1 / 19

A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks

A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks. 2 nd International Conference and Exhibition on NEXT GENERATIONS MOBILE APPLICATIONS SERVICES AND TECHNOLOGIES (NGMAST 2008) Workshop on Mobile and Wireless Security (WMS’08) Abdelaziz Babakhouya

vicky
Télécharger la présentation

A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2nd International Conference and Exhibition on NEXT GENERATIONS MOBILE APPLICATIONS SERVICES AND TECHNOLOGIES (NGMAST 2008) Workshop on Mobile and Wireless Security (WMS’08) Abdelaziz Babakhouya CERIST Center of Research, Algiers, Algeria. University of Béjaia, Algeria. Y. Challal and A. Bouabdallah (UTC, Heudiasyc lab., France)

  2. Outline • Mobile Ad hoc Network (MANET) • Dynamic Source Routing protocol (DSR) • Nodes misbehaviour • Simulation Results (NS-2) • Countermeasures • Conclusion

  3. Mobile Ad hoc NETwork (MANET) • Definition • MANET is a collection of wireless mobile nodes which may form a temporary network, without the use of any fixed infrastructure or centralized administration • Features • Multi-hop communication • Dynamic topology • Constrained resources • No physical security • Applications • Military and Rescue operations • Civilian application

  4. Routing in MANET • Network layer • Routing: Route discovery and route maintenance • Data forwarding S A B D Source node Intermediate nodes Destination node Problem: • In a malicious environment, misbehaving nodes may not cooperate. • How can they misbehave? • What is the effect of nodes misbehaviour on network performance ?

  5. Route discovery in DSR Route Request (RREQ) 1-2 1-2-5 D 5 8 1 2 1-3-4 S 1 1-3-4-7 1-3-4 4 7 1 1-3 3 1-3-4 1-3-4-6 6

  6. Route discovery in DSR Route Reply (RREP) 1-2-5-8 1-2-5-8 D 1-2-5-8 5 8 2 S 1 4 7 3 6

  7. Packet forwarding in DSR D 5 8 2 S 1 4 7 3 6

  8. M Nodes misbehaviour • Cooperative node: cooperate in both route discovery and packet forwarding functions. • Selfish node : try to save their own resources (energy and bandwidth). • Selfish node type 1: Disable packet forwarding function. • Selfish node type 2: Disable routing function. • Malicious node: Try to sabotage other nodes, example of Black hole attack • Other parameters: • Time: start/stop time of the behaviour • Target: source/destination of the behaviour • Degree P: [0,1] the probability of the behaviour G S1 S2

  9. Simulation • Objectives: • What is the effect of selfish behaviour when varying the % of misbehaving nodes? • What is the effect of one malicious node when varying nodes mobility and traffic load? • Comparison between malicious behaviour and selfish behaviour, according to the packet dropping attack strength. • Performances metrics • Packet Delivery Fraction (PDF) : CBR packets received / CBR packets sent • Average End to End Delay (EED): the delay between the sending of CBR packet by the source and its receipt by the destination.

  10. Simulation in NS2 • Fixed parameters • Mobility: random waypoint • Pause time = 10s, max speed = 5m/s. • CBR: 20 connections, • Packets size = 512 bits; packet rate = 2 packet/s • Simulation time : 500 s • Target of attack : all nodes • Time of attack = simulation time = 500 s • Variables parameters • Density number of nodes in an area of 1000m x 1000m • Low density = 30 nodes • High density = 60 nodes • Probability of packets dropping • P:[1.0, 0.5, 0.1]

  11. What is the effect on PDF when varying % of misbehaving nodes? We consider two scenarios: Low density = 30 nodes, and high density = 60 nodes Probability of packets dropping: [ 1.0, 0.5, 0.1] Selfish type 1 S A B D RREQ packets from S to D RREP packets from D to S CBR packets from S to D

  12. Simulation results of selfish type 1 • Degradation of PDF when the % of misbehaving nodes increases. • Node density has a negligible influence on the PDF • Reduction of the attack strength when Pi decreases.

  13. Misbehaving nodes do not drop data packet What is the effect on Average EED ? Low and high node density scenarios Selfish type 2 S A B D RREQ packets from S to D RREP packets from D to S CBR packets from S to D

  14. Simulation results of selfish type 2 • Negligible influence on the PDF  there exists alternative routes • Degradation of EED when the percentage of misbehaving nodes increases, especially in low density (30 nodes).

  15. What is the impact on PDF, by varying mobility and number of CBR connections? M Malicious node (black hole attack) Correct route C S A B D Forged route Forged RREP packets <S,A,M,D>

  16. Simulation results of Malicious behaviour • PDF falls to 55% when only one malicious node performs the black hole attack. • Nodes Mobility and CBR connection don’t affect the metric PDF.

  17. Countermeasures • Secure routing • S-AODV, SRP, ARAN, Adriane. • Achieve authenticationintegrity and non repudiation of the discovered route  Prevent malicious nodes from being included in the discovered route. • Limitations: • Do not prevent from with selfish nodes. • Need of a Public Key Infrastructure (PKI) • New security follows. • Detection and isolation of misbehaving nodes • Watch-dog, CORE, CONFIDANT, OCEAN, SORI. • Neighbours monitoring, node’s reputations and exchange of Alarms and recommendations. •  False detection,  need of nodes authentication

  18. Conclusion • Misbehaving node is one of the major security issues of MANET • To retain from simulation results : • RREQ dropping do not affects the PDF. However, it can really affect the average EED and lead to congestion in a low density network. • One malicious node carrying a black hole attack can have the same effect as 20% to 30% of selfish nodes type 1. • Both of data and routing packets need to be secured from selfish and malicious nodes.

  19. Thanks

More Related