SlideShare a Scribd company logo
Network Information and
          Security:
 Defending mechanism
against SYBIL attack in
mobile ad hoc network


                      By:
                        Anand Karandikar
                              &
                      Harshad Ghegadmal
Introduction:

• Network security
• Mobile Ad Hoc Network
• MANET is vulnerable to attacks due to
   1]Dynamic change in topology
   2]Lack of proper line of defense
   3]Lack of centralized Authority
   4]Cooperative nature for Ad Hoc routing
     algorithms
   5]wireless communication links
Sybil attack:
• Nodes maintain the connectivity in the nodes
outside the broadcast range

• Use of routing protocols for path finding

• Assigning unique address by
       1]IP address
       2]MAC (media access channel)

• In Unrestricted protocols DSR & AODV
  address identifier are falsified by malicious mode
  giving opportunity for Sybil attack
Review of Sybil attack:
• MANET uses redundant algorithms creates
difficulties for attacker to destroy the integrity of
information
• Detection of change in Packet during transmission
• Detection & Isolation of suspected node
• Decrease in efficiency of Sybil attack detection
technique due to malicious node
• Prevention due to cryptographically authenticated
node
Detection models:
1. PKI based protocols

2. Threshold-based protocols

3. Reputation schemes

4. Watchdog mechanism

5. Improved Watchdog-like mechanism
Multifactor Authentication scheme:
The Multifactor authentication of the other node is
usually performed in two steps:

1] A certified signature key links an entity to a claimed
   identity.
2] The reading of the physical characteristics of the
  examined node links the physical node to the claimed
   identity.
Implementation of multifactor
    Authentication framework:
•    Implementation by combining traditional
     cryptographic technique & certified physical
     attribute

•    Steps-
     1] verification of digital signature of each
      other contained in message.
     2]analyzing the physical attribute of other
      node by comparing the readings against
     set of certified value.
Passive Ad Hoc Sybil Identity detection
 scheme:
• Functioning of the protocol is based on records of
  identities of the nodes broadcasting
• Mobility of nodes in wireless Ad Hoc Network is
  utilized for identification
• Basic fact =>individual nodes are free to move
  independently, all identities of a single attacker are
  bound to the single physical node & hence must
  move together
• It includes-single node observer & multi-node
  observer
Single node observer:
• Protocol with single observer

• Affinity between related pair is given by




where
   Tij = number of intervals in which nodes i and j were
   observed together,
 Lij = number of intervals in which either i or j was observed
   alone,
 N =total number of intervals in the observation period
Multiple node observer:
• Protocols with more observer

• Affinity value is given by
              Aij=(Tij-2Lij)wij
                       where wij = (Tij+Lij)/N
   Here,
   Tij = number of intervals in which nodes i
         and are being observed together by n nodes,
  Lij = number of intervals in which either node i
        or j is being observed alone by n nodes,
  N = number of nodes sharing information with
       one another.
Passive Ad Hoc Sybil Identity Detection
  with group detection (PASID-GD ):
• Data transmission by legitimate node is simultaneous
   & Data transmission by Sybil attacker is serial
• Identity criteria for Sybil detection in PASID-
   GD=>attacker with multiple identities sends message
   serially with few collision at MAC layer
  i.e. collision rate differentiate bet group of legitimate
   node & Sybil attacker
Conclusion:
    Way to improve the Sybil attack defense
      mechanisms by ways:

•     Use of more accurate and closely synchronized
      clocks.

•     Equipment of mobile nodes with the GPS receiver

•     Use of mobile nodes with additional antenna
References:
• J. R. Douceur, The Sybil Attack , International
  Workshop on Peer-to-Peer Systems
• L. Zhou, and Z. J. Haas, “Securing Ad Hoc
  networks,” IEEE Network Vol. 13

• en.wikipedia.org/wiki/Sybil_attack

• www.math.cmu.edu/Sybilguard.asp
Any Questions ?
Thank You!

More Related Content

PDF
Cryptographic Protocol is and isn't like LEGO.
PPTX
Cryptography and Network security # Lecture 8
PPTX
E mail security
PPTX
PPSX
Wireless Network Security
PPT
Network security
PDF
Electronic mail security
PPTX
Wireless security
Cryptographic Protocol is and isn't like LEGO.
Cryptography and Network security # Lecture 8
E mail security
Wireless Network Security
Network security
Electronic mail security
Wireless security

What's hot (20)

PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPTX
Cryptography based misbehavior detection for opportunistic network
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Securing Text Messages Application Using MED
PPTX
Enhancing lan using cryptography and other modules
PDF
Wireless Hacking
ODP
Network traceability
PPTX
S/MIME & E-mail Security (Network Security)
PDF
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
PPTX
SPINS: Security Protocols for Sensor Networks
PPT
Network Security 1st Lecture
PDF
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
PPTX
Building a strong security strategy
PPTX
11011 a0449 secure routing wsn
PPT
Security in wireless sensor networks
PPTX
DDOS ATTACK - MIRAI BOTNET
PDF
A Taxonomy of Botnet Detection Approaches
Celebrity Cricket League 2016 - http://ccl5.com/
Cryptography based misbehavior detection for opportunistic network
Chapter 1 Introduction of Cryptography and Network security
Securing Text Messages Application Using MED
Enhancing lan using cryptography and other modules
Wireless Hacking
Network traceability
S/MIME & E-mail Security (Network Security)
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
SPINS: Security Protocols for Sensor Networks
Network Security 1st Lecture
DHPA Techday 2015 - Maciej Korczyński - Reputation Metrics Design to Improve ...
Building a strong security strategy
11011 a0449 secure routing wsn
Security in wireless sensor networks
DDOS ATTACK - MIRAI BOTNET
A Taxonomy of Botnet Detection Approaches
Ad

Viewers also liked (11)

PDF
Sybil Attacks - MobiSys Seminar
PDF
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
PDF
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
PDF
project report on IoT
PPTX
Security in IoT
PPTX
Wormhole attack
PDF
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
PPTX
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
PPT
IoT security (Internet of Things)
PPTX
Technical Seminar PPT
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Sybil Attacks - MobiSys Seminar
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
project report on IoT
Security in IoT
Wormhole attack
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
IoT security (Internet of Things)
Technical Seminar PPT
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Ad

Similar to Network Information And Security (20)

PPTX
Security Issues in MANET
PDF
Copy of IoT Module 4-Security and privacy in IoT.pdf
PPT
security in wireless sensor network
PPT
Lecturasdfasdfasdfadsfasdfasdfasdfasddfsdfasdfasdfasdf14.ppt
PPTX
seminar presentation
PDF
Detection of-sybil-attack-using-position-verification-method-in-manets
PPT
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
PPTX
Secure routing in wsn-attacks and countermeasures
PDF
Low Priced And Efficient Energy Replica Detection In WSN
PPTX
Redundancy Management in Heterogeneous Wireless Sensor Networks
PDF
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
PPTX
cyber security-2.pptx
PPTX
Black hole attack
PDF
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
PDF
I1802046780
PPTX
Vampire attack in wsn
PPTX
Security of RPL in IoT
PDF
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
PDF
Ijetcas14 538
PPTX
Protecting location privacy in sensor networks against a global eavesdropper
Security Issues in MANET
Copy of IoT Module 4-Security and privacy in IoT.pdf
security in wireless sensor network
Lecturasdfasdfasdfadsfasdfasdfasdfasddfsdfasdfasdfasdf14.ppt
seminar presentation
Detection of-sybil-attack-using-position-verification-method-in-manets
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
Secure routing in wsn-attacks and countermeasures
Low Priced And Efficient Energy Replica Detection In WSN
Redundancy Management in Heterogeneous Wireless Sensor Networks
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
cyber security-2.pptx
Black hole attack
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
I1802046780
Vampire attack in wsn
Security of RPL in IoT
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Ijetcas14 538
Protecting location privacy in sensor networks against a global eavesdropper

Network Information And Security

  • 1. Network Information and Security: Defending mechanism against SYBIL attack in mobile ad hoc network By: Anand Karandikar & Harshad Ghegadmal
  • 2. Introduction: • Network security • Mobile Ad Hoc Network • MANET is vulnerable to attacks due to 1]Dynamic change in topology 2]Lack of proper line of defense 3]Lack of centralized Authority 4]Cooperative nature for Ad Hoc routing algorithms 5]wireless communication links
  • 3. Sybil attack: • Nodes maintain the connectivity in the nodes outside the broadcast range • Use of routing protocols for path finding • Assigning unique address by 1]IP address 2]MAC (media access channel) • In Unrestricted protocols DSR & AODV address identifier are falsified by malicious mode giving opportunity for Sybil attack
  • 4. Review of Sybil attack: • MANET uses redundant algorithms creates difficulties for attacker to destroy the integrity of information • Detection of change in Packet during transmission • Detection & Isolation of suspected node • Decrease in efficiency of Sybil attack detection technique due to malicious node • Prevention due to cryptographically authenticated node
  • 5. Detection models: 1. PKI based protocols 2. Threshold-based protocols 3. Reputation schemes 4. Watchdog mechanism 5. Improved Watchdog-like mechanism
  • 6. Multifactor Authentication scheme: The Multifactor authentication of the other node is usually performed in two steps: 1] A certified signature key links an entity to a claimed identity. 2] The reading of the physical characteristics of the examined node links the physical node to the claimed identity.
  • 7. Implementation of multifactor Authentication framework: • Implementation by combining traditional cryptographic technique & certified physical attribute • Steps- 1] verification of digital signature of each other contained in message. 2]analyzing the physical attribute of other node by comparing the readings against set of certified value.
  • 8. Passive Ad Hoc Sybil Identity detection scheme: • Functioning of the protocol is based on records of identities of the nodes broadcasting • Mobility of nodes in wireless Ad Hoc Network is utilized for identification • Basic fact =>individual nodes are free to move independently, all identities of a single attacker are bound to the single physical node & hence must move together • It includes-single node observer & multi-node observer
  • 9. Single node observer: • Protocol with single observer • Affinity between related pair is given by where Tij = number of intervals in which nodes i and j were observed together, Lij = number of intervals in which either i or j was observed alone, N =total number of intervals in the observation period
  • 10. Multiple node observer: • Protocols with more observer • Affinity value is given by Aij=(Tij-2Lij)wij where wij = (Tij+Lij)/N Here, Tij = number of intervals in which nodes i and are being observed together by n nodes, Lij = number of intervals in which either node i or j is being observed alone by n nodes, N = number of nodes sharing information with one another.
  • 11. Passive Ad Hoc Sybil Identity Detection with group detection (PASID-GD ): • Data transmission by legitimate node is simultaneous & Data transmission by Sybil attacker is serial • Identity criteria for Sybil detection in PASID- GD=>attacker with multiple identities sends message serially with few collision at MAC layer i.e. collision rate differentiate bet group of legitimate node & Sybil attacker
  • 12. Conclusion: Way to improve the Sybil attack defense mechanisms by ways: • Use of more accurate and closely synchronized clocks. • Equipment of mobile nodes with the GPS receiver • Use of mobile nodes with additional antenna
  • 13. References: • J. R. Douceur, The Sybil Attack , International Workshop on Peer-to-Peer Systems • L. Zhou, and Z. J. Haas, “Securing Ad Hoc networks,” IEEE Network Vol. 13 • en.wikipedia.org/wiki/Sybil_attack • www.math.cmu.edu/Sybilguard.asp