ITIS 6010/8010: Wireless Network Security Weichao Wang.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
On Security Study of Two Distance Vector Routing Protocols for Ad Hoc Networks Weichao Wang, Yi Lu, Bharat Bhargava CERIAS and Department of Computer Sciences.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Issues In Sensor Networks By Priya Palanivelu.
Yih-Chun Hu Carnegie Mellon University
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Centre for Wireless Communications University of Oulu, Finland
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Secure routing in multi-hop wireless networks (II)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
© 2007 Levente Buttyán Security and Privacy in Upcoming Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
Ad hoc Routing Protocols
ITIS 6010/8010 Wireless Network Security
A Survey of Secure Wireless Ad Hoc Routing
Routing.
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

ITIS 6010/8010: Wireless Network Security Weichao Wang

Secure Efficient Ad Hoc Distance Vector (SEAD) –Is based on DSDV –Use hash chain to accomplish authentication and avoid DoS Assumptions: –The diameter of the network is shorter than m hops –Use hash chains to authenticate route updates –The hash results are used in groups of m –New hash chains can be generated when old ones are finished

Very similar to SAODV: use hash chain to make sure a malicious node cannot decrement the distance vector Use sequence number to determine which group of hash values will be used for authentication Example –Node S generates a hash chain with length 1000, and network diameter is m. for sequence i, k = (1000 / m) – i, the node will use hash value h(km) to h(km+m-1)

In this way, we prevent the fake sequence number A node will verify the hash value before updating its routing table. It hashes again to match the increased distance metric. Why we try to reduce digital signature –Too much computation overhead –Can be used to conduct DOS attack

Advantage over SAODV –SAODV uses digital signature to protect the sequence number, but SEAD binds sequence number, hop metric, and hash chain together –We do not need to sign the final hash result every time Performance comparison to DSDV –Higher delivery ratio but longer delay –Higher packet and byte overhead

Ariadne: –On-demand protocol based on DSR –Based on TESLA to authenticate packets –Need loosely synchronized clocks

Intro of TESLA –Is a broadcast authentication protocol –Depend on clock synchronization and delayed disclosure –Every node generates a hash chain, and the previous hash value can be used to authenticate the later values –The node discloses the hash result at a determined interval –Use a not-published-yet hash value as key for symmetric encryption or MAC –The receivers can authenticate the packet later when the key is disclosed

Example –The clock synchronization error is Δ, longest end-to-end delay is t, node S will chose a key that will not be disclosed until t+2 Δ –The receiver will examine the key and make sure that it has not been disclosed. Otherwise, the packet can be generated by an attacker –The receiver buffers the packet until the key is disclosed to authenticate the packet

Basic Ariadne Route Discovery –Node S wants to locate a path to D, A to C in the middle –Want to enforce three features S and D can authenticate each other Both S and D can authenticate the intermediate nodes (maybe only one of S and D) No intermediate node is missing

–Both pairwise keys and TESLA keys are used S and D authenticate each other with pairwise key –The intermediate nodes can be authenticated by TESLA keys with delayed disclosure, but S has to trust D to authenticate all intermediate nodes Every intermediate node signs the route request Pair wise key between D and the intermediate nodes –Per-hop hashing to make sure no node is removed –Example: Ariadne using TESLA

Route Error with TESLA –A node C finds that the link CD breaks, so it sends a route error back to S with TESLA key authentication. This path will be used until delayed authentication is confirmed. (hint: TESLA uses delayed disclosure and authentication) –Question: if we already have pairwise keys, what is the advantage of using TESLA??

Summary –WatchDog + PathFinder: DSR –SAODV: Digital signature + Hash chain, AODV –SEAD: Hash chain, DSDV –Ariadne: Pairwise key + hash chain + delayed disclosure, DSR