study and analysis vurnerability of aodv protocol

35
1

Upload: mehedi

Post on 06-May-2015

2.279 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Study and analysis vurnerability of aodv protocol

1

Page 2: Study and analysis vurnerability of aodv protocol

2

Prepared By

Md. Al-Amin-Al-Mehedi Sr.System Engineer

Contact: [email protected] +8801718161615

Page 3: Study and analysis vurnerability of aodv protocol

3

Content Introduction What is MANET ? Characteristic of MANET Routing protocol on MANET What is DSR protocol ? What is DSDV protocol ? What is AODV Protocol? Why We Use AODV Protocol? Security On AODV Protocol. Route discovery process of AODV Different attacks On AODV Protocol. Wormhole attack Colluding misrelay attack Replay attack False route error message

What is DDOS Attacks? What is Black Hole Attack? Why AODV is vulnerable ? Conclusion Future Work

Page 4: Study and analysis vurnerability of aodv protocol

4

Introduction

Wireless ad-hoc networks are composed of autonomous nodes that are self- managed without any infrastructure. In this way, ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time.

Page 5: Study and analysis vurnerability of aodv protocol

5

What is MANET?

A collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure. Each node operates as both an end-system and a router.

Page 6: Study and analysis vurnerability of aodv protocol

6

Characteristics of MANET

MANET characteristics:

Mobility and dynamic topologyBandwidth-constrained Energy-constrainedProne to security threats

Page 7: Study and analysis vurnerability of aodv protocol

7

Routing protocol on MANET

The routing protocols for a MANET are:

Dynamic source routing protocol (DSR)Destination-sequenced distance-vector routing

protocol (DSDV)Ad hoc on-demand distance vector (AODV)

Page 8: Study and analysis vurnerability of aodv protocol

8

What is DSR Protocol?

The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes.

Page 9: Study and analysis vurnerability of aodv protocol

9

What is DSDV protocol?

The DSDV described is a table-driven proactive protocol. The basic improvements made include freedom from loops in routing tables, more dynamic and less convergence time.

Page 10: Study and analysis vurnerability of aodv protocol

10

What is AODV Protocol?

Ad-hoc On-Demand Distance Vector (AODV) is an on demand routing protocol. which is used to find a route between the source and destination node as needed.

Page 11: Study and analysis vurnerability of aodv protocol

11

Why We Use AODV Protocol?

We select AODV Protocol because:

One of the leading protocols for MANET Uses sequence numbers to avoid loops Quick adaptation to dynamic networks Unicasting and multicasting is possible Avoids counting to infinity problem

Page 12: Study and analysis vurnerability of aodv protocol

12

Security Design Issues in AODV

In based on security issues of AODV protocoldivided in to three categories, they are:

Key ExchangeSecure RoutingData Protection

Page 13: Study and analysis vurnerability of aodv protocol

13

Security Design Issues in AODV(Cont…)

Key exchange:

Nodes can generate a Group Session Key between immediate neighbors using a suitable group keying protocol.

These session keys are used for securing the routing process and data flow.

Thus authentication, confidentiality and integrity are assured.

Page 14: Study and analysis vurnerability of aodv protocol

14

Security Design Issues in AODV(Cont…)

Secure Routing (RREQ):

Fig1(a): Secure routing (RREQ)

a

bh

c

e

f

n

p

i

y

x

g

Ka

Kb KhKn

Kx

Kx

Kc Ke

Kf

Kp

Kf

Kg

Page 15: Study and analysis vurnerability of aodv protocol

15

Security Design Issues in AODV(Cont…)

Data Protection:

Node ‘x’ desiring to establish end-to-end secure data channel, first establishes a session key Kxy with ‘y’.

‘x’ symmetrically encrypts the data packet using Kxy and transmits it over the secure route.

Intermediate nodes forward the packet in the intended direction.

Node ‘y’ decrypts the encrypted data packet using Kxy.

Page 16: Study and analysis vurnerability of aodv protocol

16

Security Design Issues in AODV(Cont…)

Secure Routing (RREP):

Fig1(b): Secure routing (RREP)

a

bh

c

e

f

n

p

i

y

x

g

Ka

Kb KhKn

Kx

Kx

Kc Ke

Kf

Kp

Kf

KgKxy

Page 17: Study and analysis vurnerability of aodv protocol

17

Route discovery Process on AODV protocol

Route request (RREQ):

1

2

4

3

5

6

7

1

2

4

3

5

6

7

Fig.2 (a)Fig.2 (b)

Page 18: Study and analysis vurnerability of aodv protocol

18

Route discovery Process on AODV protocol

Route request (RREQ):

1

2

4

3

5

6

7

1

2

4

3

5

6

7

Fig.2. (c) Fig.2. (d)

Page 19: Study and analysis vurnerability of aodv protocol

19

Route discovery Process on AODV protocol

Routes reply (RREP):

1

2

4

3

5

6

7

1

2

4

3

5

6

7

Fig.3 (a)Fig.3 (b)

Page 20: Study and analysis vurnerability of aodv protocol

20

Different attacks On AODV Protocol

Known attacks on AODV are:

Wormhole attack Colluding misrelay attack Replay attacks. False route error. DDOS attack.

Page 21: Study and analysis vurnerability of aodv protocol

21

Wormhole attack

Wormhole attack:

In this attack, a pair of colluding attackers record packets at one location and replay them at another location using a private high speed network. The seriousness of this attack is that it can be launched against all communications that provide authenticity and confidentiality.

Page 22: Study and analysis vurnerability of aodv protocol

22

Wormhole attack (Cont…)

RREQ

RREQ through wormhole

RREP

Wireless link

Wormhole link

Fig 4: Wormhole Attack

4 6 8

1 11

753 9

2

10

Attacker1 Attacker2

Target

Page 23: Study and analysis vurnerability of aodv protocol

23

Colluding misrelay attack

Colluding misrelay attack:

In colluding misrelay attack, multiple attackers

work in collusion to modify or drop routing packets to disrupt routing operation in a MANET.

This attack is difficult to detect by using the conventional methods such as watchdog and path rater.

Page 24: Study and analysis vurnerability of aodv protocol

24

Colluding misrelay attack (Cont..)

Correct routing packet

Modified routing packet

Fig 5 : Colluding misrelay attack

1 2 3 4

Attacker1 Attacker2

Page 25: Study and analysis vurnerability of aodv protocol

25

Replay Attack

Replay Attack:

A replay attack is a form of network attack in which a valid data transmission is maliciously repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution.

Page 26: Study and analysis vurnerability of aodv protocol

26

False Route Error Message

False Route Error Message: The destination node or an intermediate node

along an active path moves or fails, the node which precedes the broken link broadcast a route error message to all active neighbors which precede the broken link. The nodes then invalidate the route for this destination in their routing tables.

Page 27: Study and analysis vurnerability of aodv protocol

27

What Is DDOS Attacks?

Distributed Denial of Service (DDoS) attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. This kind of attack, consume more bandwidth and uses more sources in network. One of the most important attacks of DDoS attacks category is Black hole attack.

Page 28: Study and analysis vurnerability of aodv protocol

28

What Is Black Hole Attack?

A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets.

Page 29: Study and analysis vurnerability of aodv protocol

29

Caused of Black hole attack

Scenario before the black hole attack:

A B C D

Active Link Non active Link

Fig 6. (a)

Page 30: Study and analysis vurnerability of aodv protocol

30

Caused of Black hole attack (Cont..)

Scenario after the black hole attack:

A

B C D

M

M gets control over A-D communications

Step 1

Fig.6. (b)

Page 31: Study and analysis vurnerability of aodv protocol

31

Caused of Black hole attack (Cont..)

Scenario after the black hole attack:

A

B C D

M

Step 2

Black HolePacket Drop

Fig.6. (c)

Page 32: Study and analysis vurnerability of aodv protocol

32

Why AODV is vulnerable

AODV is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability.

Each mobile node operates not only as a host but also as a router.

Page 33: Study and analysis vurnerability of aodv protocol

33

Conclusion

The performance of routing protocols AODV depends heavily on much kind of attacks. One of these attacks is Black hole attack. This attack has high effect on AODV protocol.

Page 34: Study and analysis vurnerability of aodv protocol

34

Future Work

For future work, I want to show the performance of AODV protocol when it is affected by the black hole attack. I will use network simulator-2(NS-2) to show the performance of AODV protocol during black hole attack.

Page 35: Study and analysis vurnerability of aodv protocol