Trust based Multicast routing in Mobile Ad hoc Network

37
Trust based Multicast routing in Mobile Ad hoc Network November 11, 2011 Vadakkumuri V Aboobacker [Aboo] Student Id: 41418220 Supervisor: Dr. Rajan Shankaran 1 Trust based Multicast in Mobile Ad hoc Networks Macquarie University ITEC810 Project - Semester 2, 2011

description

November 11, 2011. Trust based Multicast routing in Mobile Ad hoc Network. Vadakkumuri V Aboobacker [Aboo] Student Id: 41418220 Supervisor: Dr. Rajan Shankaran. Macquarie University ITEC810 Project - Semester 2, 2011. Summary. Introduction Multicast in MANET Trust in MANET - PowerPoint PPT Presentation

Transcript of Trust based Multicast routing in Mobile Ad hoc Network

Page 1: Trust based Multicast routing in Mobile Ad hoc Network

Trust based Multicast routing in Mobile Ad hoc

Network

November 11, 2011

Vadakkumuri V Aboobacker [Aboo]

Student Id: 41418220

Supervisor: Dr. Rajan Shankaran

1

Trust based Multicast in Mobile Ad hoc Networks

Macquarie UniversityITEC810 Project - Semester 2, 2011

Page 2: Trust based Multicast routing in Mobile Ad hoc Network

Summary2

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast frameworks

A new trust based extension for MAODV multicast protocol

Conclusion and future directionsTrust based Multicast in Mobile Ad hoc Networks

Page 3: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

3

Trust based Multicast in Mobile Ad hoc Networks

Introduction

Page 4: Trust based Multicast routing in Mobile Ad hoc Network

Background4

Characteristics Self organising

Self configuring Distributed and cooperative network operations

No fixed infrastructure Highly dynamic multi-hop topology

Applications Battlefields Emergency rescue services Business conferences or school class rooms

Trust based Multicast in Mobile Ad hoc Networks

Page 5: Trust based Multicast routing in Mobile Ad hoc Network

Project aim

Identify the routing related challenges in MANETs, especially with multicast routing Security and efficiency

Identify the solutions available to address these challenges Trust management frameworks Trust based multicast routing

Design a trust based extension to MAODV multicast routing protocol

5

Trust based Multicast in Mobile Ad hoc Networks

Page 6: Trust based Multicast routing in Mobile Ad hoc Network

Significance6

Increasing popularity of MANETs Evolution from a military based networks in to

commercial space

A lot of research issues have surfaced due to peculiar characterises of MANETs, especially in the area of routing

Multicast is a very important feature required in MANETs Optimize node and network utilization

Various researches are focused around unicast routing Only little attention has been given to trust based

multicast

Trust based Multicast in Mobile Ad hoc Networks

Page 7: Trust based Multicast routing in Mobile Ad hoc Network

Analysis methodology7

Study the security challenges in unicast and multicast routing in MANET Multicast techniques Analyse MAODV multicast protocol in depth

Study the trust management frameworks in MANETs General trust Importance of trust in MANETs Various trust management frameworks

Apply trust based schemes to multicast routing Study existing security based and trust based

solutions Used AODV and MAODV as candidates for analysis

Propose a new scheme for trust based multicast

Trust based Multicast in Mobile Ad hoc Networks

Page 8: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

8

Trust based Multicast in Mobile Ad hoc Networks

Multicast in MANET

Page 9: Trust based Multicast routing in Mobile Ad hoc Network

Multicast in MANET9

Traditional Link State and Distance Vector protocols are not directly applicable Dynamic topology changes

Varying link and node conditions Nodes moving, joining and leaving

Co-operative routing Every node is a potential router!

Multicast techniques Reactive and proactive protocols Mesh based and tree based Focus on a tree based protocol – Multicast

Adaptive On demand Distance Vector Protocols (MAODV)

Trust based Multicast in Mobile Ad hoc Networks

Page 10: Trust based Multicast routing in Mobile Ad hoc Network

Multicast Adaptive On demand Distance Vector protocol (MAODV)10

A tree based approach All the nodes in the multicast groups are in

a multicast tree

Only one path exists between two nodes of the tree

The goal is to graft a branch to the nearest (least hop count) leaf node of the tree

Tree management is a distributed approachTrust based Multicast in Mobile Ad hoc Networks

Page 11: Trust based Multicast routing in Mobile Ad hoc Network

Multicast Adaptive On demand Distance Vector protocol (MAODV)11

Group leader First node in the multicast group A node may assume the leadership if no route reply

(RREP) received for a multicast group Timeout and retries

Maintains the route sequence number for the multicast group Periodic Group Hello messages

Repairing portioned groups and broken links

Features: Reactive protocol Hop count for route selection process (Distance

Vector) Broadcast id to avoid duplicate protocol messages Route sequence number to indicate freshness of a

routeTrust based Multicast in Mobile Ad hoc Networks

Page 12: Trust based Multicast routing in Mobile Ad hoc Network

Multicast Adaptive On demand Distance Vector protocol (MAODV)12

Route discovery: Broadcasts RREQ protocol message to every

neighbours Neighbours check their routing table

Replies (RREP) if a route exists Otherwise re-floods the request to its

neighbours Nodes record the route back to the source

node to relay RREP message back to source The requested node receives many routes

from different neighbouring nodes Chooses the best route using hop count and

uses MACT to establish only one branch to the nearest leaf node

Trust based Multicast in Mobile Ad hoc Networks

Page 13: Trust based Multicast routing in Mobile Ad hoc Network

Multicast Adaptive On demand Distance Vector protocol (MAODV)13

RREQ

RREQ

RR

EQ

RREQ

RREQ

RREQ

RR

EQ

RREQ

RR

EQ

MCAST

RREP

RREP

RREP

RREP

RR

EP

RREP

RREP

MCAST

New network node initiating route discovery

Group leader

Node acting as route alone

Existing group member + router Link

Branch of the multicast tree

A regular network node

Page 14: Trust based Multicast routing in Mobile Ad hoc Network

Security related Challenges in Multicast

14

Similar security threats as in fixed networks DoS, unauthorized disclosure, unauthorized modification,

non-repudiation, unauthorized access, etc

Certain attacks are more aggravated, especially DoS attacks due to: Co-operative routing (every node is a router) Highly dynamic network topology Resource limited nodes Unreliable communication media

Counter measures are difficult: Protection should be implemented in every node Limitation on node resources No trusted third party

Basis of key management Difficult to do authentication and authorizationTrust based Multicast in Mobile Ad hoc Networks

Page 15: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

15

Trust based Multicast in Mobile Ad hoc Networks

Trust in MANET

Page 16: Trust based Multicast routing in Mobile Ad hoc Network

Trust in MANET16

The network nodes are generally unpredictable Due to varying node and link conditions Malicious intentions including selfish nodes No central administration

Trust can be viewed as an expectation on how the node going to behave in future Networking functions such as routing are simplified if the

nodes are predictable (good or bad)

Trust is can be considered as an ingredient to solve security related challenges in MANETs Achieve co-operation The more trustworthy a node is, the more reliable it

isTrust based Multicast in Mobile Ad hoc Networks

Page 17: Trust based Multicast routing in Mobile Ad hoc Network

Trust in MANET – Problems with Security services in MANET

17

Traditional means of protection using security services: Authentication, authorization, non-repudiation,

integrity, confidentiality

Can not reliability detect node’s conditions Node movements, battery levels, noise levels, etc

Relies on a central trusted third party (certifiers and KMC)

Implementation is difficult in resource limited nodes Security services put additional burden on

network nodes

Relies on the trustworthiness of network infrastructure Physical security of routers Administration by a competent and central

autonomous body

Page 18: Trust based Multicast routing in Mobile Ad hoc Network

Trust in MANET – Why?18

Identifies malicious or selfish activities of nodes Using trust management framework More trustworthy a node, the more reliable it is

Considers varying network and node conditions into account Node movements, conditions of nodes and

communication media Better for dynamic environments such as MANET

Reduces cryptographic computational requirements Better solution for resource limited nodes

Compliments security services and vice versa Many distributed key management schemes are based on

trust Robust systems can be built by combining trust and security

services.

Trust based Multicast in Mobile Ad hoc Networks

Page 19: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

19

Trust based Multicast in Mobile Ad hoc Networks

Trust management frameworks in MANET

Page 20: Trust based Multicast routing in Mobile Ad hoc Network

Trust management frameworks in MANET

20

Requirements: Highly dynamic Selfish and malicious nodes do exist No unreasonable computational requirements Continuous, short lived and calculated online No central trusted third party

Must be a distributed approach

Predicts the nodes behaviour in future – trustworthiness Based on certain evidences such as certificates or

keys (evidence based) Based on past experiences (reputation based)Trust based Multicast in Mobile Ad hoc Networks

Page 21: Trust based Multicast routing in Mobile Ad hoc Network

Trust management frameworks in MANET – Reputation based

21

Most prevalent technique in MANET All nodes collect and keep historical

interactions Good and bad behaviours

Also collect opinions from other nodes

Quantify the collected evidences into trust metrics Used in decision making process such as

selection of routes Various techniques used for calculation

Simple approach: The ratio of good interactions and total interactions in a window period

Complicated approaches using statistical and probability techniques

Trust based Multicast in Mobile Ad hoc Networks

Page 22: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

22

Trust based Multicast in Mobile Ad hoc Networks

Trust based multicast

Page 23: Trust based Multicast routing in Mobile Ad hoc Network

Problems with routing protocols in MANETs

23

Designed mainly to take care of: Dynamic nature of the network Scalability

to be implemented in resource limited nodes

Security is an after thought!

Assumes all the nodes are: Trustworthy, properly administered and have the

capacity to perform networking functions

This assumption could be safe in traditional fixed and wireless networks (dedicated routers) Every node is a router in MANET! Trust based Multicast in Mobile Ad hoc Networks

Page 24: Trust based Multicast routing in Mobile Ad hoc Network

Techniques to secure routing infrastructure - Security based AODV24

Uses signatures to protect protocol messages Uses certificates Provides authentication and integrity

Problems: Requires cryptographic computations Uses certificates but PKI is not defined Do not consider ambient route

conditions A secure node does not mean that it is

reliable! Varying conditions of link and nodes along

the path to the destination

Trust based Multicast in Mobile Ad hoc Networks

Page 25: Trust based Multicast routing in Mobile Ad hoc Network

Trust based multicast25

Uses a trust management framework

Uses trust values while admitting node to multicast group

Uses the trust value during route selection process Shortest path is not sufficient due to highly dynamic

nature of networks Trust can include ambient route conditions Trust can also include security related attributes of

the nodes along the path Trust also can be used as a decision point to re-

evaluate an existing route Trust based Multicast in Mobile Ad hoc Networks

Page 26: Trust based Multicast routing in Mobile Ad hoc Network

Techniques to secure routing infrastructure – Trust based AODV26

No cryptography involved Distributed trust management approach

There are various schemes available Some assumes most network nodes are reliable Some uses only self derived node trust while others

also use recommendations from other nodes Whilst some schemes considers node trust, others

use route trust to consider the reliability of all the nodes in the path

Based on the analysis, there is room for improvement! Trust based Multicast in Mobile Ad hoc Networks

Page 27: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

27

Trust based Multicast in Mobile Ad hoc Networks

A new trust based extension for MAODV multicast protocol

Page 28: Trust based Multicast routing in Mobile Ad hoc Network

A new approach for trust based MAODV multicast routing protocol28

Trust management framework Reputation based trust management Uses Node trust and route trust

Self derived and recommendations Uses confidence value

Only reliable trusts are advertised Rely on recommendations based trust if

confidence value is low Relies more on self derived trust as the

confidence value increases

Trust based Multicast in Mobile Ad hoc Networks

Page 29: Trust based Multicast routing in Mobile Ad hoc Network

Node trust29

Calculates based on recent interactions (good and bad) Used for route selection process Used for admission in to multicast tree

Node trust is the combination of self derived trust and recommendations.

Rely on recommendation based trust if confidence value is low

Relies more on self derived trust as the confidence value increases

Trust based Multicast in Mobile Ad hoc Networks

Page 30: Trust based Multicast routing in Mobile Ad hoc Network

Node trust30

Trust based Multicast in Mobile Ad hoc Networks

Page 31: Trust based Multicast routing in Mobile Ad hoc Network

Node trust31

Trust based Multicast in Mobile Ad hoc Networks

Page 32: Trust based Multicast routing in Mobile Ad hoc Network

Route trust32

Route trust Calculates based on the send vs. received packet counts

along the route Also uses the trust value of individual nodes along the

routes to derive the route trust Re-evaluates the selected routes periodically

Trust based Multicast in Mobile Ad hoc Networks

(9) Is used initially during the initial route discover process

Page 33: Trust based Multicast routing in Mobile Ad hoc Network

Route selection process33

Protocol messages RREQ, RREP are modified to include trust values

The route with highest trustworthy nodes as wells as the least hop count is selected.

Configurable weights for considering hop count and trust

Trust based Multicast in Mobile Ad hoc Networks

Page 34: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

34

Trust based Multicast in Mobile Ad hoc Networks

Conclusion and future directions

Page 35: Trust based Multicast routing in Mobile Ad hoc Network

Conclusion35

Trust is an important concept in MANETs due to the co-operative nature of the network (Infrastructure less and self organising nature)

Security based solutions are difficult in resource limited devices and are more prone to DoS attacks

Security based approaches cannot take care of the dynamic nature of the network and varying route conditions

Trust based solutions could detect malicious nodes, selfish nodes and also to improve cooperation in the network Increases network throughput and utilization Trust could also complement security based solutions and vice

versa.

Trust based routing (unicast and multicast) is considered very ideal in MANETs to secure the routing infrastructure

Trust based Multicast in Mobile Ad hoc Networks

Page 36: Trust based Multicast routing in Mobile Ad hoc Network

Future directions36

Security should not be an after thought in designing network protocols More significance to trust based schemes

Key management is crucial for security services Centralized key management not applicable More attention to distributed key management is required

Compared to fixed networks, MANET is very far from being popular Challenges associated with MANETs will continue to be hot

research topic for years to come

Fine tuning of proposed trust management framework and trust based multicast Simulations and experiments

Trust based Multicast in Mobile Ad hoc Networks

Page 37: Trust based Multicast routing in Mobile Ad hoc Network

Introduction

Multicast in MANET

Trust in MANET

Trust management frameworks in MANET

Trust based multicast

A new trust based extension for MAODV multicast protocol

Conclusion and future directions

37

Questions and discussions

Trust based Multicast in Mobile Ad hoc Networks