Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
NETWORK(MANET)
SECURITY
VAMSI KRISHNA KANURI
NAGA SWETHA DASARI
RESHMA ARAVAPALLI
MANET
A Mobile Ad-hoc
network is a wireless
ad-hoc network which
is used to exchange
information.
Each node is willing
to forward data to
other nodes.
Does not rely on fixed
infrastructure.
FEATURES
Routing
Security and Reliability
Quality of Service
Internetworking
Power Consumption
SECURITY
A major issue in Mobile ad-hoc network is
SECURITY.
Two approaches in protecting mobile ad-
hoc networks
Secure Multicasting
Secure routing
Privacy-aware Routing
Key management
Intrusion detection System
Contd..
Secure multicasting: Is a communication
method where a single data packet can be
transmitted from a sender and replicated
to a set of receivers.
Secure routing: Most MANET routing
protocols are vulnerable to attacks that
can freeze the whole network. Need some
solutions that work even if some nodes
compromised.
Contd..
Privacy-aware Routing: Building routing
protocols that prevent intermediate nodes
from performing traffic analysis.
Schemes for minimizing size of crypto-
tags( digital signatures) are needed.
Key Management
security goals in MANET are mainly achieved
through trusted Certificate Authority (CA)
compromised CA can easily damage the
entire network.
Contd..
Intrusion detection and response
schemes: Anomaly detection is difficult in
MANETs (ex: types of attacks and their
source). collaborative IDS schemes are
needed.
GOALS
Authentication
Confidentiality
Integrity
Non-repudiation
Availability
Detection and Isolation
Authentication: A node must know the identity
of the peer node it is communicating with.
Without authentication, an attacker could gain
sensitive information and interfere with other
nodes
Confidentiality: Ensures certain information is
never disclosed to unauthorized entities.
Integrity: Message being transmitted is never
corrupted.
Contd..
http://repositories.cdlib.org/cgi/viewcontent.cgi?articl
e=2292&context=postprints
http://csrc.nist.gov/groups/SNS/manet/documents/Cr
itical-Nodes-MANET.pdf
QUESTIONS?
1. What is fabrication attack and what is the
mechanism to detect whether fabrication
attack occurred or not during
transmission between the nodes?
An attack that generates false routing
messages is called fabrication attack.
Watch-dogs are used to detect the
fabrication attack.
2. Two types of attacks, active attack and passive attacks
are discussed in the paper for ad hoc routing protocol
and also mentioned about recent research on
wormhole attack. What kind of attack is this?