SlideShare a Scribd company logo
Security in Wireless Ad-Hoc
Networks
by
Raju Vemula
Outline
lIntroduction
lMANET
lSSN
lSecurity
lProperties
lFunctions
lClassification of attacks
lSolutions
lConclusion
lReferences
Introduction
lDifferent technologies have been developed for
different situations and necessities.
lWi-Fi technology for Wireless LAN and short range
mobile access networks.
lWireless USB is technology for Internet network on
the go.
lDifferent technologies like infrared, bluetooth are short
range.
Introduction
lAd-Hoc network?
lA network formed without any central administration
which consists of mobile nodes that uses a wireless
interface to send packet data.
lImage from www.microsoft.com
Introduction
lThere are 2 types ad-hoc networks.
lMANET(Mobile ad-hoc network)
lAn autonomous system of mobile hosts connected
by wireless links, often called MANET.
lEstablishing survivable, efficient, dynamic
communication for emergency/rescue
operations.
lDisaster relief efforts.
MANET
http://www.comp.nus.edu.sg/~xuemingq/research.html
http://www.comp.nus.edu.sg/~xuemingq/research.html
Introduction
lWSN(Wireless Sensor Network)
lA smart sensor network consists of a number of
sensors spread across a geographical area.
lEach sensor has wireless communication capability
and sufficient intelligence for signal processing and
networking.
lMilitary sensor networks to detect enemy
movements.
lThe presence of hazardous material.
lEnvironmental sensor networks to detect and
monitor environmental changes.
Wireless Sensor Network
http://www.alicosystems.com/wireless%20sensor.htm
http://www.alicosystems.com/wireless%20sensor.htm
Properties
 There is no fixed topology
 Wireless nodes are small they move freely in and out
of range.
lE.g. Mobile phones, PDA, and wrist watches.
 Limited energy
 Most of the devices are operate on battery power
which is limited.
Properties
 Every node is a router
 Every node present in the network has limited amount of
communication range. All nodes out of this range can only
be reached by packet forwarding.
 Limited CPU/Resources
 In consume electronics price plays a big role.
 They are cheap and have limited CPU power.
Security Functions
 Availability
 It makes sure that all the required network services are
available to the authorized users.
 Authentication
 Authentication enables MANET to ensure the identity of
peer node that is communicating with.
 Confidentiality
 Confidentiality ensures that some information discloses
only to the unauthorized users.
Security Functions
 Data Integrity
 It guarantees for the information that is being
transferred.
 Key and trust management
 Basic operations includes establishing key
exchange and update as well as secret
connections.
Classification of attacks
lThere are so many ways that a malicious user may attack a ad-
hoc network.
lInternal attacks
lInternal attacks are more difficult to protect against as
the internal nodes are trustworthy.
lExternal attacks
lExternal attacks are produced by users which are not
part of network. For example one may issue an attack on
company from the office next to that.
Classification of attacks
lThe other types of attacks are:
lActive attacks
lActive attacks are caused by the users who are able to
inject the packets into the network. They are able to alter
the data, interfere with the routing information and
disrupt the service.
lPassive attacks
lPassive attacks is mainly to steal information and to
listen on the communication in the network. These may
monitor and analyze the traffic.
Classification of attacks
lAnother way to classify the attacks is by the layer at which
they may occur.
lAt the physical layer the malicious user may jam the
communication, intercept the messages or they may just listen
the messages.
lAt the data link layer the attacks conducted are traffic analysis
and monitoring and service disruption.
lAt network layer many attacks are observed like wormhole,
black hole, flooding, and resource consumption.
• Wormhole Attack:
In this attack network tunnel information to another network.
At this time hacker may easily enter and do misuse inside
the network.
• Black hole Attack:
It is a type of DOS(Denial of service) attack in which a router
that is supposed to relay packets instead discard them.
Solutions
l“Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad
Hoc Networks”, Yih-Chun Hu, Adrian Perrig, David. B. Johnson
lProtection against warm-hole attacks
lPacket leashes
lTemporal
lThe packet has an upper bound on its lifetime which restricts
the maximum travel distance.
lTransmission time and expiration time of the packet.
lGeographical
lThe recipient of the packet is within a certain distance from
the sender.
Solutions
l“Security-Aware Ad Hoc Routing for Wireless Networks”, Seung
Yi, Prasad Naldurg, Robert Kravets
lProtection against black-hole attacks
lUser identity is bound with an associated trust level.
lFor each trust level, it is used a simple shared secret to
generate a symmetric encryption/decryption key
lProvides a suite of cryptographic techniques: digital
signature, and encryption
Key Management
lKey management system must be secure, cause most
cryptographic system rely on it.
l3 types of keys in the network
lGroup Key
Key for all members in group to encrypt and
decrypt the data.
lSymmetric key
Shared between team leader and member node
of the same group.
lShared key
Shared only by all group leaders in the network.
Conclusion
lSituations are unpredictable with the wireless networks,
even with the infrastructural support.
lPresent solutions to address these attacks are not strong
enough.
lKey management solutions may help, but not every time.
lStill a lot of research has to be done.
References
lH Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, “Security in mobile ad hoc networks:
Challenges and solutions” (2004). IEEE Wireless Communications. 11 (1), pp. 38-47.
lYih-Chun Hu , Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE
Security and Privacy, v.2 n.3, p.28-39, May 2004.
lThe Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Frank Stajano, Ross Anderson.
lAdam Burg, “Ad hoc network specific attacks”, Seminar on Ad hoc
networking: concepts, applications, and security, Technische Universitat
Munchen, 2003.
lCharles E. Perkins (Hrsg.). Ad Hoc Networking, Addison-Wesley 2000.
Thank you

More Related Content

What's hot

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Zdravko Danailov
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
IJNSA Journal
 
D0961927
D0961927D0961927
D0961927
IOSR Journals
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
Thesis Scientist Private Limited
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
1705 1708
1705 17081705 1708
1705 1708
Editor IJARCET
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
Kunal Prajapati
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
Pecific University
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
ambitlick
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 

What's hot (19)

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
D0961927
D0961927D0961927
D0961927
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
1705 1708
1705 17081705 1708
1705 1708
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 

Similar to Ad hoc secuirty-vemula

G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
elango30
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Paper1
Paper1Paper1
Paper1
SpacSec
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
IOSR Journals
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
aibad ahmed
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Mobile slide
Mobile slideMobile slide
Mobile slide
Aman singh
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Gw2412271231
Gw2412271231Gw2412271231
Gw2412271231
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 

Similar to Ad hoc secuirty-vemula (20)

G011123539
G011123539G011123539
G011123539
 
Network security
Network security Network security
Network security
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A05510105
A05510105A05510105
A05510105
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Paper1
Paper1Paper1
Paper1
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Gw2412271231
Gw2412271231Gw2412271231
Gw2412271231
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Ad hoc secuirty-vemula

  • 1. Security in Wireless Ad-Hoc Networks by Raju Vemula
  • 3. Introduction lDifferent technologies have been developed for different situations and necessities. lWi-Fi technology for Wireless LAN and short range mobile access networks. lWireless USB is technology for Internet network on the go. lDifferent technologies like infrared, bluetooth are short range.
  • 4. Introduction lAd-Hoc network? lA network formed without any central administration which consists of mobile nodes that uses a wireless interface to send packet data. lImage from www.microsoft.com
  • 5. Introduction lThere are 2 types ad-hoc networks. lMANET(Mobile ad-hoc network) lAn autonomous system of mobile hosts connected by wireless links, often called MANET. lEstablishing survivable, efficient, dynamic communication for emergency/rescue operations. lDisaster relief efforts.
  • 7. Introduction lWSN(Wireless Sensor Network) lA smart sensor network consists of a number of sensors spread across a geographical area. lEach sensor has wireless communication capability and sufficient intelligence for signal processing and networking. lMilitary sensor networks to detect enemy movements. lThe presence of hazardous material. lEnvironmental sensor networks to detect and monitor environmental changes.
  • 9. Properties  There is no fixed topology  Wireless nodes are small they move freely in and out of range. lE.g. Mobile phones, PDA, and wrist watches.  Limited energy  Most of the devices are operate on battery power which is limited.
  • 10. Properties  Every node is a router  Every node present in the network has limited amount of communication range. All nodes out of this range can only be reached by packet forwarding.  Limited CPU/Resources  In consume electronics price plays a big role.  They are cheap and have limited CPU power.
  • 11. Security Functions  Availability  It makes sure that all the required network services are available to the authorized users.  Authentication  Authentication enables MANET to ensure the identity of peer node that is communicating with.  Confidentiality  Confidentiality ensures that some information discloses only to the unauthorized users.
  • 12. Security Functions  Data Integrity  It guarantees for the information that is being transferred.  Key and trust management  Basic operations includes establishing key exchange and update as well as secret connections.
  • 13. Classification of attacks lThere are so many ways that a malicious user may attack a ad- hoc network. lInternal attacks lInternal attacks are more difficult to protect against as the internal nodes are trustworthy. lExternal attacks lExternal attacks are produced by users which are not part of network. For example one may issue an attack on company from the office next to that.
  • 14. Classification of attacks lThe other types of attacks are: lActive attacks lActive attacks are caused by the users who are able to inject the packets into the network. They are able to alter the data, interfere with the routing information and disrupt the service. lPassive attacks lPassive attacks is mainly to steal information and to listen on the communication in the network. These may monitor and analyze the traffic.
  • 15. Classification of attacks lAnother way to classify the attacks is by the layer at which they may occur. lAt the physical layer the malicious user may jam the communication, intercept the messages or they may just listen the messages. lAt the data link layer the attacks conducted are traffic analysis and monitoring and service disruption. lAt network layer many attacks are observed like wormhole, black hole, flooding, and resource consumption.
  • 16. • Wormhole Attack: In this attack network tunnel information to another network. At this time hacker may easily enter and do misuse inside the network. • Black hole Attack: It is a type of DOS(Denial of service) attack in which a router that is supposed to relay packets instead discard them.
  • 17. Solutions l“Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, Yih-Chun Hu, Adrian Perrig, David. B. Johnson lProtection against warm-hole attacks lPacket leashes lTemporal lThe packet has an upper bound on its lifetime which restricts the maximum travel distance. lTransmission time and expiration time of the packet. lGeographical lThe recipient of the packet is within a certain distance from the sender.
  • 18. Solutions l“Security-Aware Ad Hoc Routing for Wireless Networks”, Seung Yi, Prasad Naldurg, Robert Kravets lProtection against black-hole attacks lUser identity is bound with an associated trust level. lFor each trust level, it is used a simple shared secret to generate a symmetric encryption/decryption key lProvides a suite of cryptographic techniques: digital signature, and encryption
  • 19. Key Management lKey management system must be secure, cause most cryptographic system rely on it. l3 types of keys in the network lGroup Key Key for all members in group to encrypt and decrypt the data. lSymmetric key Shared between team leader and member node of the same group. lShared key Shared only by all group leaders in the network.
  • 20. Conclusion lSituations are unpredictable with the wireless networks, even with the infrastructural support. lPresent solutions to address these attacks are not strong enough. lKey management solutions may help, but not every time. lStill a lot of research has to be done.
  • 21. References lH Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, “Security in mobile ad hoc networks: Challenges and solutions” (2004). IEEE Wireless Communications. 11 (1), pp. 38-47. lYih-Chun Hu , Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, v.2 n.3, p.28-39, May 2004. lThe Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Frank Stajano, Ross Anderson. lAdam Burg, “Ad hoc network specific attacks”, Seminar on Ad hoc networking: concepts, applications, and security, Technische Universitat Munchen, 2003. lCharles E. Perkins (Hrsg.). Ad Hoc Networking, Addison-Wesley 2000.