Security of ad hoc networks

1,578 views

Published on

this presentation gives you best you want in ad hoc networks and wireless networking

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,578
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
114
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Security of ad hoc networks

  1. 1. -A Presentation on-Security of Ad-Hoc Networks -Presented By- Jayesh Rane R.C.Patel Institute of Technology, Shirpur.
  2. 2. Traditional Wireless Network high speed backbone Infrastructure on-line – base stations server – high speed backbone – on-line servers Network operators – operate and maintain the system – determine policies Single-hop wireless communication base mobile station station 2 Security in Ad-Hoc Networks
  3. 3. Wireless Ad-Hoc Networks No infrastructure – no base stations – no backbone – no servers ( P2P) No network operators – self-organization – self-configuration – self-healing Multi-hop wireless communication Security in Ad-Hoc Networks 3
  4. 4. Motivation Security is the most often cited concern with wireless networks Wireless networks pose unique security problems Power computation constraints are often higher in wireless networks, making security requirements different Security in Ad-Hoc Networks 4
  5. 5. Attacks on Ad-Hoc Networks• Place of disclosure: Location disclosure Attacks that target Confidentiality requirements of the ad hoc network.• A black hole: Attack malicious node and enters false answers route to route requests it receives• Wormholes: It involves co-operation between the two malicious nodes that participate in the network to appear one attacker.• Denial of Service: Specific instances of denial of service attacks include the routing table overflow and the sleep deprivation torture. Security in Ad-Hoc Networks 5
  6. 6. Why Security Required? Data confidentiality: keep data secret Data integrity: prevent data from being altered Data freshness: data must be recent Data availability: data should be available on request Data authentication: confirmation that data or request came from a specific, valid sender Security in Ad-Hoc Networks 6
  7. 7. Security Challenges Vulnerability of channels Messages can be overheard and fake messages can be introduced into the network Vulnerability of nodes Nodes do not usually reside in physically protected places Lack of infrastructure Special networks should operate independently of any fixed infrastructure. Dynamic Topology The permanent changes of topology require sophisticated routing protocols Security in Ad-Hoc Networks 7
  8. 8. Solution against Attacks1. Model Based on TTP(Third Trusted Party) Security in Ad-Hoc Networks 8
  9. 9. Solution against Attacks(cont…)2. Secure Aware Protocol (For Blackhole Attack)  Improve the relevance of the routes discovered by ad hoc routing protocols.  Embed security metric into the RREQ packet  Authenticated users belonging to same trust level share a secret key Security in Ad-Hoc Networks 9
  10. 10. Solution against Attacks3. Packet Leashes (for Wormhole Attacks)  The recipient of the packet is within a certain distance from the sender  Each node must know its own location; all nodes must have loosely synchronized clocks Security in Ad-Hoc Networks 10
  11. 11. Research Directions• Decentralized public-key management schemes – using threshold cryptography – exploiting mobility and secure side channels• Secure ad hoc routing – various schemes for authenticating routing information that is distributed or exchanged among the nodes• Incentives for co-operation – micro-payment based schemes – reputation based schemes• Low cost cryptographic primitives (algorithms and protocols) Security in Ad-Hoc Networks 11
  12. 12. Conclusion• Security in ad hoc networks is a very challenging issue• Basic Mechanisms – Difficult to force the nodes to collaborate – No standard routing protocol yet• Because of their characteristics, ad hoc networks, are open especially to Denial of service attacks• Classical security solutions are not suited for ad hoc networks – Security services should be distributed• Standard protocols? – At the moment no universal solution Security in Ad-Hoc Networks 12
  13. 13. Summary Traditional Wireless Networks Wireless Ad-Hoc Networks Attacks on Ad-Hoc Networks Why Security Required? Security Challenges Solutions for Challenges » Model based on TTP » Protection against Black Holes » Protection against Wormholes Research Directions Conclusion Security in Ad-Hoc Networks 13
  14. 14. Security in Ad-Hoc Networks 14

×