240 likes | 560 Views
Prevention Against Rushing attack in MANETs. Presented By : Shaveta Jain Department of Computer Science & Engineering, Maharishi Markandeshwar University, Mullana shavetajn120@gmail.com. Outline. Introduction of MANET Routing Protocols Routing Attacks Rushing Attack
E N D
Prevention Against Rushing attack in MANETs Presented By : Shaveta Jain Department of Computer Science & Engineering, Maharishi Markandeshwar University, Mullana shavetajn120@gmail.com
Outline • Introduction of MANET • Routing Protocols • Routing Attacks • Rushing Attack • Prevention Techniques • Conclusion • References
Introduction • Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. • No centralized controller and infrastructure. • Allows free mobility • Node acts as host and router to assist in transmitting data to other nodes in its range. • Can be quickly and inexpensively setup • Applications: military, emergency and disaster situations.
Routing Protocols • Proactive routing protocol • Table-Driven routing protocol • Reactive routing protocol • Source-Initiated On-Demand routing protocol • Forward ROUTE REQUEST packets when needed
Routing attacks Classification: • External attack vs. Internal attack • Passive attack vs. Active attack
Routing attacks • Attacks for routing: • Modification • Fabrication • Wormhole attack (tunneling) • Denial of service attack • Invisible node attack • The Sybil attack • Rushing attack • Non-cooperation
Rushing attack • Directed against on-demand routing protocols • The attacker hurries route request packet to the next node to increase the probability of being included in a route
Impact of Rushing attack at different position of attacker There are three different scenarios based on the position of attacker: • Rushing attacker can be at near sender • Rushing attacker can be at near destination • Rushing attacker can be at anywhere in the network
Rushing attack Prevention techniques • Secure neighbor detection (SND) • Secure route discovery procedure (SRDP) • Randomized Route Request Forwarding (RRRF) • The concept of threshold
1. Secure Neighbor Detection • Neighbor Detection • Two nodes detect a bidirectional link between themselves • In Proactive routing protocol • In Reactive routing protocol • Requirements • Sender-receiver can check that the other is within the normal communication range • Node needs to hear Neighbor Request
Cont… • Three-round mutual authentication protocol • S broadcasts a Neighbor Request packet • R return a Neighbor Reply packet to S • S sends a Neighbor Verification to B • Short delay timing • Within a maximum communication range sender receiver neighbor Request broadcast neighbor reply neighbor verfication
2. Secure Route Discovery • To secure any protocol using an on-demand Route Discovery protocol • Secure Neighbor Detection • Secure route delegation • Randomized ROUTE REQUEST forwarding • To limit the number of REQUESTs that traverse an attacker • The nodes that don’t have n distinct path to the source of the REQUEST • Choose a random timeout • Two addition security optimizations • Each REQUEST signed • Use location information
3. Randomized Message Forwarding • To minimize the chance that a rushing adversary can dominate all returned routes • Randomized message forwarding • Collects a number of REQUESTs • Selects a REQUEST at random to forward • The number of REQUEST packets collected • The more the better? • The algorithm by which timeouts are chosen • Topology closer • Geographically closer • Randomly
4. The concept of threshold The threshold value is used to reduce the rushing attack. In this a fixed value is used for transmission. Under this the packets will reach to the neighbor node at fixed time interval. If an attacker is present then the forwarded packet will reached before the time, in this way the neighbor node can easily identify the attacker node.
Cont…. Besides these techniques there are special type of packets which is used to protect the network from rushing attack- • Route Check (RCHK) – This type of packet is used for measuring the round trip time (RTT) of the current path. • Route Verify (RVER) – This is used to verify that the measured RRT is proper used or not. • Route Failure (RFAI) – This packet notify the source node that a node has failure
Conclusion We have analyzed the different prevention techniques from rushing attack. This attack is mainly against the on-demand routing protocols. In this the request packets which come after first are discarded. We have seen the impact of rushing attack at the different position of attacker node. The formation of rushing attack is also described. The various techniques have studied to prevent the rushing attack and they can reduce the chance of attack.
References [1]Gagandeep,Aashima and Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review” in International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012 [2]Satyam Shrivastava, “Rushing Attack and its Prevention Techniques”, in International Journal of Application or Innovation in Engineering and Management, Volume 2, Issue 4, April 2013 [3]Chinkit Suthar and Bakul Panchal, “A Survey on Rushing Attack and Its Prevention in Mobile Ad-hoc Network”, in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014
Cont…. [4]Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks”. [5] V. PALANISAMY and P.ANNADURAI, “Impact of Rushing attack on Multicast in Mobile Ad Hoc Network”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009. [6]Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols”, September 2003 [7]Gajendra Singh Chandel and Rajul Chowksi, “Effect of Rushing Attack in AODV and its Prevention Technique”, in International Journal of Computer Applications, Volume 83 – No.16, December 2013
Thank you for your patience. Any questions / comments ?