Propagating Trust in Ad-hoc Networks for Reliable Routing

Similar documents
Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Secure Ad-Hoc Routing Protocols

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

More Efficient Routing Algorithm for Ad Hoc Network

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

Survey of MANET based on Routing Protocols

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Papers. Ad Hoc Routing. Outline. Motivation

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Scalable Routing Protocols for Mobile Ad Hoc Networks

Ad Hoc Networks - Routing and Security Issues

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

Resource Optimization in Video Transmission Using Manet for Defence

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Evaluation of MANET Using Quality of Service Metrics

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

Ad-Hoc Networks and New GPS Measurement Techniques for Robotic Follower Applications

Wireless Internet Routing. IEEE s

Wireless Mesh Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Safeguarding Wireless Service Access

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

NAVAL POSTGRADUATE SCHOOL THESIS

Performance Evaluation of AODV, DSR, OLSR Routing Protocol in Ad hoc Networks

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p

Introduction to Mesh

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

Repelling Sybil-type attacks in wireless ad hoc systems

A Consolidated Analysis of MANET Routing Protocols

Link-state protocols and Open Shortest Path First (OSPF)

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

ADHOC NETWORKS. By M.K.HAK

AODV and GPSR in a realistic VANET context. Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN

Modeling of data networks by example: NS-2 (III) Wireless Networks

Performance Evaluation of DSDV, OLSR and DYMO using and p MAC-Protocols

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

Principles of Ad Hoc Networking

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Chapter 10 Mobile Communication Systems

Comparative study of AODV, DSR, DSDV Routing Protocol Using Network Simulator-2

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

RECENT era has seen the plenty of mobile networks

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Isolation Mechanism for Jamming Attack in MANET

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Secure Location Verification with Hidden and Mobile Base Stations

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

ROBUSTNESS OF SIMPLIFIED SIMULATION MODELS FOR INDOOR MANET EVALUATION. Andrés Lagar Cavilla

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

Modeling the Impact of Protocols on Traffic Burstiness At Large Timescales in Wireless Multi-Hop Networks

Mesh-based Dynamic Location Service in WSANs by a Team of Robots

A REVIEW OF AD-HOC NETWORK

Babel A flexible routing protocol

Experimental evaluation of IEEE s path selection protocols in a mesh testbed

Class 29: This Week in CS150. Who Invented the Internet? Who Invented Networking? Beacon Chain Networking. What is a Network?

CS601 Data Communication Solved Objective For Midterm Exam Preparation

De Morgan s second theorem: The complement of a product is equal to the sum of the complements.

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.

Transcription:

Propagating Trust in Ad-hoc Networks for Reliable Routing Asad Amir Pirzada, Amitava Datta and Chris McDonald School of Computer Science & Software Engineering The University of Western Australia

Sequence of Presentation Routing Protocols Vulnerabilities Security Models Trust & Security Issues Proposed Trust Model Extension to DSR Analysis Conclusion

Routing Protocols Reactive Dynamic Source Routing (DSR Ad-hoc On-Demand Distance Vector (AODV Temporally Ordered Routing Algorithm (TORA Proactive Optimized Link State Routing Protocol (OLSR Destination-Sequenced Distance Vector (DSDV

Vulnerabilities in Routing Protocols Lack of Trust Infrastructure Implicit Trust-your-Neighbour Relationships Presence of malicious and compromised nodes Route buildup by intermediate nodes

Secure Routing Protocols Authenticated Routing for Ad-hoc Networks (ARAN : 2002 ARIADNE : 2002 Secure Ad-hoc On-Demand Distance Vector (SAODV : 2001 Security-Aware Ad-hoc Routing (SAR : 2001 Secure Efficient Distance Vector (SEAD : 2002 Secure Link State Routing Protocol (SLSP : 2002 Secure Routing Protocol (SRP : 2002

Comparison Performance Parameters ARAN ARIADNE SAODV SAR SEAD SLSP SRP Type Reactive Reactive Reactive Reactive Proactive Proactive Reactive Encryption Algorithm Asymmetric Symmetric Asymmetric Symmetric/ Asymmetric Symmetric Asymmetric Symmetric MANET Protocol AODV /DSR DSR AODV AODV DSDV ZHLS DSR/ZRP Synchronization No Yes No No Yes No No Central Trust Authority CA Required KDC Required CA Required CA/KDC Required CA Required CA/KDC Required CA Required Authentication Yes Yes Yes Yes Yes Yes Yes Confidentiality Yes No No Yes No No No Integrity Yes Yes Yes Yes No No Yes Non-repudiation Yes No Yes Yes No Yes No Anti - Spoofing Yes Yes Yes Yes No Yes Yes DoS Attacks No Yes No No Yes Yes Yes

Types of Ad-hoc Networks Managed Limited size Trusted Third Party Pre-Configuration Pure No size limitation No assumptions Resembles the Human Trust Model

http://www.brownielocks.com/ What is Security? Trust in the Trusted Third Party Trust in the Cryptographic Mechanism Trust in the Key No amount of general beta testing will reveal a security flaw and there is no test possible that can prove the absence of flaws Bruce Schneier

Trust & Security Security makes trust work or does Trust makes security work? Trust Realistic Uni-directional Non-transitive Not absolute Dynamic Security Idealistic Bi-directional Transitive Absolute Static

Trust Mayer, Davis and Schoorman (1995 The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other party will perform a particular action important to the trustor, irrespective of the ability to monitor or control the party. Jøsang (1996 Trust in a passionate entity (human is the belief that it will behave without malicious intent and trust in a rational entity (system is the belief that it will resist malicious manipulation. (honest & straight Denning (1993 Trust cannot be treated as a property of trusted systems but rather it is an assessment based on experience that is shared through networks of people

Types of Trust Direct Experience based Reliability Indirect Reference Credibility

Trust Model TRUST AGENT COMBINER REPUTATION AGENT

Trust Derivation Trust Quantification Trust Computation Trust Agent OSI PROPOSED TCP/IP Application Presentation Session Transport Network Data link Physical Computation & Quantification Derivation Application Transport Internet Host to Network

Trust Agent.contd Trust Derivation Passive learning Promiscuous mode Forwarding Filtering

Trust Agent.contd Trust Quantification Normalization of Trust Categories Value -1-1 < Trust < 0 0 0 < Trust < +1 +1 Representation Absolute Distrust Distrusting Ignorance Trusting Absolute Trust

Trust Agent.contd Trust Computation Dynamic assignment of situational weights Varies with type of application and time Unimportant 0 Weight 1 Most important Trust in node y by node x n T xy = [ W(i x T xy (i ] i= 1 where W(i is the weight of the i th trust category to x and T xy (i is the situational trust of x in the i th trust category of y.

HashCash Reputation Agent CPU Cost Factor Effort based disincentive VERSION TIME RESOURCE TRIAL Cryptographic Hash HashCash Token

Reputation Agent.contd 1. Requester Recommender ( Rec_Req ID RQ, ID RRQ, ID TT, Hash {Ver, TS, ID REC, Trial} 2. Recommender Requester ( Rec_Rep ID RRQ, T T ID RQ ID REC ID TGT ID RRQ ID TT T T Ver TS Trial Identity of Requesting Node Identity of Recommending Node Identity of Target Node Unique Rec_Req number Identity of Trust Type Value of Trust Type Identity of hash function Informs of date and time when this message was generated Number to be determined in order to generate a valid token

Combiner y T xy T yz x T xz z T zy T yw T wy T xw T zw Direct Trust Recommendation Trust T wz w T xzy = T xz ʘT zy = 1 (1 T xz T zy T(y = 1 (1 - T xy.(1 - T xzy.(1 - T xwy

Extension to Dynamic Source Routing (DSR Protocol

DSR : Salient Features Source routing Complete path contained in each packet Route discovery Flooding of route request till a node replies Route maintenance Explicit link breakage notification Route Caching Path Cache Link Cache

DSR : Route Discovery ROUTE REQUEST (RREQ MESSAGE FORMAT 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Option Type Opt Data Len Identification +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Target Address +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[1] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[2] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[n] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ROUTE REPLY (RREP MESSAGE FORMAT 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Option Type Opt Data Len L Reserved +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[1] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[2] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Address[n] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Quantification of Trust Categories Acknowledgements (P A Packet Precision (P P Gratuitous Route Replies (G R Blacklists (B L Salvaging (S G

Application of the Trust Agent T xy =W(P A x T xy (P A + W(P P x T xy (P P + W(G R x T xy (G R + W(B L x T xy (B L + W(S G x T xy (S G Node Situational Trust Direct Trust Passive Ack Packet Prec Grat Route Replies Black Lists Salvage Route Replies w T xw (P A T xw (P P T xw (G R T xw (B L T xw (S G T xw y T xy (P A T xy (P P T xy (G R T xy (B L T xy (S G T xy z T xz (P A T xz (P P T xz (G R T xz (B L T xz (S G T xz.......................................... DSR Situational and Direct Trust Table

DSR Reputation Table Application of the Reputation Agent Node w y z...... w T wy T wy (P A T wy (P P T wy (G R T wy (B L T wy (S G T wz T wz (P A T wz (P P T wz (G R T wz (B L T wz (S G...... y T yw T yw (P A T yw (P P T yw (G R T yw (B L T yw (S G T yz T yz (P A T yz (P P T yz (G R T yz (B L T yz (S G...... z T zw T zw (P A T zw (P P T zw (G R T zw (B L T zw (S G T zy T zy (P A T zy (P P T zy (G R T zy (B L T zy (S G........................

Application of the Combiner Node Derived Trust via Node Aggregate Trust w y z... w y z T xyw T xzw T(w... 1 1 1 (1 - T xw. (1 T xy Tyw (1 T xz Tzw (1 - T xyw.(1 -T xzw T xwy T xzy T(y... 1 1 1 (1 - T xy. (1 T xw Twy (1 T xz Tzy (1 - T xzy.(1 - T xwy T xwz T xyz T(z... 1 1 1 (1 - T xz. (1 T xw Twz (1 T xy Tyz (1 - T xyz.(1 - T xwz.................. DSR Derived and Aggregate Trust Table

Trustworthy Routing Association of aggregate trust levels to link cost Route selection based upon minimum hop count and maximum trust levels

Initial Results

Analysis HashCash Latency Fallacious Trust Build-up Differentiation of malevolent and benevolent behaviour Ambiguous/Receiver Collision Problems

Conclusions Effort/Return Model Confidence measures Passive/Active mode of operation No requirement of Trusted Third Party Suitable for improvised on-the-fly networks

Questions