Professional Documents
Culture Documents
Presentation Outline
MANETs: Operation
D
E
E
Internet
Gateway
F
After
one of the
nodes is configured as a gateway, the entire network is
Stand-alone
MANET
connected to an external network like Internet
Seminar, April 3, 2006
Presentation Outline
Initial Routing
before attack
Initial Routing
before attack
The wormhole
can drop packets
or more subtly,
selectively
forward packets
to avoid detection
Presentation Outline
Conclusion
ARAN secure routing protocol (conceived as an ondemand routing protocol) that detects and protects
against malicious actions carried out by third parties and
peers in the ad hoc environment.
It introduces authentication, message integrity and nonrepudiation as part of a minimal security policy for the ad
hoc environment
Consists of a preliminary certification process, a
mandatory end-to-end authentication stage and an
optional second stage that provides secure shortest paths
Seminar, April 3, 2006
Presentation Outline
Conclusion
Conclusion
Conclusion
Questions?
Thank You
References
B.
Y-C
Dahill,
Hu,
B.
Perrig,
N.
Levine,
D.
B.
E.
Johnson,
Royer,
C.
ARIADNE:
Shields,
ARAN:
AGrudges:
secure
A of
secure
On-Demand
Routing
Routing
Protocol
Protocol
for
for
Hoc
Ad
Hoc
P.
Papadimitratos,
Z.
Haas,
Secure
Routing
for
Mobile
Ad
Hoc
Networks,
in
Proc.
of
CNDS
2002.
Y-C
S.
M.
H.
S.
Capkun,
Reiter,
Buchegger,
Yang,
Hu, A.
D.
X.
S.L.
B.
Meng,
Stybblebine,
Buttyan
Johnson,
J.-Y.
J.Y.
Le
S.
Le
and
Lu,
Boudec,
Boudec,
A.
Authentication
Self-Organized
J-P
Perrig,
Hubaux,
Nodes
Performance
SEAD:
Self-Organized
Bearing
Secure
metric
Network-Layer
Analysis
analysis
Efficient
Public-Key
Towards
and
the
Security
Distance
CONFIDANT
design,
Routing
Management
inVector
Mobile
ACM
Security,
Routing
Protocol,
Transactions
Ad
for
HocAd
for
Fairness,
Mobile
Networks,
in
Mobile
proc.
onAd
of
H.
A.
Luo,
Shamir,
S.
Lu,
How
Ubiquitous
to
share
a
and
secret,
Robust
Communications
Authenticaion
of
Services
ACM
1979.
for
Ad
Hoc
Wireless
Networks,
Networks,
UMass
Tech
Report
02-32,
2002.
in
proceedings
of
MOBICOM
2002. inonproc.
Wireless
Hoc
Information
MobiHoc
in
and
Proc.
Networks,
Robustness
Ad
of2002.
WiSe02
and
Hoc
System
in
Networks,
inACM
Mobile
Security,
International
Adin
Hoc
4th
1999.
IEEE
Networks,
Workshop
Workshop
on
Wireless
Mobile
of 10th
Security,
Computing
Euromicro
WiSe
Systems
Workshop
2002. and
onApplications.
Parallel,
UCLA-CSD-TR-200030.
Distributed and Network-based Processing.