SlideShare a Scribd company logo
1 of 31
Security Issues And
      Attacks in
Mobile Ad hoc Network
1. Objective
2. Motivation
3. Introduction To MANET
4. Flooding attack and its types
5. DSR Routing protocol
6. Literature survey
7. Proposed Technique
8. About Simulator (NS-2)
9. Results and analysis
10. Conclusion
11. Future Work
The general objectives can be outlined as follows:
 Get a general understanding of Mobile Ad Hoc Networks.

 Literature survey of various intrusion detection systems for
  MANET.
 Analysis of effect of node Mobility Speed and Pause time.

 Analysis of RREQ flooding Attack in MANET.

 Simulation and Analysis of our flooding attack prevention
  algorithm for the networks with higher node mobility.
Mobile ad hoc networks
are the autonomous
collection      devices
connected in a peer-to-
peer and multi-hop
fashion without the use
of central base stations
or access points.
 Each node have communication capabilities.
 Nodes can communicate directly with each other if they falls in
   the radio coverage range of each other otherwise use the
   concept of multi hop.
 Each node behaves like station and Router.
 All the nodes participate in the routing and the performance
   depend upon the cooperation between the nodes.
 MANET are useful where infrastructure is absent or installation
   is not possible.
C
        F


            B
A


    E               D
Characteristics of MANET
  Operating without any central coordinator/base station.

  Dynamic topology.

  Energy-constrained operation

  Longer transmission range due to multi-hop relay.

  Self-configuring.

  Constraint Bandwidth.

  Distributed Operation
Security Goals
   Availability
   Confidentiality
   Integrity
   Authentication
   Non-repudiation
   Access Control
The following are the advantages of MANETs:
 Rapid deployable.
 Self Configurable.
 Mobility.
 Does not requires any infrastructure to work.
 Cost Effective.
 Less time consuming.
 More robust than cellular system.
 Dynamic changing topology
 Limited Bandwidth.
 Limited battery power.
 Security issues.
Security problems in MANET

 Open Media
 Routing Protocol Does not have any security mechanism
 Continuous changing topology.
 Unavailability of central coordinator
 Requires cooperation between the devices
Attacks in MANET can be classified as
    Passive Attack
    Active Attacks.
 Attacker snoops the data exchanged in the network without
  altering it.
 This attack target the confidentiality attribute of the system.
 Passive attack is very difficult to detect because the operation of
  the network is not affected by this type attack.
 Passive attacks are generally used to gather the information
  about the network or know the communication pattern between
  the communicating parties. This attack is easy to launch and it
  may lead to active attack.
 Attacker attempts to modify or alter the data being exchanged in
  the network.
 It may disrupts the normal functioning of the network.
 In active attack the intruders can modify the packets, inject the
  packets, drops the packet, or it can use the various feature of
  the network to launch the attack.
 Active attacks are very dangerous.
ATTACKS IN MANET
                      (Classification-II)
Attacks in MANET can also be classified as
 External Attack: Carried out by nodes that do not
  belong to the domain of the network.
 Internal Attack: Internal attacks are from compromised
  nodes, which are actually part of the network.
•   A Black-hole is a malicious node that falsely replies for route
    requests without having an active route to the destination and
    exploits the Routing Protocol to advertise itself as having a shortest
    route to destination.
•   By advertizing the shortest route ,source station starts sending data
    through the black hole node and it become the active element in the
    route.
•   In this Attack, an attacker records packets at one location in the
    network and tunnels them to another location.
•   This tunnel between two colluding attackers is referred as a
    wormhole .
•   Routing can be disrupted when routing control messages are
    tunnelled.
•   when a wormhole attack is used against an on-demand routing
    protocol the attack could prevent the discovery of any routes other
    than through the wormhole.
Byzantine Attack
•   A compromised intermediate node works alone, or a set of
    compromised intermediate nodes works in collusion and carry out
    attacks.
•   These attacker node creates routing loops, forwarding packets
    through non-optimal paths or selectively dropping packets, which
    results in disruption or degradation of the routing services
Sleep Deprivation

 It is also called as resource consumption attack

 An attacker or a compromised node can attempt to consume battery
   life by requesting excessive route discovery, or by forwarding
   unnecessary packets to the victim node.
Location Disclosure

 An attacker reveals information regarding the location of nodes or
   the structure of the network. It gathers the node location information,
   such as a route map, and then plans further attack scenarios.
 Adversaries try to figure out the identities of communication parties

  and analyze traffic to learn the network traffic pattern the traffic
   pattern. The leakage of such information is devastating in security
   sensitive scenarios.
Eavesdropping
 The main goal of eavesdropping is to obtain some confidential
   information that should be kept secret during the communication.
 This confidential information may include the location, public key,
   private key or even passwords of the nodes.
Flooding Attack can be
launched by flooding the
network     with    fake
RREQs or data packets
leading      to      the
congestion     of    the
network and reduces the
probability   of    data
transmission     of  the
genuine nodes.
Depending upon the types of packet used to flood the
network, flooding attack is classified in two categories:

  RREQ FLOODING
  DATA FLOODING
 In the RREQ flooding attack, the attacker broadcast the many
   RREQ packets for the IP which does not exists in the network.
 To perform RREQ flooding ,Intruders disable the
   RREQ_ratelimit parameter.

Effects:
1.Consumes network bandwidth
2.consumes nodes battery power
3.Legitimated user can not able to use the network for valid
   communication.
In the data flooding, data packets are used to flood the network.
In this, first malicious node built a path to all the nodes then sends
the large amount of bogus data packets. These useless data
packet exhausts the network resources.

Effects:
1.Hard to detect
2. Can be detected by the application layer of the receiver.
3. Exhausts the network resources.
Security Attacks on protocol Stack
Security Mechanism
 Preventive Mechanism: Conventional authentication
  and encryption schemes are based on cryptography
   Cryptography
   Hash functions
   Digital signature
 Reactive Mechanism:An intrusion detection system
  is used as a second line of defence
   Anomaly based IDS
   Signature based IDS
 Due to the mobility and open media nature ,the mobile ad hoc
  networks are more prone to security threats compared to the wired
  network. Therefore security needs are higher in mobile ad hoc
  networks compared to the traditional networks
 There is a need of comprehensive security solution which can deal
  with attack the types of attacks
[1] Manel Guerrero Zapata & N. Asokan “Securing Ad Hoc Routing Protocols” Wise’02 September
     28,2002,Atlanta Georgia, USA inedxed in ACM 1-58113-585-8/02/009
[2] Nishu Garg, R.P.Mahapatra. “MANET Security Issues”. IJCSNS International Journal of Computer
     Science and Network Security, Volume.9, No.8, 2009.
[3]Mouhcine Guennoun and Khalil El-khatib “A scalable wireless intrusion detection system”,IJCSIS,
     Vol 1,No. 1, may 2009.
[4] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay “Different Types of Attacks
     on Integrated MANET-Internet Communication” International Journal of Computer Science
     and Security (IJCSS) Volume (4): Issue (3)
[5] Malcolm Parsons and Peter Ebinger “Performance Evaluation of the Impact of Attacks on Mobile
     Ad hoc Networks”.
[6] H Deng, W. Li, and D. Agrawal, Routing Security in Wireless Ad Hoc Networks.IEEE
     Communications Magazine. Vol. 40, No. 10, 2002
[7]Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l.
     Conf. on Mobile Computing and Networking, pp 275-283, 2000.
 [8]Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah “A Survey on MANET Intrusion Detection”
     International Journal of Computer Science and Security, Volume (2) : Issue (1)
[9] N.SHANTHI, 2DR.LGANESAN AND 3DR.K.RAMAR” STUDY OF DIFFERENT ATTACKS ON
     MULTICAST MOBILE AD HOC NETWORK” Journal of Theoretical and Applied Information
     Technology.
[10]Hassen Redwan and Ki-Hyung Kim s “Survey of Security Requirements, Attacks and Network
     Integration in Wireless Mesh Networks” 2008 Japan-China Joint Workshop on Frontier of
     Computer Science and Technology.
[11]Marianne A. Azer,Sherif M. El-Kassas,Magdy S. El-Soudani “Security in Ad Hoc Networks,From
     Vulnerability to Risk Management”2009 Third International Conference on Emerging Security
     Information, Systems and Technologies
[12] Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection
     Systems in
MANET and Comparing IDSs for Detecting Misbehaving Nodes” World Academy of Science,
     Engineering and
Technology, 44, 2008.
[13] Pradip M. Jawandhiya et. Al “A Survey of Mobile Ad Hoc Network Attacks” International
     Journal of Engineering Science and Technology Vol. 2(9), 2010, 4063-4071
[14] Adam Burg “ Ad hoc network specific attacks”Seminar Ad hoc networking: concepts,
     applications, and security Technische Universität München, 2003
[15] Pradeep rai and Shubha singh “A Review of ‘MANET’s Security Aspects and
     Challenges”IJCA Special Issue on “Mobile Ad-hoc Networks”MANETs, 2010 of Information
     Technology & Knowledge Management ,Jul – Dec 2010,Vol-II, No2 PP 305-310
Attacks in MANET

More Related Content

What's hot

Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor networkShiwangi Thakur
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayAKSHIT KOHLI
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 

What's hot (20)

Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 

Similar to Attacks in MANET

Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)IRJET Journal
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksIRJET Journal
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 

Similar to Attacks in MANET (20)

E0432933
E0432933E0432933
E0432933
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
D0961927
D0961927D0961927
D0961927
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
T04506110115
T04506110115T04506110115
T04506110115
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Dj4301653656
Dj4301653656Dj4301653656
Dj4301653656
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 

More from Sunita Sahu

Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Writing software requirement document
Writing software requirement documentWriting software requirement document
Writing software requirement documentSunita Sahu
 
Writing software requirement document
Writing software requirement documentWriting software requirement document
Writing software requirement documentSunita Sahu
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Slowly changing dimension
Slowly changing dimension Slowly changing dimension
Slowly changing dimension Sunita Sahu
 
Fact less fact Tables & Aggregate Tables
Fact less fact Tables & Aggregate Tables Fact less fact Tables & Aggregate Tables
Fact less fact Tables & Aggregate Tables Sunita Sahu
 
Dimensional Modeling
Dimensional ModelingDimensional Modeling
Dimensional ModelingSunita Sahu
 

More from Sunita Sahu (8)

Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Writing software requirement document
Writing software requirement documentWriting software requirement document
Writing software requirement document
 
Writing software requirement document
Writing software requirement documentWriting software requirement document
Writing software requirement document
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Slowly changing dimension
Slowly changing dimension Slowly changing dimension
Slowly changing dimension
 
Fact less fact Tables & Aggregate Tables
Fact less fact Tables & Aggregate Tables Fact less fact Tables & Aggregate Tables
Fact less fact Tables & Aggregate Tables
 
Dimensional Modeling
Dimensional ModelingDimensional Modeling
Dimensional Modeling
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Attacks in MANET

  • 1. Security Issues And Attacks in Mobile Ad hoc Network
  • 2. 1. Objective 2. Motivation 3. Introduction To MANET 4. Flooding attack and its types 5. DSR Routing protocol 6. Literature survey 7. Proposed Technique 8. About Simulator (NS-2) 9. Results and analysis 10. Conclusion 11. Future Work
  • 3. The general objectives can be outlined as follows:  Get a general understanding of Mobile Ad Hoc Networks.  Literature survey of various intrusion detection systems for MANET.  Analysis of effect of node Mobility Speed and Pause time.  Analysis of RREQ flooding Attack in MANET.  Simulation and Analysis of our flooding attack prevention algorithm for the networks with higher node mobility.
  • 4. Mobile ad hoc networks are the autonomous collection devices connected in a peer-to- peer and multi-hop fashion without the use of central base stations or access points.
  • 5.  Each node have communication capabilities.  Nodes can communicate directly with each other if they falls in the radio coverage range of each other otherwise use the concept of multi hop.  Each node behaves like station and Router.  All the nodes participate in the routing and the performance depend upon the cooperation between the nodes.  MANET are useful where infrastructure is absent or installation is not possible.
  • 6. C F B A E D
  • 7. Characteristics of MANET  Operating without any central coordinator/base station.  Dynamic topology.  Energy-constrained operation  Longer transmission range due to multi-hop relay.  Self-configuring.  Constraint Bandwidth.  Distributed Operation
  • 8. Security Goals  Availability  Confidentiality  Integrity  Authentication  Non-repudiation  Access Control
  • 9. The following are the advantages of MANETs:  Rapid deployable.  Self Configurable.  Mobility.  Does not requires any infrastructure to work.  Cost Effective.  Less time consuming.  More robust than cellular system.
  • 10.  Dynamic changing topology  Limited Bandwidth.  Limited battery power.  Security issues.
  • 11. Security problems in MANET  Open Media  Routing Protocol Does not have any security mechanism  Continuous changing topology.  Unavailability of central coordinator  Requires cooperation between the devices
  • 12. Attacks in MANET can be classified as  Passive Attack  Active Attacks.
  • 13.  Attacker snoops the data exchanged in the network without altering it.  This attack target the confidentiality attribute of the system.  Passive attack is very difficult to detect because the operation of the network is not affected by this type attack.  Passive attacks are generally used to gather the information about the network or know the communication pattern between the communicating parties. This attack is easy to launch and it may lead to active attack.
  • 14.  Attacker attempts to modify or alter the data being exchanged in the network.  It may disrupts the normal functioning of the network.  In active attack the intruders can modify the packets, inject the packets, drops the packet, or it can use the various feature of the network to launch the attack.  Active attacks are very dangerous.
  • 15. ATTACKS IN MANET (Classification-II) Attacks in MANET can also be classified as  External Attack: Carried out by nodes that do not belong to the domain of the network.  Internal Attack: Internal attacks are from compromised nodes, which are actually part of the network.
  • 16. A Black-hole is a malicious node that falsely replies for route requests without having an active route to the destination and exploits the Routing Protocol to advertise itself as having a shortest route to destination. • By advertizing the shortest route ,source station starts sending data through the black hole node and it become the active element in the route.
  • 17. In this Attack, an attacker records packets at one location in the network and tunnels them to another location. • This tunnel between two colluding attackers is referred as a wormhole . • Routing can be disrupted when routing control messages are tunnelled. • when a wormhole attack is used against an on-demand routing protocol the attack could prevent the discovery of any routes other than through the wormhole.
  • 18. Byzantine Attack • A compromised intermediate node works alone, or a set of compromised intermediate nodes works in collusion and carry out attacks. • These attacker node creates routing loops, forwarding packets through non-optimal paths or selectively dropping packets, which results in disruption or degradation of the routing services
  • 19. Sleep Deprivation  It is also called as resource consumption attack  An attacker or a compromised node can attempt to consume battery life by requesting excessive route discovery, or by forwarding unnecessary packets to the victim node.
  • 20. Location Disclosure  An attacker reveals information regarding the location of nodes or the structure of the network. It gathers the node location information, such as a route map, and then plans further attack scenarios.  Adversaries try to figure out the identities of communication parties and analyze traffic to learn the network traffic pattern the traffic pattern. The leakage of such information is devastating in security sensitive scenarios.
  • 21. Eavesdropping  The main goal of eavesdropping is to obtain some confidential information that should be kept secret during the communication.  This confidential information may include the location, public key, private key or even passwords of the nodes.
  • 22. Flooding Attack can be launched by flooding the network with fake RREQs or data packets leading to the congestion of the network and reduces the probability of data transmission of the genuine nodes.
  • 23. Depending upon the types of packet used to flood the network, flooding attack is classified in two categories:  RREQ FLOODING  DATA FLOODING
  • 24.  In the RREQ flooding attack, the attacker broadcast the many RREQ packets for the IP which does not exists in the network.  To perform RREQ flooding ,Intruders disable the RREQ_ratelimit parameter. Effects: 1.Consumes network bandwidth 2.consumes nodes battery power 3.Legitimated user can not able to use the network for valid communication.
  • 25. In the data flooding, data packets are used to flood the network. In this, first malicious node built a path to all the nodes then sends the large amount of bogus data packets. These useless data packet exhausts the network resources. Effects: 1.Hard to detect 2. Can be detected by the application layer of the receiver. 3. Exhausts the network resources.
  • 26. Security Attacks on protocol Stack
  • 27. Security Mechanism  Preventive Mechanism: Conventional authentication and encryption schemes are based on cryptography  Cryptography  Hash functions  Digital signature  Reactive Mechanism:An intrusion detection system is used as a second line of defence  Anomaly based IDS  Signature based IDS
  • 28.  Due to the mobility and open media nature ,the mobile ad hoc networks are more prone to security threats compared to the wired network. Therefore security needs are higher in mobile ad hoc networks compared to the traditional networks  There is a need of comprehensive security solution which can deal with attack the types of attacks
  • 29. [1] Manel Guerrero Zapata & N. Asokan “Securing Ad Hoc Routing Protocols” Wise’02 September 28,2002,Atlanta Georgia, USA inedxed in ACM 1-58113-585-8/02/009 [2] Nishu Garg, R.P.Mahapatra. “MANET Security Issues”. IJCSNS International Journal of Computer Science and Network Security, Volume.9, No.8, 2009. [3]Mouhcine Guennoun and Khalil El-khatib “A scalable wireless intrusion detection system”,IJCSIS, Vol 1,No. 1, may 2009. [4] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay “Different Types of Attacks on Integrated MANET-Internet Communication” International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) [5] Malcolm Parsons and Peter Ebinger “Performance Evaluation of the Impact of Attacks on Mobile Ad hoc Networks”. [6] H Deng, W. Li, and D. Agrawal, Routing Security in Wireless Ad Hoc Networks.IEEE Communications Magazine. Vol. 40, No. 10, 2002 [7]Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, pp 275-283, 2000. [8]Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah “A Survey on MANET Intrusion Detection” International Journal of Computer Science and Security, Volume (2) : Issue (1)
  • 30. [9] N.SHANTHI, 2DR.LGANESAN AND 3DR.K.RAMAR” STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK” Journal of Theoretical and Applied Information Technology. [10]Hassen Redwan and Ki-Hyung Kim s “Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks” 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology. [11]Marianne A. Azer,Sherif M. El-Kassas,Magdy S. El-Soudani “Security in Ad Hoc Networks,From Vulnerability to Risk Management”2009 Third International Conference on Emerging Security Information, Systems and Technologies [12] Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi “Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology, 44, 2008. [13] Pradip M. Jawandhiya et. Al “A Survey of Mobile Ad Hoc Network Attacks” International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4063-4071 [14] Adam Burg “ Ad hoc network specific attacks”Seminar Ad hoc networking: concepts, applications, and security Technische Universität München, 2003 [15] Pradeep rai and Shubha singh “A Review of ‘MANET’s Security Aspects and Challenges”IJCA Special Issue on “Mobile Ad-hoc Networks”MANETs, 2010 of Information Technology & Knowledge Management ,Jul – Dec 2010,Vol-II, No2 PP 305-310