security issues in manet
Post on 09-Jun-2015
Embed Size (px)
DESCRIPTIONThis presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
- 1. Security Attack In MANETNitin Verma2011BTechCSE005
2. What is MANET ? MANET is a type of multi-hop network, infrastructure less and the mostimportant self organizing. Due to its wireless and distributed nature there is a great challenge for systemsecurity designers. 3. Characteristics Dynamic Topologies Energy-constrained Operation Limited Bandwidth 4. Continued Note : One of the main characteristic of MANETs with respect tosecurity design point of view is the lack of clear line defence. There is no well defined rule or place where traffic from different nodesshould be monitored or access control mechanisms can be enforced. Due tothis, there is no any defence line that separates inside network from theoutside network 5. Challanges Movability Routing :PRO-ACTIVERE-ACTIVEHYBRID 6. Security service Authentication : means correct identity is known to communicating authority. Confidentiality : means message information is kept secure from unauthorizedaccess. Integrity : means message is unaltered during the communication between twoparties. 7. Types of attack Active Attack Passive Attack 8. Active attack Attacker attempt to modify the data being exchange in network. It may disrupts the normal functioning of network. In active attack, the intruders can modify the packets, inject the packets, dropthe packet or it can use various features of network to launch the attack. 9. Passive attack Attackers snoop the data exchanged in network without altering it. This attack target the confidentiality attribute of system. It is very difficult to detect because the operation of network is not affectedby this kind of attack. 10. Attacks in manet Attacks in MANET can also be classified as :- External attack : Carried out by node that do not belong to the domain ofthe network. Internal attack : It is from compromised nodes, which are actually part of thenetwork. 11. Black hole attack A black-hole is a malicious node that falsely replies for route request withouthaving an active route to the destination and exploits the routing protocol toadvertise itself as having shortest route to destination. By advertising the shortest route, source station starts sending data throughthe black hole node and it becomes the active element in route. 12. Wormhole attack In this attack, an attacker records packets at one location in the network &tunnel them to another location. When an wormhole attack is used against an on-demand routing protocolthe attack could prevent the discovery of any routes other than through thewormhole. 13. Sleep Deprivation It is also called as resource consumption attack. An attacker can attempt to consume battery life by requesting excessive routediscovery, or by forwarding unnecessary packet to the victim node. 14. Eavesdropping The main goal of eavesdropping is obtain to confidential information thatshould be kept secret during the communication. This confidential information may include the location, public key, privatekey or even password of nodes. 15. Flooding attack RREQ Flooding Data Flooding 16. RREQ flooding In the RREQ flooding attack, the attacker broadcast the many RREQ packetfor the IP which does not exist in the network. Effects :Consumes network bandwidth.Consumes node battery power. 17. Data flooding In this, data packets are used to flood the network. EffectsHard to detect.Can be detected by the application layer. 18. Security mechanism Preventive Mechanism : Conventional authentication & encryption scheme based oncryptography.CryptographyHash functionDigital signature Reactive Mechanism : An intrusion detection system is used as second line of defence.Anomaly based IDSSignature based IDS 19. conclusion Due to mobility & open media nature, the mobile ad-hoc networks are moreprone to security threat compared to the wired network. Therefore security need are higher in mobile ad-hoc networks as comparedto traditional networks.