Objective
Security Enhanced Dynamic Routing methodology in Wireless Networks. Performance Evaluation of various Dynamic Routing methodologies.
Internetwork Security
IP Security SSL
Routing Methods
What is Routing?
10.120.2.0 E0 S0 172.16.1.0 S1
Source
Destination
Packet
Exit Interface E0 S0 S1
Routers must learn destination network that are not directly connected.
Internetwork Routing
Intra-domain routing.
Protocols
(RIP,DSDV)
Protocol
(OSPF)
Inter-domain routing.
Protocol
(BGP)
Source
Data
A
Data
Data
Destination
Data
172.16.1.0
1. STATIC ROUTING
Manually Configured Routing. Used in Small Networks. Monitoring data Continuously. Secure Data transfer.
2. DYNAMIC ROUTING
Use of Algorithms and Protocols for configuring the network to route data. Large Networks we go for Dynamic Routing. Secure Routing over large networks. Routing Protocols such as (RIP,OSPF,BGP,DSDV and AODV).
SPRA- Shortest Path Routing Algorithm. Based on Link state Algorithm used over OSPF protocol. One path with Minimal Cost is selected using Dijkstra Algorithm.
R2
5
R3
2 11 14
R6
R4
9 10 15
R1
1
R5
ECMP- Equal Cost MultiPath Routing Algorithm. Based on Distance vector Algorithm used over RIP protocol. More than one path is selected for routing the data.
R2
5 9 11
R3
2
R6
14
R4
9 10 15
R1
1
R5
All nodes are mobile and are connected dynamically. Every node acts as router and forward traffic. AODV algorithm follows single path routing of data. MARA algorithm follows multiple path routing of data.
Source Destination R2 R3 R3 R2 R6
AODV MARA
R4
R6
R4 R5 R1
R1 R5 Destination
Source
As the packets are transferred in streams in the above existing algorithms, packets are dropped at instances while routing to destination. Eavesdropping, Spoofing and Session hijacking are some of the attacks on internetwork.
Source
Eavesdropper
Destination
The discovery of paths in an online fashion with extra control signals exchanging with neighboring nodes. Having the same route for consecutive packets. Easy to predict the data transfer path and having the possibility of loss of data. Route discovery latency. Various security threats over internet like Spoofing, Session hijacking and Eavesdropping of packets.
DDRA- Distributed Dynamic Routing Algorithm. Based on Distance vector algorithm compatible with the popular routing protocols RIP and DSDV. Every consecutive packet routed to different node to its former packet to reach destination.
Node 7 Node 3
Node 9
Node 5
Node 8
Routing Table
Destination Node (t) a) Normal Routing table of a distance vector based routing algorithm. b) Extended Routing table of a security enhanced routing algorithm. Destination Node (t) N1 N2 N3 . . Cost 4 5 7 . . Next hop Candidates {N6,N9,N4) {N8,N4} {N6} . . (b) N1 N2 N3 . . Cost 5 2 3 . . Next hop N5 N7 N4 . .
(a) History record of packet deliveries to destination node t {(N2,N6),(N7,N9),(N3,N4).} {(N5,N8),(N10,N8),(N6,N4)} {(N4,N6),(N2,N6),(N9,N6).} . .
Next Node No Checks for next node to select Yes Destination Node
Node 7 Node 3
Node 9
Node 5
Node 8
Enter client nodes. Ex (node2,3,5) Here client node 2 is our destination node.
Node 7 Node 3
Node 9
Node 5
Node 8
Selected File is divided in to 21 packets & consecutive Packets are distributed between client nodes 2,3 & 5 at server node 1 and routed.
Some Packets are routed directly to node 2 (destination node) from node 1 and other packets via node 3 & 5.
Client-B
Client-C
Client-F Client-H
Client-G
Destination
Path Selection of Dynamic Routing Algorithms D.D.R.A E.C.M.P S.P.R.A (S.P.R.A),(E.C.M.P) & (D.D.R.A)
Source
Destination
Destination
A
Source
Destination
E
0.5
4.5
2. Multiple paths increase the throughput of data transmission. 3. The performance of DDRA on the throughput is superior as compared with that of ECRA and SPRA.
2 1 0
10
Consecutive packets are routed dynamically. Less path similarity of packets transferred. Better throughput due to path variation of packets. The discovery of paths in an offline fashion, as history of packet deliveries are maintained. Probability of packet loss due various security attack like eavesdropping of packets is less.
Dynamic routing algorithm is completely orthogonal to the work based on the designs of Cryptography algorithms and System Infrastructures. Our Security enhanced dynamic routing could be used with cryptography based system designs to further improve the security of data transmission over networks.
11. References
W. Lou and Y. Fang, A Multipath Routing Approach for Secure Data Delivery, Proc. IEEE Military Comm. Conf. (MilCom). J.Yang and S. Papavassiliou, Improving Network Security by Multipath Traffic Dispersion, Proc. IEEE Military Comm. Conf. (MilCom). S. Bohacek, J.P. Hespanha, K. Obraczka, J. Lee, and C. Lim,Enhancing Security via Stochastic Routing, Proc. 11th Intl Conf.Computer Comm. and Networks (ICCCN). I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, Adaptive Multipath Routing for Dynamic Traffic Engineering, Proc. IEEE Global Telecommunications Conf. (GLOBECOM). W. Lou, W. Liu, and Y. Fang, SPREAD: Improving Network Security by Multipath Routing, Proc. IEEE Military Comm. Conf. (MilCom). J.F. Kurose and K.W. Ross, Computer NetworkingA Top-Down Approach Featuring the Internet. Addison Wesley.
Thank U All