QID, source, and destination address.
  • 38. When the target T receives request packet, it verifies.  If QSEC >=QMAX, the request is dropped.  Otherwise it calculates the keyed hash of the request fields and if the output matches SRP MAC then authenticity of the sender and integrity of the request are verified.  If the two routes match then S calculates the MAC by using the replied route, the SRP header fields, and the secure key between source and destination.  If the two MAC match then the validation is successful and it confirms that the reply did came from the destination T.
  • 39. Security Protocols for Sensor Network (SPINS)  It provides important network services like  data confidentiality  two party data authentication  data freshness  Through Secure Network Encryption Protocol (SNEP) and secure broadcast through Micro Timed Efficient Stream Loss-tolerant Authentication (μTESLA).  μTESLA an enhanced version of TESLA, uses symmetric cryptographic techniques for authentications and asymmetry cryptography only for the delayed disclosure of keys.
  • 40. CONCLUSION  Achieving a secure routing protocol is an important task that is being challenged by the unique characteristics of an ad hoc wireless network.  In this paper we discuss security services and challenges in an ad hoc wireless network environment.  The current security mechanisms, each defeats one or few routing attacks. Designing routing protocols resistant to multiple attacks remains a challenging task.