Injectionofattacksinmanets

228 views

Published on

Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
228
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Injectionofattacksinmanets

  1. 1. Presented by: Venkatesh Devam 1CR10CS112 Under the guidance of: Ms. Savitha S Assistant Professor CSE
  2. 2.  Introduction  Security Goals  Security Attacks  Types of Attacks o Network Layer attacks o Transport layer attack o Application layer attack o Multi layer attack  Conclusion  References 2 Department of CSE
  3. 3.  A mobile adhoc network is a dynamic self configuring wireless network of mobile nodes.  Communication without the fixed infrastructure.  Critical issue is to develop a system to maintain a reliable routing table 3Department of CSE
  4. 4. 4Department of CSE
  5. 5.  MANETs are vulnerable to attacks because of following reasons:  Open Medium  Dynamically changing network topology  Different kinds of attacks have been analyzed in MANETs and their effects on the network. 5Department of CSE
  6. 6.  Classification based on the source of attacks: • Internal attacks • External attacks  Some attacks are classified depending on the layer of occurrence: • Network Layer Attack • Transport Layer Attack • Application Layer Attack • Multi Layer Attack 6Department of CSE
  7. 7.  Black Hole Attack : • An attacker may create a routing black hole in which all packets are dropped. • The attacker could route all packets for some destination to itself and then discard them. 7Department of CSE
  8. 8.  Disadvantages of Black Hole Attack :  Decreases throughput  May lead to sleep deprivation attack  Decreases network load 8Department of CSE
  9. 9.  Worm Hole Attack: • Two colluding attackers establish a wormhole link. • One of the attackers captures packets,send them via wormhole link to second attacker. 9Department of CSE
  10. 10.  Worm Hole Attack: 10Department of CSE
  11. 11.  Byzantine Attack: • A compromised intermediate node works in collision and carries out attacks. • Attacks lead to disruption or degradation of the routing services. 11Department of CSE
  12. 12.  Session Hijacking: • The goal is to steal the identity of a victim node and to achieve session with a target node. • At first the attacker spoofs the IP address of target machine and determines the correct sequence number. • After that attacker performs DOS attack on the victim. • The attacker now continues the session with the other system as a legitimate system. 12Department of CSE
  13. 13.  Repudiation:  Refers to the denial by node involved in a communication in having participated in communication.  In the network layer, firewalls can be installed to keep packets in or out. In transport layer, connections can be encrypted, end-to-end.  But these solutions do not solve non-repudiation problems 13Department of CSE
  14. 14.  Denial of Service: ▪ Attacker attempts to prevent legitimate users from the services offered by the network. ▪ A routing table overflow attack and sleep deprivation are two types of DoS attacks. 14Department of CSE
  15. 15.  Impersonation or spoofing attack: ▪ Attacker aims to terminate routing operations between two non-neighbour nodes. 15Department of CSE
  16. 16.  Sleep deprivation attack: ▪ The idea is to request the services a certain node offers, over and over again, so it can not go into an idle. ▪ This can be devastating to networks with nodes that have limited resources. 16Department of CSE
  17. 17.  Different security threats faced in an mobile ad hoc network have been analyzed.  The detection and evasion of black hole and worm hole is still considered as future challenging task.  Disregarding the weaknesses, MANETs have wide range of applications. 17Department of CSE
  18. 18.  Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Abbas Jamalipour. A Survey of Routing Attacks in Mobile Ad Hoc Networks, IEEE Wireless Communication, 14 (5), pp. 85-91,2007  K. Biswas and Md. Liaqat Ali, Security threats in Mobile Ad- Hoc Network, Master Thesis, Blekinge Institute of Technology Sweden, 22nd March 2007.  Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad Hoc Networks, Mobicom 2000 18Department of CSE
  19. 19. Department of CSE 19

×