SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Centre for Wireless Communications University of Oulu, Finland
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Applied Cryptography for Network Security
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Secure routing in multi-hop wireless networks (II)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
ITIS 6010/8010 Wireless Network Security
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign August, 2001 Presented by: Poonam Munshi

SECURITY-AWARE AD-HOC ROUTING (SAR) Need for Secure Routing - Motivation SAR – Protocol and Behavior Protocol Metrics Protection in SAR Implementation of SAR Performance Evaluation & Conclusion

NEED FOR SECURE ROUTING - MOTIVATION Problems in ad-hoc wireless networks –Lack of fixed infrastructure support –Frequent changes to network topology –Poor protection to protocol packets at physical layer –Network layer routing protocols are “cooperative” by nature Based on implicit ‘trust-your-neighbor’ relationships Susceptible to erroneous routing updates, replay attacks etc. SAR - Approach –Use different security attributes to improve the quality of the security of an ad-hoc route –Incorporate security levels of nodes into traditional routing metrics –Goal : Quantify the notion of trust Represent trust relationships explicitly by defining a suitable hierarchy of trust values Integrate the trust value of a node and the security attributes of a route to provide an “integrated security metric”

NEED FOR SECURE ROUTING - MOTIVATION Challenges –Ensuring data is routed through a secure route composed of trusted nodes –Security of the information in the routing protocol messages Example Scenario – Battlefield communication Transmission range Shortest route Secure route Private Officer General

SAR – PROTOCOL OVERVIEW Similar to policy-based routing protocols for QoS Protocol: –Basic protocol : On-demand protocol AODV –Embed security metric into the RREQ packet itself and change the forwarding behavior of the protocol w.r.t. RREQs –Source node : Specify desired level of security in the RREQ Broadcast the packet –Intermediate node : Process/forward the packet only if it can provide the required security or has the required authorization or trust level ; Otherwise drop the RREQ –If an end-to-end path with the required security found, the intermediate node or eventual destination sends a suitably modified RREP

SAR – BEHAVIOR OVERVIEW Route discovered by SAR may not be the shortest route in terms of hop-count SAR finds a route with a ‘quantifiable guarantee of security’ If one or more routes satisfying the required security attributes exists, SAR finds the shortest such route : All nodes on the shortest path (in terms of hop- count) satisfy the security requirements Optimal route: All nodes on the shortest path (in terms of hop- count) satisfy the security requirements Drawback: –If no path with nodes that meet the RREQ’s security requirements exists, SAR fails to find a route even though the network may be connected

SAR – PROTOCOL METRICS Explicit representation of trust levels using a simple hierarchy that reflects organizational privileges Trust hierarchy –Associate a number with each privilege level Numbers reflect security/importance/capabilities of mobile nodes and also of the paths –QoP (Quality of Protection) bit vector Trust level or protection should be immutable – –Keys can be distributed a priori, or a key agreement can be reached by some form of authentication – –Encrypt the portion of the RREQ and RREP headers that contain the trust level.

SAR – PROTOCOL METRICS Secure Ad Hoc Routing – Properties and Techniques used to guarantee these properties PropertyTechnique TimelinessTimestamp OrderingSequence Number Authenticity Password, Certificate AuthorizationCredential Integrity Digest, Digital Signature ConfidentialityEncryption Non-repudiation Chaining of Digital Signatures

PROTECTION IN SAR PROTOCOL Trust Hierarchy –Protocol User Trust Level User Identity –Nodes and users can be forced to respect trust hierarchy using cryptographic techniques, e.g., encryption, public key certificates, shared secrets – –Outsider attacks Threshold cryptography, key sharing, etc. can be used SAR uses simple shared secret to generate a symmetric encryption/decryption key per trust level. – –Insider Attacks Compromised users within a protection domain or trust level Secure transient associations, tamper proofing etc. can be used AAA

PROTECTION IN SAR PROTOCOL Threats to Information in Transit – – Interruption – –Interception and Subversion – –Modification – –Fabrication Replay Attacks: – –SAR uses sequence numbers and timestamps Passive Attacks: – –Examples: covert channels, traffic analysis, sniffing to compromise keys – –Using a suitable MAC layer encryption protocol for protection against sniffing/eavesdropping

SAR - IMPLEMENTATION SAODV ( Security-aware AODV): – –on-demand route discovery using flooding, reverse path maintenance in intermediate nodes, and forward path setup via RREP messages – – RREQ (Route REQuest) packet: RQ_SEC_REQUIREMENT : the security requirement – –Set by the sender; does not change during route discovery phase – –Simple integer values or bit vector RQ_SEC_GUARANTEE : the security guarantee – –Indicates the maximum level of security afforded by all nodes on the discovered path – –Updated at every hop during the route discovery phase If the application requested integrity support, a new field to store the computed digital signatures added to the RREQ – –RREP (Route REPly) packet : RQ_SEC_GUARANTEE : the security guarantee – –Copied from RREQ and sent back to sender to indicate security level over whole path

SAR - IMPLEMENTATION SAODV Route Discovery – –Source node : Set the RQ_SEC_REQUIREMENT field in the RREQ packet Broadcast the packet just as in AODV – –When an intermediate node receives an RREQ First check if the node can satisfy the security requirement indicated in the packet If yes, update the RQ_SEC_GUARANTEE field; forward to its neighbors If no, drop the RREQ packet – –When RREQ arrives at the destination Indicates the presence of a path from the sender to the receiver that satisfies the security requirement specified by the sender Copy RQ_SEC_GUARANTEE from RREQ into RREP Send the RREP back to sender as in AODV

SAR - IMPLEMENTATION – –When an intermediate node receives an RREP The RREP packet arrives at an intermediate node in the reverse path Update its routing table Record the new RQ_SEC_GUARANTEE value – –This value indicates the maximum security available on the cached forward path. – –When a trusted intermediate node answers a RREQ query using cached information Compare RQ_SEC_GUARANTEE of the cached route to the security requirement in the RREQ packet Sent back RREP containing cached path information only if the forward path can guarantee enough security

EXAMPLE SCENARIO - REVISITED Example Scenario – Battlefield communication – –Embed the rank of the node as a metric in route negotiation (establish routes that avoid all privates) – –If no route found, the generals may decide to set up a route that can support 128-bit encryption Transmission range Shortest route through private Secure route through officers only Private Officer General

PERFORMANCE EVALUATION & CONCLUSION SAR enables the discovery of secure routes in a mobile ad hoc environment. Though not optimal, routes discovered by SAR come with “quality of protection" guarantees. The processing overheads in SAR are offset by restricting the scope of the flooding for more relevant routes, providing comparable price/performance benefits. Its integrated security metrics allow applications to explicitly capture and enforce explicit cooperative trust relationships. SAR also provides customizable security (e.g., encryption for confidentiality etc.) to the flow of routing protocol messages themselves The techniques enabled by SAR can be easily incorporated into generic ad hoc routing protocols