Sunteți pe pagina 1din 4

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

Jnana Sangam, BELGAUM 590014

A Technical seminar report on Security

Threats in Ad-hoc Networks


BACHELOR OF ENGINEERING In

Submitted in the partial fulfilment of the requirement for the award of degree

INFORMATION SCIENCE ENGINEERING Submitted by: NISHANT KUMAR [1ST08IS067]

Dept of Information science Engineering

SAMBHRAM INSTITUTE OF TECHNOLOGY


M.S Palya, Bangalore-560097

SAMBHRAM INSTITUTE OF TECHNOLOGY


M.S Palya, Bangalore-560097

DEPARTMENT OF INFORMATION SCIENCE ENGINEERING.

CERTIFICATE

This is to certify that the SEMINAR entitled Security Threats in Ad-hoc Networks has been successfully presented by NISHANT KUMAR(1ST08IS067) student of final semester B.E (Electronics & Communication) for the fulfillment of the requirement for the graduate degree in Electronics & Communication Engineering of VISVESVARAYA TECHNOLOGICAL UNIVERSITY during the academic year 2011-2012.

Seminar Co-ordinator ( )

HOD,ECE ( )

ABSTRACT
Ad-hoc networks are an emerging area of mobile computing. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we attempt to analyze the demands of Ad-hoc environment. We focus on three areas of Ad-hoc networks, key exchange and management, Ad-hoc routing, and intrusion detection. The key issues concerning these areas have been addressed here. We have tried to compile solutions to these problems that have been active areas of research. Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre determinedorganization of available links. The nodes in MANET themselves are responsible fordynamically discovering other nodes to communicate. Although the on going trend is toadopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wirelessmedium, dynamic network topology etc. are posed in MANET. As MANET is quicklyspreading for the property of its capability in forming temporary network without the aidof any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad

hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question.

Contents
1.Introduction . 1.1 Security Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.1 1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 1.3 Key Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.4 Secure Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 2 2. Key Agreement in Wireless Ad-hoc Networks 2.1 New key agreement scenario..3 2.2 Password based Authenticated Key Exchange.....3 2.3 Password authenticated Diffie - Hellman key exchange..6 3. Secure routing in Ad-hoc networks 3.1 Problems associated with Ad-hoc routing..........9 3.2 Solutions to problems in Ad-hoc-routing...13 4. Intrusion detection in wireless ad-hoc networks 4.1 Need for intrusion detection.27 4.2 General overview..27 4.3 Unsuitability of the Current IDS techniques for Ad-hoparadigm.28 4.4 New proposed architecture....29 4.5 Anomal detection in wireless ad-hoc netwok....31 5. Conclusion..33 6. References................................................................................................34

S-ar putea să vă placă și