lec-11-routing-sec

lec-11-routing-sec - AdHocNetworksRouting Security...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Shambhu Upadhyaya 1 Ad Hoc Networks Routing  Ad Hoc Networks Routing  Security Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 11)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 2 The Black Hole Problem in Current  AODV Protocol AODV is an important on-demand routing  protocol that creates routes only when desired  by the source node When a node requires a route to a destination,  it initiates a route discovery process within the  network It broadcasts a route request (RREQ) packet  to its neighbors (Figure 2)
Background image of page 2
Shambhu Upadhyaya 3 The Black Hole Problem in Current  AODV Protocol (cont.)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 4 The Black Hole Problem in Current  AODV Protocol (cont.) Once the RREQ reaches the destination or an  intermediate node with a fresh enough route,  the destination or intermediate node responds  by unicasting a route reply (RREP) packet  (Figure 3) back to the neighbor from which it  first received the RREQ
Background image of page 4
Shambhu Upadhyaya 5 The Black Hole Problem in Current  AODV Protocol (cont.)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 6 The Black Hole Problem in Current  AODV Protocol (cont.) Any intermediate node may respond to the  RREQ message if it has a fresh enough route The malicious node can easily disrupt the  correct functioning of the routing protocol and  make at least part of the network crash
Background image of page 6
Shambhu Upadhyaya 7 The Black Hole Problem in Current  AODV Protocol (cont.)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 8 A Proposed Solution to the Black Hole  Problem One possible solution to the black hole  problem is to disable the ability to reply in a  message of an intermediate node, so all reply  messages should be sent out only by the  destination node But there are some disadvantages in this  method
Background image of page 8
Shambhu Upadhyaya 9 A Proposed Solution to the Black Hole  Problem (cont.) Another solution is using one more route to  the intermediate node that replies to the  RREQ message to check whether the route  from the intermediate node to the destination  node exists or not In the proposed method, we require each  intermediate node to send back the  nexthop   information when it send back a RREP  message
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 10 A Proposed Solution to the Black Hole  Problem (cont.) The routing overhead is greatly increased if  the process is done every time an  intermediate node sends back a reply  message IADM is used from prior work to find the  suspected node The simulation results show that this secures  the AODV protocol from black hole attacks  and achieves increased throughput, while  keeping the routing overhead minimal
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 27

lec-11-routing-sec - AdHocNetworksRouting Security...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online