lecture18-ariadne

lecture18-ariadne - Overview Lecture 18 Secure Ad Hoc...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
3/23/09 1 1 Lecture 18 Secure Ad Hoc Network Routing Adrian Perrig 18-731: Network Security Spring 2009 2 Overview Administrative issues Midsemester grades now available on Blackboard Miniproject 2 out soon Adrian Lisbon: office hours in Lisbon this Friday Dave Andersen is lecturing next Tuesday 3 Attacks Against Routing Send away packets normally routed through node Example: Fail to advertise a route But router could just fail to forward packets Attract packets normally routed elsewhere Example: Claim good routes to far-away nodes Fail to forward packets sent for forwarding Doesn’t attack the routing protocol 4 On-Demand Source Routing: DSR Dynamic Source Routing [Johnson, 94] intuition: Operate completely on-demand Cache learned links in a graph data structure Use source routing for simplicity Route Cache at node A A B F D C E
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
3/23/09 2 5 On-Demand Source Routing: DSR Dynamic Source Routing [Johnson, 94] intuition: Operate completely on-demand Cache learned links in a graph data structure Use source routing for simplicity Route Cache at node A A B F D C E 6 target=E, id=3 DSR Route Discovery When a node needs a route to a destination: Broadcast a R OUTE R EQUEST with source, target, id When hearing a R OUTE R EQUEST for another node: Drop if already seen R EQUEST from same Discovery Else, append address to node list & rebroadcast A B C D E 7 target=E, id=3 DSR Route Discovery When a node needs a route to a destination: Broadcast a R OUTE R EQUEST with source, target, id When hearing a R OUTE R EQUEST for another node: Drop if already seen R EQUEST from same Discovery Else, append address to node list & rebroadcast A B C D E A, B target=E, id=3 8 A, B, D target=E, id=3 DSR Route Discovery When a node needs a route to a destination: Broadcast a R OUTE R EQUEST with source, target, id When hearing a R OUTE R EQUEST for another node: Drop if already seen R EQUEST from same Discovery Else, append address to node list & rebroadcast A B C D E target=E, id=3 A, B target=E, id=3
Background image of page 2
3/23/09 3 9 A, B, D target=E, id=3 DSR Route Discovery When a node needs a route to a destination: Broadcast a R OUTE R EQUEST with source, target, id When hearing a R OUTE R EQUEST for another node: Drop if already seen R EQUEST from same Discovery Else, append address to node list & rebroadcast A B C D E A, C target=E, id=3 A target=E, id=3 A, B target=E, id=3 10 A, B, D target=E, id=3 DSR Route Discovery When a node needs a route to a destination: Broadcast a R OUTE R EQUEST with source, target, id When hearing a R OUTE R EQUEST for another node: Drop if already seen R EQUEST from same Discovery Else, append address to node list & rebroadcast A B C D E target=E, id=3 A, B target=E, id=3 11 DSR Route Discovery When hearing a R OUTE R EQUEST for this node: Return a R OUTE R EPLY to the initiator E received a R EQUEST : target=E, route=A,B,D: A B C D E A,B,D,E 12 DSR Route Discovery When hearing a R OUTE R EQUEST for this node:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/31/2009 for the course ECE 18731 taught by Professor Perrig during the Spring '08 term at Carnegie Mellon.

Page1 / 18

lecture18-ariadne - Overview Lecture 18 Secure Ad Hoc...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online