Routing Security in Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Secure Wireless Ad Hoc Routing
1 Routing in Mobile Ad Hoc Networks CS 598HL, 2006.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Overview of Ad Hoc Routing Protocols. Overview 1.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Ad hoc Routing: Issues and Algorithms
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Ad Hoc Wireless Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Ad Hoc Wireless Routing COS 461: Computer Networks
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Subject Name: Computer Networks - II Subject Code: 10CS64
Proactive vs. Reactive Routing
Routing.
Vinay Singh Graduate school of Software Dongseo University
Other Routing Protocols
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Routing Security in Ad Hoc Networks Justin Lomheim Shirshanka Das

Outline Ad Hoc Networks DSR Review AODV Review Specific Attacks on DSR and AODV ARAN Protocol (e.g. secure AODV) Questions References

Ad Hoc Networks infrastructureless dynamic topologies (in mobile ad hoc nets) variable capacity, limited bandwidth links energy constrained operation unicast, multicast, broadcast traffic physical security considerations currently AODV & DSR routing under consideration for IETF MANET specification

Ad Hoc On Demand Distance Vector (AODV) Review distance vector algorithm using sequence numbers for updates (based on DSDV) generates routes on-demand, reducing total number of broadcasts required classified as a pure on-demand scheme, since nodes not involved in routing do not maintain routing info or participate in table exchanges

Dynamic Source Routing (DSR) Review on-demand protocol based upon source routing designed for scenarios where only a few source nodes flow to a few destination nodes source and destination nodes gather routing info into caches, through exchange of flooded query and reply packets with full routing information once discovered, routes are as needed until they fail due to lost message transmissions

AODV and DSR Route Discovery No Route To D !! RREQ RREQ RREQ RREP D RREP RREP S RREP RREQ RREP I RREQ Cache Hit !!

AODV Link Failure Mgmt infinite metric assigned to broken links if a node along a route moves, its upstream neighbor detects it and forwards a notification message (RREQ w/ infinite metric) link breakage triggers notification back to users of formerly active links until source is reached, which may then re-initiate route discovery.

AODV versus DSR Both use a similar mechanism of RREP , RREQ and route caching AODV : maintains DV type next hop forwarding tables DSR : relies on source routing

Specific Attacks on AODV & DSR modification sequence numbers hop counts source routes tunneling impersonation fabrication error messages source routes (cache poisoning) DoS trivial DoS*

Modification of Sequence Numbers In AODV a malicious node may divert traffic through itself by advertising a route (via a RREP) with a much higher sequence number than actual RREP

Modification of Hop Counts In AODV since routing decisions can involve hop count metric, a malicious node can request the hop count to zero so make itself more likely to be chosen along the path to the destination A selfish node could use a high hop count to ensure no one routes through it in case it wants to save power

Modification of Source Routes In DSR as packets are delivered, a malicious node can simply remove necessary source route entries in the packet header malicious node can drop any error messages coming back along the path

Tunneling Falsely tunneled path M2 M1 Decap Encap S D

Impersonation to create loops D M B C E X

Impersonation to create loops D M B C E X

Impersonation to create loops D M B C E X

Impersonation to create loops D B C E X M

Fabrication Attacks False route error messages in AODV and DSR Route Cache poisoning

Challenges No centrally administered secure routers No strict security policies Highly dynamic nature of mobile ad hoc networks Current ad hoc routing protocols trust all participating nodes

Problem Secure ad hoc routing protocols are difficult to design: - Existing protocols are optimized to spread routing information quickly as the network changes - Security mechanisms consume resources and can delay or even prevent successful exchanges of routing information

Specific attacks Location disclosure: reveals information regarding the location of nodes, or the structure of the network Black hole: an attacker advertises a zero metric for all destinations causing all nodes around it to route packets towards it Replay attack: an attacker sends old advertisements to a node causing it to update its routing table with stale routes Wormhole: an attacker records packets at one location in the network, and tunnels them to another location, routing can be disrupted when only routing control messages are tunneled

Requirements for a secure ad hoc routing protocol Prevents the exploits discussed Route signaling cannot be spoofed Fabricated routing messages cannot be injected Routing messages cannot be altered in transit except in accordance with the functionality of the routing protocol Routing loops cannot be formed through malicious action Routes cannot be redirected from the shortest path Unauthorized nodes should be excluded from route computation and discovery Network topology should not be exposed neither to adversaries not to authorized nodes

Authenticated Routing for Ad Hoc Networks (ARAN) Protocol Effectively basic AODV, except route discovery/setup/maintenance are authenticated Utilizes public-key cryptography to verify hop-by-hop all route request “RDP” & route reply “REP” packets Eliminates most routing security problems except for tunneling & trivial DoS attacks

ARAN – Initial Setup Public Key A IP Address A Create Time Expiry Time Signature by T Certificate A Certificate B Certificate C Certificate D Initially each node has its own certificate produced by trusted certificate server T. Each node also has a copy of T’s public key, so they can verify other certificates. In our example, node A wants to get a route to node D. A B C D Trusted certificate server T

ARAN – Route Discovery Initial RDP packet IP Address D Certificate A Nonce A Create Time Signature by A Initial RDP packet RDP: A -> D Node A generates a RDP request packet for node D. Node A includes its own certificate, and then signs the RDP packet with its private key. Node A then broadcasts this packet to its neighbors. Clearly each neighbor can verify the packet truly came from node A. A B C D

ARAN – Route Discovery Intermediate RDP Packet verified RDP: A -> D Certificate B Signature by B RDP: A -> D verified Upon receipt of the RDP packet, node B first verifies the packet. If passes the test, then node B takes the packet, signs it, appends its certificate, and forwards it on to each of its neighbors. A B C D

ARAN – Route Discovery verified verified RDP: A -> D Signature by C Certificate C RDP: A -> D verified verified Again, at each step along the RDP request path, we validate the previous node’s signature, remove the previous node’s certificate and signature, record the previous nodes IP addy (e.g. AODV reverse path), sign the original message contents, append our own certificate, and forward broadcast the message. A B C D

ARAN – Route Setup Initial REP packet *Replies to first RDP packet* IP Address A Certificate D Nonce A Create Time Signature by D Initial REP packet REP: A->D verified verified verified Destination replies to first RDP packet received. Although this may not be shortest hop packet, it means RDPs don’t get modified en-route, allowing both signature process and avoiding hop count = 0 attacks by malicious nodes. Reply packet is effectively similar to initial RDP packet. A B C D *Replies to first RDP packet*

ARAN – Route Setup Intermediate REP Packet verified verified verified REP: A -> D Signature by C CertificateC REP: A->D verified verified verified verified A B C D

ARAN – Route Setup verified verified verified verified verified REP: A -> D CertificateB Signature by B REP: A->D verified verified verified verified verified A B C D

ARAN – Route Complete verified verified verified verified verified B C D

ARAN – Route Maintenance IP Address A IP Address D Nonce C Create Time Certificate C Signature by C ERR: A->D Potential problem: fabrication of ERR messages – at least malicious node cannot create ERR messages for other nodes. “A node that transmits a large number of ERR messages, whether the ERR messages are valid or fabricated, should be avoided.” A B C D Link broken!

Questions Conflict between small weight nodes, cryptography – is there any reason to implement ARAN? Any way to avoid centralized trust certificate server T? Key revocation issues… Sensor network security?