SMANET_Midterm_Report_13July03.doc

Although the route is traced to the manet node

Info icon This preview shows pages 8–11. Sign up to view the full content.

View Full Document Right Arrow Icon
In Table 6 below, a trace of the route from the gateway to the attacker fails. Although the route is traced to the MANET node, 192.168.1.9, it cannot reach the attacker who has address 192.168.1.8. Table 6 Traceroute Attempt from Gateway to Attacker
Image of page 8

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
traceroute to 192.168.1.8 (192.168.1.8), 30 hops max, 38 byte packets 1 192.168.1.9 (192.168.1.9) 5.346 ms 1.403 ms 1.395 ms 2 * * * 3 * * * 4 * * * 5 * * * Conversely, the attacker can no longer reach any point in the SMANET or Internet. Table 7 below shows the result of an attempt to trace the route from the attacker to Internet server, “cs.uccs.edu.” Table 7 Traceroute Attempt from Attacker to Internet Server
Image of page 9
traceroute: unknown host cs.uccs.edu 4.3 Result Analysis A firewall that filters packets based on MAC addresses can effectively deny an attacker the use of a MANET and its Internet gateway services. 5. Future work Future work will comprise of completing the following tasks to further improve MANET security: Tighten firewall criteria to counter MAC address spoofing Detecting wireless intrusion attempts Authenticating routing updates and Responding with group rekeying measures designed to isolate the attacker. 6. References [AODV] Ad-hoc On-demand Distance Vector Protocol. http://w3.antd.nist.gov/wctg/aodv_kernel/. [Antigone] Antigone Secure Groupware http://antigone.citi.umich.edu/content/antigone-2.0.11/docs/html/alpha.html [Andreasson] Andreasson, Oskar. “Iptables Tutorial 1.1.19.” http://iptables-tutorial.frozentux.net/iptables-tutorial.html [Cearns2002] Cearns, Angela. “Design of an Autonomous Anti-DDoS network (A2D2).” Masters thesis. [IDIP] Network Associates Labs & Boeing. “IDIP Architecture.” http://zen.ece.ohiou.edu/~inbounds/DOCS/reldocs/IDIP_Architecture.doc, 2002. [McDaniel2001] McDaniel, Patrick D. (2001), “Policy Management in Secure Group Communication.” PhD dissertation. University of Michigan. [PBD2002] Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir Das. "Ad Hoc On Demand Distance Vector (AODV) Routing." IETF Internet draft , draft-ietf-manet-aodv-11.txt, June 2002 (Work in Progress). [Snort] Snort version 2.0, the open source network intrusion detection system. http://www.snort.org/.
Image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
[Zapata2001] Zapata, M.G. “Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing.” http://www.ietf.org/internet-drafts/draft-guerrero-manet-saodv-00.txt , Internet Draft, October 2001. [ZLL2003] X. Brian Zhang, Simon S. Lam, and D-Y Lee, “Group Rekeying with Limited Unicast Recovery,” Technical Report, TR-02-36 Revised February 2003. http://www.cs.utexas.edu/users/lam/Vita/Misc/rekey_TR.pdf
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern