Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Secure Time Synchronization Service for Sensor Networks S. Ganeriwal, R. Kumar, M. B. Sirvastava Presented by: Kaiqi Xiong 11/28/2005 Computer Science.
Computer Science Dr. Peng NingCSC 774 Advanced Network Security1 Topic 3.1: NetBill.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 4.2 BiBa.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.2 Tree-Based Group Diffie Hellman Protocol Acknowledgment:
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Yih-Chun Hu Carnegie Mellon University
Centre for Wireless Communications University of Oulu, Finland
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Secure routing in multi-hop wireless networks (II)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Packet Leashes: Defense Against Wormhole Attacks
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
ITIS 6010/8010 Wireless Network Security
A Survey of Secure Wireless Ad Hoc Routing
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security2 Mobile Ad-hoc Networks (MANET) MANET –No infrastructure support –Wireless communication –Mobile Applications for MANET –Rescue missions –Scientific explorations –Military operations

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security3 Security in MANET Challenges –No physical boundary –No fixed topology Nowhere to place firewalls –Unreliable communication

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security4 CSC 774 Advanced Network Security Topic 6.1 Ariadne: A Secure MANET Routing Protocol

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security5 Outline Dynamic Source Routing (DSR) protocol –Basis of Ariadne Attacks against MANET routing protocols Ariadne

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security6 DSR Two phases –Route discovery Discover routes from the initiator to the target –Route maintenance Maintain route

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security7 DSR (Contd) Route discovery –Initiator broadcasts REQUEST to its neighbors Each REQUEST is uniquely identified by the initiators address and a sequence number –If a node receives this REQUEST If it has received this REQUEST previously, discard it Otherwise, append itself to a list in this REQUEST and rebroadcast it –When the destination receives this REQUEST Sends back a REPLY, including the list of nodes in the REQUEST –When the initiator receives the REPLY Cache the list of nodes in REPLY

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security8 DSR (Contd) Route maintenance –Source routing When sending a packet, the originator includes the complete route in the packet header Each node forwards the packet based on the route in the header –Route error When a node detects a link break, it sends a ROUTE ERROR message to the originator, identifying the broken link The originator removes the route from its cache, uses an alternative route or rediscover a new route

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security9 Attacks against MANET Routing Protocols Type of attacks –Passive Eavesdrop –Active Inject packets into the network Compromised nodes –Attackers may know all keying materials on compromised nodes

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security10 Attacks against MANET Routing Protocols (Contd) Active-n-m attacker –The attacker has compromised n nodes and owns m nodes Attacker hierarchy –Measure the security of the routing protocol –Ariadne: resilience against Active-1-x and Active-y-x attacks Active-0-1 Active-0-x Active-1-x Active-y-x

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security11 Attacks against MANET Routing Protocols (Contd) Active attacks on ad hoc routing protocols –Routing disruption Routing loop Black hole (gray hole) Wormhole Rushing attack –Resource consumption Packet injection

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security12 Ariadne Overview –Based on DSR –Use Pairwise shared secret keys TESLA Digital signature –Undesirable due to the overhead and possible DOS attacks –Main target Active-y-x attackers

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security13 Ariadne (Contd) Notations –A, B : principals –K AB, K BA : secret MAC keys between A and B –MAC (M) : MAC of message M using MAC key K AB

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security14 Route Discovery Goals –Target can authenticate initiator Initiator includes a MAC computed with K SD –Initiator and target can authenticate the node list in REPLY and REQUEST –No intermediate node can remove a previous nodes entry in the node list

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security15 Route Discovery (Contd) Authenticate node list in REQUEST –With TESLA Each node has a TESLA instance An intermediate node appends a MAC computed with its TESLA key –With digital signature Each node digitally signs REQUEST –With pairwise key Each node appends a MAC computed with a pairwise key shared with the target Authentication of node list in REPLY is done similarly

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security16 Route Discovery (Contd) Per-hop hashing –Prevent intermediate node from removing entries from the node list in REQUEST or REPLY –The source initializes the hash chain field to a MAC generated with a pairwise key shared between the source and the target –Each node A updates the hash chain field with H[A, hash chain]

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security17 Route Discovery with TESLA Route Request Initiator initializes hash chain to MAC KSD (initiator, target, id, time interval) Intermediate node A which receives the request checks and checks time interval Time interval : TESLA time interval at the pessimistic expected arrival time of the RREQ at target (say T + 2d) If any condition fails, discard the request

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security18 Route Discovery with TESLA (Contd) If all conditions hold, A appends its address to node list, replaces hash chain with H[A, hash chain], appends MAC of entire Request with TESLA key K A i to MAC list Target checks validity of Request the TESLA keys are not disclosed yet the hash chain is equal to H[n n, H[n n-1, H[…,H[n 1, MAC K SD (initiator, target, id, interval)]…] If Request is valid, target returns a Route Reply

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security19 Route Discovery with TESLA (contd.) Route Reply Packet is sent to initiator along the route in node list Forwarding node waits until it can disclose its key and then append its key Initiator verifies that Each key is valid (TESLA security condition) target MAC is valid (based on K DC shared with target) Each MAC in MAC list is valid (based on TESLA keys)

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security20 Example

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security21 Route Maintenance Security issue –Prevent unauthorized nodes from sending (bogus) ROUTE_ERRORs

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security22 Route Maintenance (Contd) Route Error source routed back to initiator Intermediate node Forwards the packet and searches its route cache for all routes that use If exists, checks validity of time interval If valid, checks authentication of the Error Until authentication, saves Error info in memory until a key is disclosed and uses routes in route cache If authenticated, removes all such routes

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security23 Thwarting Routing Misbehaviors What if intermediate nodes in the source route dont forward packets? A feedback based reputation scheme to detect misbehaving nodes - relies on feedback about which packets were successfully delivered A node with multiple routes sends a fraction along each route and sends packets along the successful route Malicious node avoidance in Route Discovery Route Request includes a list of malicious nodes to avoid and the MAC h 0 computed over that list – no details Malicious nodes can be detected by target

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security24 Thwarting Malicious REQUEST floods Since REQUEST are authenticated at the target, and not at every hop, attacker can flood malicious REQUESTs Route Discovery chains To weakly authenticate REQUESTs instantly One-way chains generated as K i = H N-i [K N ] 1.Release one key for each Discovery (rate-limiting requests) A node not partitioned from the network can prevent an attacker from reusing keys 2.Dictate schedule for disclosure of key + loose clock synchronization Any node can prevent an attacker from reusing keys Computationally slightly more expensive

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security25 An Optimization Observation –Only the initiator can use the discovered route, since the intermediate nodes cannot authenticate the target –Would be more efficient if the intermediate nodes can also use the discovered route Optimization –Target uses TESLA key to generate the MAC –The key is released by target, to initiator, after appropriate delay, which the intermediate nodes also use.