0
1
2
Prepared By
Md. Al-Amin-Al-Mehedi
Sr.System Engineer
Contact: mehedi480@gmail.com
+8801718161615
3
Content
 Introduction
 What is MANET ?
 Characteristic of MANET
 Routing protocol on MANET
 What is DSR protocol ?
...
4
Introduction
Wireless ad-hoc networks are composed of
autonomous nodes that are self- managed
without any infrastructure...
5
What is MANET?
A collection of wireless mobile hosts
forming a temporary network without the
aid of any established infr...
6
Characteristics of MANET
MANET characteristics:
Mobility and dynamic topology
Bandwidth-constrained
Energy-constraine...
7
Routing protocol on MANET
The routing protocols for a MANET are:
Dynamic source routing protocol (DSR)
Destination-seq...
8
What is DSR Protocol?
The Dynamic Source Routing protocol
(DSR) is a simple and efficient routing
protocol designed spec...
9
What is DSDV protocol?
The DSDV described is a table-driven
proactive protocol. The basic
improvements made include free...
10
What is AODV Protocol?
Ad-hoc On-Demand Distance Vector
(AODV) is an on demand routing protocol.
which is used to find ...
11
Why We Use AODV Protocol?
We select AODV Protocol because:
 One of the leading protocols for MANET
 Uses sequence num...
12
Security Design Issues in AODV
In based on security issues of AODV protocol
divided in to three categories, they are:
...
13
Security Design Issues in AODV
(Cont…)
Key exchange:
Nodes can generate a Group Session Key
between immediate neighbor...
14
Security Design Issues in AODV
(Cont…)
Secure Routing (RREQ):
Fig1(a): Secure routing (RREQ)
a
b
h
c
e
f
n
p
i
y
x
g
Ka...
15
Security Design Issues in AODV
(Cont…)
Data Protection:
Node ‘x’ desiring to establish end-to-end secure
data channel,...
16
Security Design Issues in AODV
(Cont…)
Secure Routing (RREP):
Fig1(b): Secure routing (RREP)
a
b
h
c
e
f
n
p
i
y
x
g
Ka...
17
Route discovery Process on
AODV protocol
Route request (RREQ):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.2 (a)
Fig.2 (b)
18
Route discovery Process on
AODV protocol
Route request (RREQ):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.2. (c) Fig.2. (d)
19
Route discovery Process on
AODV protocol
Routes reply (RREP):
1
2
4
3
5
6
7
1
2
4
3
5
6
7
Fig.3 (a)
Fig.3 (b)
20
Different attacks On AODV
Protocol
Known attacks on AODV are:
 Wormhole attack
 Colluding misrelay attack
 Replay at...
21
Wormhole attack
Wormhole attack:
In this attack, a pair of colluding attackers record
packets at one location and repla...
22
Wormhole attack (Cont…)
RREQ
RREQ through wormhole
RREP
Wireless link
Wormhole link
Fig 4: Wormhole Attack
4 6 8
1 11
7...
23
Colluding misrelay attack
Colluding misrelay attack:
In colluding misrelay attack, multiple attackers
work in collusion...
24
Colluding misrelay attack (Cont..)
Correct routing packet
Modified routing packet
Fig 5 : Colluding misrelay attack
1 2...
25
Replay Attack
Replay Attack:
A replay attack is a form of network attack in
which a valid data transmission is maliciou...
26
False Route Error Message
False Route Error Message:
The destination node or an intermediate node
along an active path ...
27
What Is DDOS Attacks?
Distributed Denial of Service (DDoS) attacks
involve breaking in to hundreds or thousands
of mach...
28
What Is Black Hole Attack?
A black hole attack is a severe attack that
can be easily employed against routing in
mobile...
29
Caused of Black hole attack
Scenario before the black hole attack:
A B C D
Active Link
Non active Link
Fig 6. (a)
30
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
M gets control over
A-D communicat...
31
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
Step 2
Black Hole
Packet Drop
Fig....
32
Why AODV is vulnerable
AODV is particularly vulnerable due to its fundamental
characteristics, such as open medium, dy...
33
Conclusion
The performance of routing protocols AODV
depends heavily on much kind of attacks.
One of these attacks is B...
34
Future Work
For future work, I want to show the
performance of AODV protocol when it is
affected by the black hole atta...
Study and analysis vurnerability of aodv protocol
Upcoming SlideShare
Loading in...5
×

Study and analysis vurnerability of aodv protocol

2,302

Published on

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,302
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
229
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • Custom animation effects: sparkle
    (Basic)
    To reproduce the text on this slide, do the following:
    On the Home tab, in the Slides group, click Layout, and then click Blank.
    On the Insert tab, in the Text group, click Text Box. On the slide, drag to draw a text box.
    Enter text and select it. On the Home tab, in the Font group, in the Font list select Franklin Gothic Heavy, and then in the Font Size box, select 96 pt.
    On the Home tab, in the Paragraph group, click Center.
    Select the text box, and then under Drawing Tools, on the Format tab, in the WordArt Styles group, click Text Effects, point to Reflection, and under Reflection Variations select Tight Reflection, Touching (first row, the first option from the left).
    With the text box still selected, under Drawing Tools, on the Format tab, in the bottom right corner of the WordArt Styles group, click the Format Text Effects: Text Box dialog box launcher. In the Format Text Effects dialog box, click Text Fill in the left pane, select Gradient fill in the Text Fill pane, and then do the following:
    Click the button next to Preset colors, and then click Ocean (second row, second option from the left).
    In the Type list, select Linear.
    Click the button next to Direction, and then click Linear Up (second row, second option from the left).
    Also in the Format Text Effects dialog box, click 3-D Format in the left pane. In the 3-D Format pane, under Bevel, click the button next to Top, and then under Bevel click Circle (first row, first option from the left).
    To reproduce the first star on this slide, do the following:
    On the Home tab, in the Drawing group, click Shapes, and then under Stars and Banners click 4-Point Star (first row, third option from the left). On the slide, drag to draw a star.
    On the slide, drag the star onto the top of the first letter (in the example slide, it is “S”) in the text box.
    With the star still selected, drag the yellow diamond adjustment handle down to make the points thinner.
    On the Home tab, in the bottom right corner in the Drawing group, click the Format Shape dialog box launcher. In the Format Shape dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
    In the Type list, select Radial.
    Click the button next to Direction, and then click From Center (third option from the left).
    Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
    Also under Gradient stops, customize the gradient stops that you added as follows:
    Select Stop 1 from the list, and then do the following:
    In the Stop position box, enter 0%.
    Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
    Select Stop 2 from the list, and then do the following:
    In the Stop position box, enter 100%.
    Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
    In the Transparency box, enter 100%.
    Also in the Format Shape dialog box, click Line Color in the left pane, and in the Line Color pane click No line.
    Under Drawing Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, under Size and rotation do the following:
    In the Height box, enter 0.51”.
    In the Width box, enter 0.51”.
    In the Rotation box, enter 15°.
    To reproduce the other stars on this slide, do the following:
    On the slide, select the star. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate.
    On the slide, drag the second star until it slightly overlaps the edge of a letter in the text box.
    Change the size of the star in the Drawing Tools, on the Format tab, in the Size group.
    Repeat steps 1-3 for a total of five stars.
    To reproduce the animation effects on this slide, do the following:
    On the Animations tab, in the Animations group, click Custom Animation.
    On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
    Select the animation effect (grow & turn entrance effect for the first star). Under Modify: Grow & Turn, do the following:
    In the Start list, select With Previous.
    In the Speed list, select Very Fast.
    On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
    Select the second animation effect (grow & turn exit effect for the first star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.7.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
    Select the third animation effect (grow & turn entrance effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.2.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
    Select the fourth animation effect (grow & turn exit effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.9.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
    Select the fifth animation effect (grow & turn entrance effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.4.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
    Select the sixth animation effect (grow & turn exit effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 1.1.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
    Select the seventh animation effect (grow & turn entrance effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.8.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
    Select the eighth animation effect (grow & turn exit effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 1.4.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
    Select the ninth animation effect (grow & turn entrance effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 0.9.
    In the Speed list, select 0.5 seconds (Very Fast).
    On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
    Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
    Select the 10th animation effect (grow & turn exit effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
    In the Start list, select With Previous.
    In the Delay box enter 1.5.
    In the Speed list, select 0.5 seconds (Very Fast).
    To reproduce the background effects on this slide, do the following:
    Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
    In the Type list, select Radial.
    Click the button next to Direction, and then click From Center (third option from the left).
    Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
    Also under Gradient stops, customize the gradient stops that you added as follows:
    Select Stop 1 from the list, and then do the following:
    In the Stop position box, enter 0%.
    Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 35% (third row, second option from the left).
    Select Stop 2 from the list, and then do the following:
    In the Stop position box, enter 100%.
    Click the button next to Color, and then under Theme Colors click Black, Text 1 (first row, second option from the left).
  • Transcript of "Study and analysis vurnerability of aodv protocol"

    1. 1. 1
    2. 2. 2 Prepared By Md. Al-Amin-Al-Mehedi Sr.System Engineer Contact: mehedi480@gmail.com +8801718161615
    3. 3. 3 Content  Introduction  What is MANET ?  Characteristic of MANET  Routing protocol on MANET  What is DSR protocol ?  What is DSDV protocol ?  What is AODV Protocol?  Why We Use AODV Protocol?  Security On AODV Protocol.  Route discovery process of AODV  Different attacks On AODV Protocol.  Wormhole attack  Colluding misrelay attack  Replay attack  False route error message  What is DDOS Attacks?  What is Black Hole Attack?  Why AODV is vulnerable ?  Conclusion  Future Work
    4. 4. 4 Introduction Wireless ad-hoc networks are composed of autonomous nodes that are self- managed without any infrastructure. In this way, ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time.
    5. 5. 5 What is MANET? A collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure. Each node operates as both an end-system and a router.
    6. 6. 6 Characteristics of MANET MANET characteristics: Mobility and dynamic topology Bandwidth-constrained Energy-constrained Prone to security threats
    7. 7. 7 Routing protocol on MANET The routing protocols for a MANET are: Dynamic source routing protocol (DSR) Destination-sequenced distance-vector routing protocol (DSDV) Ad hoc on-demand distance vector (AODV)
    8. 8. 8 What is DSR Protocol? The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes.
    9. 9. 9 What is DSDV protocol? The DSDV described is a table-driven proactive protocol. The basic improvements made include freedom from loops in routing tables, more dynamic and less convergence time.
    10. 10. 10 What is AODV Protocol? Ad-hoc On-Demand Distance Vector (AODV) is an on demand routing protocol. which is used to find a route between the source and destination node as needed.
    11. 11. 11 Why We Use AODV Protocol? We select AODV Protocol because:  One of the leading protocols for MANET  Uses sequence numbers to avoid loops  Quick adaptation to dynamic networks  Unicasting and multicasting is possible  Avoids counting to infinity problem
    12. 12. 12 Security Design Issues in AODV In based on security issues of AODV protocol divided in to three categories, they are: Key Exchange Secure Routing Data Protection
    13. 13. 13 Security Design Issues in AODV (Cont…) Key exchange: Nodes can generate a Group Session Key between immediate neighbors using a suitable group keying protocol. These session keys are used for securing the routing process and data flow. Thus authentication, confidentiality and integrity are assured.
    14. 14. 14 Security Design Issues in AODV (Cont…) Secure Routing (RREQ): Fig1(a): Secure routing (RREQ) a b h c e f n p i y x g Ka Kb Kh Kn Kx Kx Kc Ke Kf Kp Kf Kg
    15. 15. 15 Security Design Issues in AODV (Cont…) Data Protection: Node ‘x’ desiring to establish end-to-end secure data channel, first establishes a session key Kxy with ‘y’. ‘x’ symmetrically encrypts the data packet using Kxy and transmits it over the secure route. Intermediate nodes forward the packet in the intended direction. Node ‘y’ decrypts the encrypted data packet using Kxy.
    16. 16. 16 Security Design Issues in AODV (Cont…) Secure Routing (RREP): Fig1(b): Secure routing (RREP) a b h c e f n p i y x g Ka Kb Kh Kn Kx Kx Kc Ke Kf Kp Kf Kg Kxy
    17. 17. 17 Route discovery Process on AODV protocol Route request (RREQ): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.2 (a) Fig.2 (b)
    18. 18. 18 Route discovery Process on AODV protocol Route request (RREQ): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.2. (c) Fig.2. (d)
    19. 19. 19 Route discovery Process on AODV protocol Routes reply (RREP): 1 2 4 3 5 6 7 1 2 4 3 5 6 7 Fig.3 (a) Fig.3 (b)
    20. 20. 20 Different attacks On AODV Protocol Known attacks on AODV are:  Wormhole attack  Colluding misrelay attack  Replay attacks.  False route error.  DDOS attack.
    21. 21. 21 Wormhole attack Wormhole attack: In this attack, a pair of colluding attackers record packets at one location and replay them at another location using a private high speed network. The seriousness of this attack is that it can be launched against all communications that provide authenticity and confidentiality.
    22. 22. 22 Wormhole attack (Cont…) RREQ RREQ through wormhole RREP Wireless link Wormhole link Fig 4: Wormhole Attack 4 6 8 1 11 753 9 2 10 Attacker1 Attacker2 Target
    23. 23. 23 Colluding misrelay attack Colluding misrelay attack: In colluding misrelay attack, multiple attackers work in collusion to modify or drop routing packets to disrupt routing operation in a MANET. This attack is difficult to detect by using the conventional methods such as watchdog and path rater.
    24. 24. 24 Colluding misrelay attack (Cont..) Correct routing packet Modified routing packet Fig 5 : Colluding misrelay attack 1 2 3 4 Attacker1 Attacker2
    25. 25. 25 Replay Attack Replay Attack: A replay attack is a form of network attack in which a valid data transmission is maliciously repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution.
    26. 26. 26 False Route Error Message False Route Error Message: The destination node or an intermediate node along an active path moves or fails, the node which precedes the broken link broadcast a route error message to all active neighbors which precede the broken link. The nodes then invalidate the route for this destination in their routing tables.
    27. 27. 27 What Is DDOS Attacks? Distributed Denial of Service (DDoS) attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. This kind of attack, consume more bandwidth and uses more sources in network. One of the most important attacks of DDoS attacks category is Black hole attack.
    28. 28. 28 What Is Black Hole Attack? A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets.
    29. 29. 29 Caused of Black hole attack Scenario before the black hole attack: A B C D Active Link Non active Link Fig 6. (a)
    30. 30. 30 Caused of Black hole attack (Cont..) Scenario after the black hole attack: A B C D M M gets control over A-D communications Step 1 Fig.6. (b)
    31. 31. 31 Caused of Black hole attack (Cont..) Scenario after the black hole attack: A B C D M Step 2 Black Hole Packet Drop Fig.6. (c)
    32. 32. 32 Why AODV is vulnerable AODV is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Each mobile node operates not only as a host but also as a router.
    33. 33. 33 Conclusion The performance of routing protocols AODV depends heavily on much kind of attacks. One of these attacks is Black hole attack. This attack has high effect on AODV protocol.
    34. 34. 34 Future Work For future work, I want to show the performance of AODV protocol when it is affected by the black hole attack. I will use network simulator-2(NS-2) to show the performance of AODV protocol during black hole attack.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×