An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Authors: Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra,
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Internet Networking recitation #4
Lei Chen and Wendi B. Heinzelman , University of Rochester
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
A Routing Protocol for WLAN Mesh
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba Sources: Computer Communications, 28(2), pp , 2005 Reporter: Chun-Ta Li ( 李俊達 )

2 Outline  Introduction  Security issues in ad hoc routing  Trust management system  A secure distributed anonymous routing protocol (SDAR)  Security analysis  Conclusions  Comments

3 Introduction  Mobile ad hoc networks (MANET) Network functions are carried out by all available nodes  Packet forwarding  Routing  Network management Wireless radios and a peer-to-peer network model Visualized for crisis solutions or civilian applications

4 Introduction (cont.)  Constraints in mobile devices Low power microprocessor Small memory Limited bandwidth Short battery life Frequent network topology changes  Anonymous routing Hide the location and relationships of the communication nodes

5 Security issues in ad hoc routing  Passive attacks eavesdropping discover some valuable information disclose the relationship between nodes  Active attacks replaying, modifying or deleting routing packets malicious updates the routing table routing loops and network congestion external attacks and internal attacks

6 Security issues in ad hoc routing (cont.)  Security requirements of this paper SDAR (Secure Distributed Anonymous Routing ) protocol is secured against passive and active attacks, but not against Denial-of-Service attacks SDAR maintains the anonymity of the sender and receiver SDAR is able to identify malicious nodes and avoid using them to establish routes

7 Trust management system  Purpose of trust management system relaying data traffic identify the malicious nodes avoid using malicious nodes during the route establishment take malicious nodes out of the network  Define the trust level in a node as a cumulative value computed by each of its direct neighboring nodes community: the evaluated node and neighboring nodes

8 Trust management system (cont.)  community management central nodes neighboring nodes community track and listen neighboring  central: . HELLO message {public key of neighboring node} (broadcasting periodically) . stores the public key . removes nodes if it does not receive the HELLO message for some time leave node

9 Trust management system (cont.)  community key management Three trust levels for neighboring nodes  lowest trust level: trust values is δ1  medium trust level: trust value is δ2 (MTLCK)  high trust level: trust value is ψ (MTLCK, HTLCK) updates the community key when a node ’ s trust level goes up or down or a node leaves the community community key will be encrypted with the public key of intended neighboring node during distribution // MTLCK: Medium Trust Level Community Key // HTLCK: High Trust Level Community Key

10 Trust management system (cont.)  Identification of nodes ’ malicious behavior by overhearing the message from next node to next-next node  Malicious Dropping  Malicious Modification  Trust-based distributed route selection mechanism specifies the trust level requirement in initial message intermediate node will propagate the message only to selected neighboring nodes depending on the source node requested trust level

11 A secure distributed anonymous routing protocol (SDAR)  Three phases: Path discovery phase Path reverse phase Data transfer phase  Assumptions Bi-directional links Enough computation power A trusted CA Each node holds only one IP address for its communication Some malicious nodes  Notations

12 A secure distributed anonymous routing protocol (cont.)  Path discovery phase Sending node S and receiving node R None of intermediate nodes can discover the identity of S and R S triggers this phase by sending path discovery message to all nodes within its wireless transmission range Path discovery message open part Encrypted with community key

13 A secure distributed anonymous routing protocol (cont.)  Path discovery phase Each node keeps an internal table for mapping the session  TPK, random number, session key and ancestor node Step 1: check if the message has already been received from other nodes within its wireless transmission range using the TPK as the unique identifier for the message Step 2: check if the node is the sender ’ s intended next hop by finding the corresponding community key in its community key lists. If key is found then decrypt the message

14 A secure distributed anonymous routing protocol (cont.)  Path discovery phase Step 3: try to decrypt E PKR (ID R, K S, PL S ) Step 4: if the node is NOT the destined receiver  Encrypted (IDi, Session key K i, SN Path_IDi and signature of received message) with encrypted key TPK and forward to neighbors whose trusted levels meets the trust requirement

15 A secure distributed anonymous routing protocol (cont.)  Path discovery phase Step 5: if the node is the destined receiver  Use the length of padding PLS to find out the offset of the forth part and get session keys of all nodes along the path  Put all ids, session keys in one message  Send the message to the first node in the reverse path

16 A secure distributed anonymous routing protocol (cont.)  Path reverse phase Use SN Session_IDi to retrieve the key for session, removes one encryption layer and forwards the message to the next node on the reverse path Add the ID of the successor node into the mapping table When S receives the message, it decrypts the message and passes the information about all intermediate nodes (i.e. the route) to the higher application  Data transfer phase Use the shared session keys of the intermediate nodes to make the layer encryption for the data and each intermediate node just decrypts one encryption layer and forwards the message to the next node according to the ID of the next node

17 A secure distributed anonymous routing protocol (cont.)  Finding malicious dropping behavior Path discovery phase  overhear the message with the same TPK from the neighboring node Path reverse and data transfer phase  SN Session_ID i and SN Session_ID i-2 instead of the TPK  Overhear the message carrying the session key ID of the node ’ s next hop from the node node ID i node ID i-1 node ID i-2 overhear

18 A secure distributed anonymous routing protocol (cont.)  Finding malicious modification behavior (path reverse phase) Node i-1 as an example 1.Decrypt message to get two SNs 2.Separate N i-1 from M i-1 and check H Ki-1 (N i-1 ) is equal or not, if it is not, Node i must have done malicious modification on M i-1 3.Get rid of SN Session_IDi and H(M i-3 ) from N i-1 and store H(M i-3 ) locally, then decrypt the rest of N i-1 with K i-1 and send the result M i-2 to Node i-2 4.Overhear M i-3 from Node i-2 by checking H(M i-3 ) is equal or not

19 Security analysis  Theorem 1. SDAR is secured against passive and active attacks, but not against Denial-of-Service attacks  Theorem 2. SDAR maintains the anonymity of the sender and receiver  Theorem 3. SDAR is able to identify malicious nodes and avoid using them to establish routes  Theorem 4. SDAR is able to establish a route matching certain trust requirements if enough nodes with qualifying trust value exist between the source and destination

20 Conclusions  In this paper, authors present a secure distributed anonymous routing protocol for MANET, called SDAR.  Some advantages can be summarized as follow Non-source-based routing Flexible and reliable route selection Resilience against path hijacking

21 Comments  Misrecognize malicious dropping behavior tamper TPK or SN Session_ID (open part) Solution: mutual authentication or encryption  It can ’ t prevent malicious modification behavior in path discovery phase (malicious dropping the message)  All neighboring nodes of the sender in collusion would find the sender and they can try to guess the session key K S for attacks