SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Seminar 2015
SSM college of Engineering and Technology
Basharat Sultan
Enroll : 3167
Computer Science & Engineering
 “The quieter you become, the more you are
able to hear.”
WHAT IS A MANET ?
 Mobile Adhoc Network is a group of wireless mobile computers in which
nodes cooperate by forwarding packets for each other to allow them to
communicate beyond direct wireless transmission range
 MANETS are more vulnerable to attacks than wired networks
 Security is a process that is as secure as its weakest link. So, in order to
make MANETs secure, all its weak points are to be identified and solutions
to make all those weak points safe, are to be considered.
 So Security issues in MANETs will remain a potential research area in near
future.
The characteristics of these networks are summarized
as follows:
 Communication via wireless means.
 Nodes can perform the roles of both hosts and
routers.
 No centralized controller and infrastructure.
 Intrinsic mutual trust.
 Dynamic network topology.
 Frequent routing updates.
The following are the advantages of MANETs:
 They provide access to information and services regardless of geographic
position.
 These networks can be set up at any place and time.
Some of the applications of MANETs are :
 Military or police exercises.
 Disaster relief operations.
 Mine cite operations.
 Urgent Business meetings.
Some of the disadvantages of MANETs are:
 Limited resources.
 Limited physical security.
 Intrinsic mutual trust vulnerable to attacks.
 Lack of authorization facilities.
 Volatile network topology makes it hard to detect malicious nodes.
 Security protocols for wired networks cannot work for ad hoc networks.
MANETs are much more vulnerable to attack than wired network. This is
because of the following reasons :
 Open Medium - Eavesdropping is more easier than in wired network.
 Dynamically Changing Network Topology – Mobile Nodes comes and
goes from the network , thereby allowing any malicious node to join the
network without being detected.
 Cooperative Algorithms - The routing algorithm of MANETs requires
mutual trust between nodes which violates the principles of Network
Security.
 Lack of Centralized Monitoring - Absence of any centralized infrastructure
prohibits any monitoring agent in the system.
 Lack of Clear Line of Defense –
The possible security attacks in MANETs can be divided into two
categories:
 Passive attack
In this type of attack, the intruder only performs some kind of monitoring
on certain connections to get information about the traffic without injecting
any fake information
 Active attack
In this type of attack, the intruder performs an effective violation on either
the Network resources or the data transmitted
 Eavesdroping
 Traffic Analysis
 Snooping
 Eavesdropping:
This is a passive attack. The node simply observes the confidential
information.
 Traffic Analysis
In MANETs the data packets as well as traffic pattern both are important for
adversaries.
Traffic analysis can also be conducted as active attack by destroying nodes
 Snooping:
Snooping is unauthorized access to another person's data.
 Denial Of Service
 Impersonation
 Packet Modification
 Flooding
 Worm Hole
 Selfish node
 Gray Hole
 Routing Table Run-off
 Information Revelation
 Black Hole
 This type of attack when launched against MANET
inserts malicious packets into the network which
disrupts the service which was targeted, causing non-
availability of resources to legitimate users.
 In this type of attack a node impersonates as another
node in order to send fake routing information, so that
the other node knows that the information came from a
normal node
 This type of an attack involves packet content
modification performed by an intermediate node
 In this type of attack nodes in MANET does not
participate in communication, so that they can save
their resources
 This type of an attack can lead to packet loss
 A malicious node can send route request for an
unknown node, which does not exist in the network.
The node receiving these packets will store this
information in their routing table. But due to their
memory limitation, the routing table will run out of
space
 In this type of attack the attacker is present within the
network and due to broadcasting problem he also gets
this information which he can easily encapsulate and
can seek vital information
 Reliable Infrastructure Layer
 Securing Communication layer
 Routing Layer Security
 Network Layer Security
 Application Layer Security
 SVM Based Method
 The functions that this layer provides can be used by the
other layers.
 So the requirement of distributed security mechanism is the
need of the hour which can play a vital role in authentication
before any communication takes place, which can establish
secure communication between the nodes.
 securing this layer will provide the key for securing the whole
system
 Wireless channel can be protected by the use of security
protocol like WPA2 (Wi-Fi Protected Access version 2)
that works on the data link Layer
 In MANET each node acts as router to route the data
which it receives to its destination.
 The whole communication depends on the every node
in the network and if the routing tables are being
tampered it can collapse the whole network
communication.
 In order to secure routing in MANET a two phase
security must be applied; ‘routing information security’
and ‘secure data forwarding’
 IPSec is one the security protocol of the network layer
that can help obtain authentication of a node in order to
maintain confidentiality and reliability for secure data
transmission.
 Another protocol, Secure Message Transfer (SMT) helps
to build security relationship with the communicating
node
 This layer solves the problem which routing protocols
cannot
 This layer should provide end-to-end security
 Protocols like Secure Electronic Transaction (SET),
Secure Shell (SSH), Secure Socket Layer (SSL) etc. are
some that work on application layer
 SSL is mostly used in web transmissions, SSH is a
replacement of Telnet and FTP, SET is used by end
systems to perform secure transaction.
 The method Support Vector Machine (SVM) is based on
trust scheme
 This method monitors various metrics like PMISR, PMOR
and PDR in order to establish trust between the
communicating nodes.
 This method is a solution to detect various malicious
attacks in MANET. In order to evaluate the performance
the following metrics are used by SVM:
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architectureJAIGANESH SEKAR
 

Was ist angesagt? (20)

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Dsdv
DsdvDsdv
Dsdv
 
Transport layer
Transport layer Transport layer
Transport layer
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architecture
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 

Andere mochten auch

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalVIKASH MAINANWAL
 
Aula - Manet - Com Legendas!
Aula - Manet - Com Legendas!Aula - Manet - Com Legendas!
Aula - Manet - Com Legendas!Arquivos-arte
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection Systemijsrd.com
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
Literature review report
Literature review reportLiterature review report
Literature review reportBirju Tank
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 

Andere mochten auch (20)

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
MANET
MANETMANET
MANET
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Manet
ManetManet
Manet
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash Maianwal
 
Aula - Manet - Com Legendas!
Aula - Manet - Com Legendas!Aula - Manet - Com Legendas!
Aula - Manet - Com Legendas!
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection System
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
Literature review report
Literature review reportLiterature review report
Literature review report
 
MANET
MANETMANET
MANET
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Manet
ManetManet
Manet
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 

Ähnlich wie Security issues in manet

Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
Iss 2
Iss 2Iss 2
Iss 2ijgca
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Survey of manet misbehaviour detection approaches
Survey of manet misbehaviour detection approachesSurvey of manet misbehaviour detection approaches
Survey of manet misbehaviour detection approachesIJNSA Journal
 
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESSURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESIJNSA Journal
 
V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc NetworkCourtney Esco
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetijctet
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Ähnlich wie Security issues in manet (20)

Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Iss 2
Iss 2Iss 2
Iss 2
 
Iss3
Iss3Iss3
Iss3
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Survey of manet misbehaviour detection approaches
Survey of manet misbehaviour detection approachesSurvey of manet misbehaviour detection approaches
Survey of manet misbehaviour detection approaches
 
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESSURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
 
ant2
ant2ant2
ant2
 
V3 i301
V3 i301V3 i301
V3 i301
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc Network
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Kürzlich hochgeladen

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Kürzlich hochgeladen (20)

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Security issues in manet

  • 1. Seminar 2015 SSM college of Engineering and Technology Basharat Sultan Enroll : 3167 Computer Science & Engineering
  • 2.  “The quieter you become, the more you are able to hear.”
  • 3. WHAT IS A MANET ?
  • 4.  Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range  MANETS are more vulnerable to attacks than wired networks  Security is a process that is as secure as its weakest link. So, in order to make MANETs secure, all its weak points are to be identified and solutions to make all those weak points safe, are to be considered.  So Security issues in MANETs will remain a potential research area in near future.
  • 5.
  • 6. The characteristics of these networks are summarized as follows:  Communication via wireless means.  Nodes can perform the roles of both hosts and routers.  No centralized controller and infrastructure.  Intrinsic mutual trust.  Dynamic network topology.  Frequent routing updates.
  • 7. The following are the advantages of MANETs:  They provide access to information and services regardless of geographic position.  These networks can be set up at any place and time. Some of the applications of MANETs are :  Military or police exercises.  Disaster relief operations.  Mine cite operations.  Urgent Business meetings.
  • 8. Some of the disadvantages of MANETs are:  Limited resources.  Limited physical security.  Intrinsic mutual trust vulnerable to attacks.  Lack of authorization facilities.  Volatile network topology makes it hard to detect malicious nodes.  Security protocols for wired networks cannot work for ad hoc networks.
  • 9. MANETs are much more vulnerable to attack than wired network. This is because of the following reasons :  Open Medium - Eavesdropping is more easier than in wired network.  Dynamically Changing Network Topology – Mobile Nodes comes and goes from the network , thereby allowing any malicious node to join the network without being detected.  Cooperative Algorithms - The routing algorithm of MANETs requires mutual trust between nodes which violates the principles of Network Security.  Lack of Centralized Monitoring - Absence of any centralized infrastructure prohibits any monitoring agent in the system.  Lack of Clear Line of Defense –
  • 10. The possible security attacks in MANETs can be divided into two categories:  Passive attack In this type of attack, the intruder only performs some kind of monitoring on certain connections to get information about the traffic without injecting any fake information  Active attack In this type of attack, the intruder performs an effective violation on either the Network resources or the data transmitted
  • 11.  Eavesdroping  Traffic Analysis  Snooping
  • 12.  Eavesdropping: This is a passive attack. The node simply observes the confidential information.  Traffic Analysis In MANETs the data packets as well as traffic pattern both are important for adversaries. Traffic analysis can also be conducted as active attack by destroying nodes  Snooping: Snooping is unauthorized access to another person's data.
  • 13.  Denial Of Service  Impersonation  Packet Modification  Flooding  Worm Hole  Selfish node  Gray Hole  Routing Table Run-off  Information Revelation  Black Hole
  • 14.  This type of attack when launched against MANET inserts malicious packets into the network which disrupts the service which was targeted, causing non- availability of resources to legitimate users.
  • 15.  In this type of attack a node impersonates as another node in order to send fake routing information, so that the other node knows that the information came from a normal node
  • 16.  This type of an attack involves packet content modification performed by an intermediate node
  • 17.
  • 18.
  • 19.
  • 20.  In this type of attack nodes in MANET does not participate in communication, so that they can save their resources
  • 21.  This type of an attack can lead to packet loss
  • 22.  A malicious node can send route request for an unknown node, which does not exist in the network. The node receiving these packets will store this information in their routing table. But due to their memory limitation, the routing table will run out of space
  • 23.  In this type of attack the attacker is present within the network and due to broadcasting problem he also gets this information which he can easily encapsulate and can seek vital information
  • 24.  Reliable Infrastructure Layer  Securing Communication layer  Routing Layer Security  Network Layer Security  Application Layer Security  SVM Based Method
  • 25.  The functions that this layer provides can be used by the other layers.  So the requirement of distributed security mechanism is the need of the hour which can play a vital role in authentication before any communication takes place, which can establish secure communication between the nodes.  securing this layer will provide the key for securing the whole system
  • 26.  Wireless channel can be protected by the use of security protocol like WPA2 (Wi-Fi Protected Access version 2) that works on the data link Layer
  • 27.  In MANET each node acts as router to route the data which it receives to its destination.  The whole communication depends on the every node in the network and if the routing tables are being tampered it can collapse the whole network communication.  In order to secure routing in MANET a two phase security must be applied; ‘routing information security’ and ‘secure data forwarding’
  • 28.  IPSec is one the security protocol of the network layer that can help obtain authentication of a node in order to maintain confidentiality and reliability for secure data transmission.  Another protocol, Secure Message Transfer (SMT) helps to build security relationship with the communicating node  This layer solves the problem which routing protocols cannot
  • 29.  This layer should provide end-to-end security  Protocols like Secure Electronic Transaction (SET), Secure Shell (SSH), Secure Socket Layer (SSL) etc. are some that work on application layer  SSL is mostly used in web transmissions, SSH is a replacement of Telnet and FTP, SET is used by end systems to perform secure transaction.
  • 30.  The method Support Vector Machine (SVM) is based on trust scheme  This method monitors various metrics like PMISR, PMOR and PDR in order to establish trust between the communicating nodes.  This method is a solution to detect various malicious attacks in MANET. In order to evaluate the performance the following metrics are used by SVM:
  • 31.
  • 32.
  • 33.