Sie sind auf Seite 1von 24

CAPABILITY BASED ROUTING WITH

SECURITY USING MOBILE AGENTS AND THREAT


LOCATOR MECHANISM
IN WIRELESS MESH NETWORKS

By: Veershetty Dagade

[BG14PHCS081]

Under the Guidance of


Dr. S.R.Mangalwede
Professor in the Dept. of CSE, GIT, Belgaum.
Presentation outline

 Introduction,
 Literature Survey,
 Research Objectives,
 Methodology,
 Possible Research Outcomes,
 Conclusion,
 References.

2
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

3
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

4
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

5
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

6
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

7
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

Mesh Networks have Self Healing


Capability

8
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

Mesh Networks have Self Healing


Capability

9
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

Mesh Networks have Self Healing


Capability

10
Introduction

Its one of the networking topologies where each node in the


topology has connection to all the remaining nodes.

Mesh Networks have Self Healing


Capability

11
Literature survey
Author &Title Protocol Methodology/ Advantages / Conclusions
Technique Disadvantages
Helber Silva · Aldri On network layer, the A path selection This Technique used in Results show that CRAB scheme
Santos · Michele ondemand multipath scheme, called the routing service to yields a better tradeoff between
Nogueira, Routing distance vector routing in CRoss-layer and improve performance network per-
management for ad hoc networks (AOMDV) Adaptivepath selection and security formance and security, even when
performance and routing protocol has been scheme for Balancing of multimedia the network is under routing attacks.
security tradeoff modified to support the performance and applications, even in Focuses on Qos.
in wireless m, © CRAB scheme. AOMDV is security onWMNdata face of attacks.
Springer-Verlag Berlin a multipath routing protocol routing (CRAB) Focuses on QoS
Heidelberg esh that can assist the CRAB
networks, (2014) scheme

Amr Alasaad • Hasen IP multicast routin, A ring- An analytical model Enhances Results show that the end-to-end
Nicanfar • Sathish based multicast routing was developed which performance, QoS is delay is reduced about 33 %, and the
Gopalakrishnan • topology with QoS support allowed to derive increased about 50% , capacity of multicast network (i.e.,
Victor C. M. Leung ,, in wireless mesh networksg Bounds on it reduces bandwidth maximum group size that the ring
Wireless Netw (2013) protocols performance metrics and power that are can serve with QoS guarantees) is
19:1627–1651DOI such as end-to-end consumed in the increased about 50 % as compared
10.1007/s11276-013- delay, capacity, and WMN as a result to conventional schemes. by
0559-z, Springer power consumption of relaying multicast employing the proposed algorithms,
Science+Business for a ring-based traffic. a significant performance
Media New York multicast routing enhancement is realized.
(2013) topology.

Wang, Z., Chen, Y., Li, CORMAN Opportunistic routing Enhances throughput Different packets of the same flow
C.: CORMAN: IEEE [Cooperative Opportunistic scheme and multiple flows are can take different paths based on
J. Sel.Areas Commun. Routing Scheme in Mobile competing for the transient quality and through
30(2), 289–296 Ad Hoc Networks] network resources, computer simulation, CORMAN is
(2012). CORMAN allows shown to have superior performance
them to share the measured in PDR, delay, and delay
network in an orderly jitter
fashion
12
Literature survey
Author, Title Protocol Methodology/ Advantages / Conclusions
Technique Disadvantages
R.Vadivel, B.Narasimhan: RGRP Adaptive on-demand Enhances throughput, Results The QoS metrics such as throughput,
(RGRP) towards [Reliable Geographic geographic routing can be got through simulation packet
Improving Quality of Routing Protocol] protocol which builds on NS-2 Simulator delivery ratio, delay, overhead, packets
Service (QoS) in efficient paths based drop are taken for comparison with Ad-hoc
Heterogeneous Mobile Ad on the need of user On-demand Distance Vector (AODV)
Hoc Networks. IJCA applications protocol.RGRP outperforms AODV in all
(0975 – 8887) Volume aspects such as improved throughput,
60– No.15, December packet delivery ratio
(2012) and decreased delay, overhead.

Cheng, L., Das, S., A robust forwarding Here a biased RFE is designed to enhance After extending AODV with RFE
Chen, C., Ma, J., Wang, extension (RFE) for backoff scheme is existing reactive routing simulation results showed that AODV-
W, Robust Forwarding reactive routing introduced during protocols to provide reliable RFE can significantly improve
for Reactive Routing protocols in wireless the route discovery and energy efficient packet robustness, it achieves nearly 100%
Protocols in Wireless ad hoc networks phase to find a delivery against the packet delivery ratio in dense networks ,
Ad Hoc Networks with robust virtual path, unreliable wireless links. and it also effectively improves the end
Unreliable Links, 978- which can provide to end energy efficiency and latency.
1-61284-231- more cooperative
8/11/$26.00 © IEEE, forwarding
(2011) opportunities.

Anoosha Prathapani · Agent Transfer Honeypot based A novel strategy by Through extensive simulations, it was
Lakshmi Santhanam · Protocol [ATP] system to detect employing mobile honeypot found that our honeypot based blackhole
Dharma P. Agrawal, blackhole attackers agents that utilize detection model has a high detection
Detection of blackhole in WMN their topological knowledge rate and a low false positive rate
attack in aWireless and detect such spurious
Mesh Network using route advertisements.
honeypot agents, © Hence valuable information
Springer on attacker’s strategy from
Science+Business the intrusion logs gathered
Media, LLC (2011) at a given honeypot
13
Existing Routing Software Implementations
The Mobile Mesh software is covered by the GNU General Public License (Version 2).
 TBRPF, or Topology Broadcast based on Reverse-Path Forwarding, is a proactive, link-state routing
protocol designed for mobile ad-hoc networks, which provides hop-by-hop routing along minimum
hop paths to each destination. It seems it is patent-protected unless it becomes a IETF standard.
 OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous
System. Each OSPF router maintains an identical database describing the Autonomous System's
topology. From this database, a routing table is calculated by constructing a shortest-path tree.
 GNU Zebra is free software that manages TCP/IP-based routing protocols. It is released as part of
the GNU Project, and is distributed under the GNU General Public License. It supports BGP-4
protocol as described in RFC1771 (A Border Gateway Protocol 4) as well as RIPv1, RIPv2, and
OSPFv2.
 Locust World develops a free bootable CD solution based on the AODV protocol, and also develops
and sells a complete ready-to-deploy MeshBox running its software, most (but not all) of which is
available under the GPL. The MeshBox and mesh software have been used in a number of
community networks in the UK.
 4g Mesh Cube The German company 4G Mobile Systems has developed a tiny MeshCube running
Debian Linux on a MIPS processor, using MITRE Mobile Mesh routing software. This is a ready-to-
deploy gateway with both a wireless and a wired interface. With a power consumption of 4W (and
potentially lower), it is ideal for deployment with an autonomous sustainable power source.

14
Research objectives
The objectives of the proposed research is to design a new routing protocol CBR
(Capability Based Routing) which takes care of most of the parameters of QoS like:
 Packet classification: This feature provide the capability to partition network traffic into
multiple priority levels or classes of service ,
 Admission Control: Admission control can be used to balance the goals of maximizing
bandwidth utilization and ensuring sufficient resources
 Policy Control: This module in our proposal works based on the Admission control to monitor
whether a particular source is not violating any of the contract made
 Flow Control: Flow control is a mechanism that controls the flow of data between a sender
and a receiver such that a slower receiver would not be overwhelmed by the amount of data
transmitted by a fast sender,
 Congestion Control : cased due to packet arrival rate exceeding the outgoing link capacity,
Insufficient memory to store arriving packets, Bursty traffic, Slow processor, etc,
 Load Balancing: For better management of available resources good load balancing techniques are
required ,
 Security: This module helps in detection and avoiding of blackhole attack using mobile agents.

15
Methodology
Possible Research Outcomes
It is envisaged that the proposed work will result in a new routing protocol CBR (Capability
Based Routing) that takes care of most of the QoS Commitments. We foresee the following
outcomes arising out of the proposed work:

•Packet Classifier: This module helps in classifying the type of packets and provide
certain different services to the individual packets, thus meeting QoS committment.
•Admission Control: This module helps to compute the resources (typically bandwidth,
memory for buffer, processing power, battery life etc) requirements of new flow and
determines whether the resources along the path to be followed by the flow are available.
•Policy Control: This module helps in preventing the source from violating its contract, the
network may want to monitor the traffic flow continuously hence this module serves the
purpose.
•Flow Control/Traffic shaper: This module helps in altering the traffic flow as per the
QoS Commitment.
•Congestion Control: This module helps avoiding dropping of packets by providing a buffer
or queue.
•Load balancer: Due to the presence of good load balancer the resources are
managed properly,
•Security: This module helps in secure routing and forwarding of packets .
17
Conclusion
• We envisage that the proposed system can serve as an alternative for routing
packets in an efficient manner with proper resource utilization.
• We also envisage that the proposed system can serve as an alternative for
routing packets in a secured manner with most of the parameters of QoS being
met.
• The proposed work also models the detection mechanism of malicious
blackhole attackers using a detection agent with threat locator. The blackhole
attack severely affects the performance and other criteria of the WMNs and the
agent based detection system raises a timely alert of an attack occurrence.
• It is also envisaged that the proposed agent based threat detection model will
have a high detection rate and a low false positive rate.

18
References
[1] Xu J (2006) Multicast in wireless mesh networks. York University Toronto, Ontario
[2] Mohsen Jahanshahi, Alireza Talebi Barmi “Multicast routing protocols in wireless mesh networks: a
survey” Computing DOI 10.1007/s00607-014-0403-z, © Springer-Verlag Wien (2014)
[3] Amr Alasaad, Hasen Nicanfar, Sathish Gopalakrishnan, Victor C. M. Leung, “A ring-based multicast
routing topology with QoS support in wireless mesh networks” Wireless Netw (2013) 19:1627–1651 DOI
10.1007/s11276-013-0559-z, Springer Science+Business Media New York (2013)
[4] Anoosha Prathapani · Lakshmi Santhanam · Dharma P. Agrawal, “Detection of blackhole attack in a
Wireless Mesh Network using intelligent honeypot agents” J Supercomput (2013) 64:777–804 DOI
10.1007/s11227-010-0547-3 © Springer Science+Business Media, LLC (2011)
[5] Hu Y, Johnson DB, Perrig A SEAD: secure efficient distance vector routing for mobile wireless ad hoc
networks. Ad Hoc Netw 175–192 (2003).
[6] Khattab S, Melhem R, Mosse D, Znati T Honeypot back-propagation for mitigating spoofing
distributed Denial-of-service attacks. J Parallel Distrib Comput 66:1152–1164 (2006).
[7] Vinod Kone, Sudipto Das, BenY.Zhao, Haitao Zheng, “QUORUM—Quality of Service inWireless
Mesh Networks” Mobile Netw Appl (2007) 12:358–369 DOI 10.1007/s11036-008-0050-8, © Springer
Science + Business Media, LLC (2008)
[8] Yajun Li, Yunfeng Xiong, Liang Zhou, Rongbo Zhu, “Adaptive Optimization-based Routing in
Wireless Mesh Networks” Wireless Pers Commun 56:403–415, DOI 10.1007/s11277-010-9979-6, ©
Springer Science+Business Media, LLC. (2011)
[9] Huang B, He Y, Perkins D, Investigating deployment strategies for multi-radio multi-channel
residential wireless mesh networks. IEEE Comput Soc 147–153 (2009)

19
References
[10] Wang, Z., Chen, Y., Li, C.: CORMAN: A novel cooperative opportunistic routing scheme in mobile
ad hoc networks. IEEE J. Sel.Areas Commun. 30(2), 289–296 (2012).
[11] Yang, S., Yeo, C.K., Lee, B.S.: Toward reliable data delivery for highly dynamic mobile ad hoc
networks. IEEE Trans. Mob. Comput. 1(1), 111–124 (2012).
[12] Cheng, L., Das, S., Chen, C., Ma, J., Wang, W.: Robust forwarding for reactive routing protocols in
wireless ad hoc networks with unreliable links. In: IEEE International Conference on Communications,
pp. 1–6 (2011).
[13] Mir, S., Pirzada, A.A., Portmann, M.: HOVER: hybrid on-demand distance vector routing for
wireless mesh networks. Proceedings of 31st Australasian Science Conference (ACSC) (2008).
[14] Yuan, Y., Yang, H.,Wong, S.H.Y., Lu, S., Arbaugh,W.: ROMER: resilient opportunisticmesh routing
for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh) (2005).
[15] Aguayo, D., Bicket, J., Morris, R.: ScrRR: a high throughput routing protocol for 802.11 mesh
networks (2004).
[16] Baumann, R., Heimlicher, S., Lenders, V., May, M.: HEAT: scalable routing in wireless mesh
networks using temperature fields. IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WoWMoM) (2007).
[17] Masoudifar, M. A review and performance comparison of QoS multicast routing protocols for
MANETs. Ad Hoc Networks, 7, 1150–1155. doi:10.1016/j.adhoc.2008.10.004 (2009)..
[18] Tebbe, H., & Kassler, A. QAMNet: Providing quality of service to ad-hoc multicast enabled
networks. In Proceedings of the 1st intenational symposium on wireless pervasive computing (pp. 1–5).
doi:10.1109/ISWPC.2006.1613664 (2006).

20
References
[19] Layuan, L., & Chunlina, L.. A QoS multicast routing protocol for clustering mobile ad hoc
networks. Computer Communications, 30(7), 1641–1654 (2007).
[20] Ng, J., Low, C. P., & Teo, H. S. On-demand QoS multicast routing and reservation protocol for
MANETs. In Proceedings of the IEEE PIMRC (pp. 2504–2508) (2004).
[21] Xiang, X.,Wang, X., & Yang, Y. Supporting efficient and scalable multicasting over mobile ad
hoc networks. IEEE Transactions on Mobile Computing, 10(5), 544–559 (2011).
[22] Acharya, P. A. K., & Belding, E. M. MARS: Link-layer rate selection for multicast transmissions
in wireless mesh networks, Ad Hoc Networks, 9(1), 48–60 (2011).
[23] Md Asri Bin Ngadi, Saqib Ali, Abdul Hanan Abdullah and Rashid Hafeez Khokhar, “A
taxonomy of cross layer routing metrics for wireless mesh networks” Bin Ngadi et al. EURASIP
Journal on Wireless Communications and Networking 2012:177
http://jwcn.eurasipjournals.com/content/2012/1/177 licensee Springer (2012)
[24] Kumar N, Chilamkurti N, Lee JH A novel minimum delay maximum flow multicast algorithm to
construct a multicast tree in wireless mesh networks. Comput Math Appl 63(2) (2012).
[25] Zouaoui EME, Derdouri L, Zeghib N Dynamic multicast membership algorithms for
multichannel multi-radio wireless mesh network. Int J Comput Sci Telecommun 3(12) (2012)
[26] Avesh K. Agarwal, WenyeWang, “An Experimental Study of the Performance Impact
of Path-Based DoS Attacks inWireless Mesh Networks” Mobile Netw Appl (2010) 15:693–709
DOI 10.1007/s11036-009-0204-3, © Springer Science + Business Media, LLC (2009)
[27] Helber Silva, Aldri Santos, Michele Nogueira “Routing management for performance and
security tradeoff in wireless mesh networks” Int. J. Inf. Secur. DOI 10.1007/s10207-014-0246-9 ©
Springer-Verlag Berlin Heidelberg (2014)
21
References
[28] Huang Y-A, Lee W A cooperative intrusion detection system for ad hoc networks. In: Pro-
ceedings of 1st ACM workshop on ad hoc and sensor networks, pp 135–147 (2003)
[29] Santhanam L Integrated security architecture for Wireless Mesh Networks. Ph.D. Dissertation,
University of Cincinnati, Mar 2008, (2008)
[30] Islam, Md S, Hamid, Md A, & Seon Hong, C. SHWMP: A secure hybrid wireless mesh
protocol for IEEE 802.11s wireless mesh networks. Transactions on Computational Science VI,
5730, 95–114 (2009).
[31] Samad, F., & Makram, S. A. Protection based on neighborhood-trust in clustered wireless
mesh networks. In Proceedings of third international conference on next generation mobile
applications, services and technologies (NGMAST), Cardiff, Wales, UK, September pp. 487–493
(2009).
[32] Khan, S., Loo, K. K., Mast, N., & Naeem, T. SRPM: Secure routing protocol for IEEE 802.11
infrastructure based wireless mesh networks. Journal of Network and Systems Management, 18(2),
190–
209 (2010).
[33] Ren, K., & Shucheng, Y. PEACE: A novel privacy-enhanced yet accountable security
framework formetropolitan wirelessmesh networks. IEEE Transactions On Parallel And
Distributed Systems, 21(2), 203–215 (2010).

22
QUESTIONS??

23
THANK YOU

24

Das könnte Ihnen auch gefallen