Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security Issues In Sensor Networks By Priya Palanivelu.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Yih-Chun Hu Carnegie Mellon University
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
Centre for Wireless Communications University of Oulu, Finland
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
presented by Luba Yelovich-Sakharuk
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Security for Broadcast Network
Security in Wireless Networks Mike Swift CSE b Summer 2003.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Introduction Wireless devices offering IP connectivity
Packet Leashes: Defense Against Wormhole Attacks
Cryptographic Hash Function
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)

 What is it? An attacker receives packets at one point in the network, “tunnels” them to a different point in the network and then replays them from this point. Note: the attacker can create a wormhole for packets not addressed to itself so long as it is within hearing range  Why is this bad? A node is misled to believe it is within transmission range of the sending node Wormhole Attack

Gives the attacker many advantages of power over the network:  Example 1: When used against DSR, each ROUTE REQUEST packet is tunneled directly to the destination target note of the REQUEST. All of the destination neighbors following normal routing protocol rebroadcast the REQUEST copy but discard without processing all other received ROUTE REQUEST packets originating from the same Route Discovery - essentially, routes greater than two hops are never discovered. The attacker can then discard rather than forward all data packets leading to DOS attack since no other route to the destination can be discovered as long as the attacker maintains the wormhole for ROUTE REQUEST. The attacker can also selectively modify or drop random bits of a data packet Wormhole Attack

 Example 2 Wireless Access Control system based on physical proximity: such as wireless keys, or proximity and token based access control systems for PCs - an attacker could relay the authentication exchanges to gain access

Partial prevention techniques  Secret method for modulating bits  RF watermarking - authenticates wireless transmission by by modulating RF waveform in a way known only to authorized nodes. Knowledge of which RF parameters are modulated is kept secret. Shortcoming: If waveform is exactly captured and replayed at the end of the wormhole, the signal level of the watermark is independent of the distance traveled hence watermark may still be intact even if it traveled beyond normal wireless transmission range  Intrusion Detection - may work in some cases but difficult in general since packets sent by attacker are indistinguishable from packets sent by legitimate nodes

Packet Leash  Author defined general mechanism for detecting and defending against wormhole attacks.  A Leash is any information that is added to a packet for the purpose of restricting the packet’s maximum allowed transmission distance. Two types: Geographical Leashes Temporal Leashes

Geographical Leashes I  Requirements: each node must know its location and all nodes must have loosely synchronized clocks  The sender includes in the packet, its own location, p s, and the time it sent the packet, t s, The receiver compares these values to its location p r, and the time it receives the packet t r, If the clocks of both sender and receiver are synchronized within ,and v is an upper bound on the velocity of any node, the receiver can compute an upper bound on the distance between itself and the sender, d sr

Geographical Leashes II  A digital signature could be used to authenticate the the location and timestamp in the received packet  Sometimes, bounding the distance between sender and receiver does not prevent wormhole attacks: e.g when obstacles prevent communication between two nodes who are otherwise within allowed transmission range. Solution: Each node has a propagation model. There is a defined radius around both the sender and the receiver such that the receiver verifies that every possible location of the sender radius around p s can send to every possible location of the receiver radius around p r

Temporal Leashes  Requirements: All nodes must have tightly synchronized clocks s.t. max difference between any two nodes’ clocks is  and  must be known by all network nodes  Process: Option I: The sending node includes in the packet the time at which it sent the packet, t s, and this value is compared by the receiving node to the time it receives the packet t r. The receiver can determine whether the packet traveled further based on the supposed transmission time and the speed of light. Option II: The sender could include an expiration time in the packet so that the receiver does not accept the packet after this time Note: Could also use signatures for authentication

Potential Problems  Time synchronization subject to attacks, and hence restricts applicability of temporal leashes  In contention-based MAC protocol, sender may not know exact time packet will be transmitted  Receiver needs to be able to authenticate expiration time in temporal leashes, option II, otherwise, attacker could change the time and still wormhole the packet Solution: TESLA with Instant Key disclosure (TIK) protocol

TIK Protocol I  Why was TIK developed? To resolve the problem of attacker accessing and modifying the expiration time of a temporal leash. The current methods for preventing this have several drawbacks:  Message Authentication Codes: n(n-1)/2 keys need to be set up in a network of n nodes - key set up expensive, impractical in large networks.For a broadcast packet, the sender would need to add a separate MAC for each receiver - increases packet size, possibly greater than maximum packet size. One could have multiple users share keys but this allows a subset of colluding receivers to impersonate attacker  Digital Signatures: based on computationally expensive asymmetric cryptography.

TIK Protocol II  TIK is an extension of TESLA broadcast authentication protocol which uses time as a source of authentication asymmetry to ensure that a receiver can verify but not create valid authentication information. TIK basically includes the key in the packet.  TIK requires accurate time synchronization between all nodes and each node only needs to know one public value for each sender node.

TIK Protocol III - Stages  Sender Setup  Receiver Bootstrapping  Sending and verifying Authenticated Packets

Security Analysis of Packet Leashes  Provide means of verifying that signal is not propagating farther than normal transmission distance  Using geographic leashes, nodes can detect tunneling across obstacles otherwise impenetrable by radio  A malicious receiver could refuse to check the leash - an attacker could tunnel to another attacker without detection but this second attacker cannot forward the packet without being detected  Geographic leashes less efficient than temporal since they require broadcast authentication

Conclusion  Wormhole attacks - tunneling of packets by the attacker providing several advantages which could result in misleading route information as well as Denial-of-Service attacks  Packet leashes (additional information added to packets to restrict maximum transmission distance of a packet) - as a detection and defense mechanism against wormhole attacks: Geographical and Temporal Leashes TIK designed to implement temporal leashes - needed to provide authentication of received packets - requires n public keys in a network of size n