TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
A Survey of Secure Wireless Ad Hoc Routing
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
ITIS 6010/8010 Wireless Network Security
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004

2 Outline  Introduction  Framework of Truman (TRUsted MANETs)  Trust model for Truman  Routing operations in Truman  Analysis  Conclusion and future work

3 Introduction  Mobile Ad Hoc Networks (MANETs) No fixed infrastructure Self-organized multi-hop routing among nodes Nodes with high mobility Underlying wireless communication medium Frequent link layer errors Vulnerable to kinds of attacks

4 Applications of MANETs  Personal area networking  Meeting rooms  Disaster relief  Battlefield operations  High Security Requirements

5 Previous Security Solutions for MANET  Secure routing protocols may perform digital signature authentication at each routing message huge overhead  Key management mechanisms usually need a super-trusted third-party to issue certificates destroy the self-organization nature of MANETs

6 Basic Idea of Truman  A secure routing protocol for MANETs Make use of trust relationships among nodes Design a trust model derived from subjective logic Need not sign and verify digital signature at each routing message  Cooperate with a self-organized key management mechanism, such as some threshold solutions More scalable and robust

7 Framework of Truman

8 Review of Our Trust Model  Use Opinion to represent trust  Discounting Combination: Combine trusts along one path  Consensus Combination: Combine trusts from several paths  Mapping from evidence space to opinion space: p : positive evidences n : negative evidences

9 Routing Operations in Truman  Trust Recommendation  Route Table Extension  Trust Judgement  Trust Update  Routing Messages Extensions  Trusted Routing Discovery

10 Trust Judgement b – belief d – disbelief u – uncertainty 0.5 – threshold bduActions >0.5Request and verify digital signature >0.5Distrust a node till next certificate renewal >0.5Trust a node and continue routing ≤0.5 Request and verify digital signature

11 Trust Update  Update trust from local evidences Successful Communication  Positive events: p++ Failed Communication  Negative events: n++  Update trust from trust combination Combination from different recommendations  Trust update algorithm T=WeTe+WcTc Usually We>Wc  Update fashion Periodical update if high packets frequency On-demand update if lower packets frequency

12 Routing Messages Extensions  Add such fields into original routing messages Trust information, or Digital signature information  RREQ  TRREQ  RREP  TRREP  Message structure: {original routing information, trust information/signature information}

13 Trusted Routing Discovery: Scenario I-Beginning of Truman  Pre-operations: Each node in this network has generated its own {secret, public} key pair and obtained the public keys of other nodes for further usage of digital signature.  Each node ’ s opinion towards others is (0,0,1), which means total uncertainty of other nodes ’ trustworthiness.

14 Trusted Routing Discovery: Scenario I-Beginning of Truman (con ’ d)  A broadcasts RREQ to discover C  B is uncertain about A  request A to sign itself  A unicast {RREQ} A  B verifies it using P A. If pass, broadcast {RREQ} B  C has P B, verify it and reply {RREP} C  B has P C, verify it and forward {RREP} B  A has P B, verify it and begin data communication

15  During the initialization period, nodes perform digital signing and verification at each routing message  If a node A has passed B ’ s verification, B will update its local route table (route path and trust value) in a certain update fashion.  After first routing communication, the opinions are all changed to (0.33,0,0.67)  Still high computation overhead in the beginning. Trusted Routing Discovery: Scenario I-Beginning of Truman (con ’ d)

16 Trusted Routing Discovery: Scenario II-A Stable Truman S N1 N2 D

17 Performance Analysis  Communication overheads can be sharply reduced by avoiding signature generation and verification at each routing message.  Bandwidth overheads can be largely reduced because of replacing 1024/2048 bit signatures to simple trust values.

18 Security Analysis  If no misbehavior, trust value will keep increasing.  If an external malicious node, it will at once be denied due to not providing valid signature.  We only consider to prevent external attacks.  Internal attacks can be eased through certificates renewal.

19 Conclusion and Future Work  Truman is a trusted MANET which employs two types of security solutions A trusted routing protocol A self-organized key management mechanism  Light computation overheads and a certain security level guarantee.  Perform simulation to proof it.

Q&A Thank You!