Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Ad Hoc Network.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ordering in Time: A New Routing Approach for Wireless Networks Stephen Dabideen and J.J. Garcia-Luna-Aceves Department of Computer Engineering University.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003

Outline Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Conclusion Research Plan and Future Work

Now Come to: Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Research Plan and Future Work Conclusion

What is Ad Hoc Network A kind of network without fixed infrastructure such as base stations or access points, which performs communications through wireless media Wireless applications in: Military Operations Disaster Relief Meeting Room Setup for Conference Personal Area Networking

Characteristics of Ad Hoc Networks No fixed infrastructure Each node is a router Multi-hop routing by nodes cooperation Self-organization nature High mobility Prone to be attacked

Routing Protocols for Ad Hoc Networks AODV: -Ad Hoc On-Demand Distance Vector Protocol DSR: -The Dynamic Source Routing Protocol DSDV: -Destination-Sequenced Distance Vector Protocol

Overview of AODV Discover routes when needed Mainly two types of routing messages: RREQ: Route Request RREP: Route Reply Fixed-length messages Only one mutable field: Hop Count

Route Discovery in AODV RREQ RREP Broadcast S D

Now Come To: Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Conclusion Research Plan and Future Work

Security Requirements in Ad Hoc Networks Confidentiality Authenticity Integrity Availability Non-repudiation Access Control

Attacks to Ad Hoc Networks Attack MethodMotivation/ResultInfluence to Security Services EavesdroppingObtain contents of messagesLoss of Confidentiality MasqueradingImpersonate good nodes Routing Redirection Routing table poisoning Routing Loop, etc. Loss of Authenticity ModificationMake a node denial of service Obtain keys, etc. Loss of Integrity TunnelingAttract traffic Routing Redirection Loss of Confidentiality and Availability FloodingDenial of ServiceLoss of Availability DroppingDestroy normal routing progressLoss of Non-reputation and Availability Replaying/DelayingDestroy normal routing progress Destroy normal data transmission Loss of Access Control and Integrity

Common Solutions for Security Often assume A trusted authority to issue certificates. A centralized server to monitor the networks. A secret association between certain nodes. Disadvantages Destroy the self-organization nature of ad hoc networks. Limit the mobility of nodes. Single point of failure Less of efficiency and availability

Self-Organized Solutions for Security Properties Authenticate each other in a self-organized way Often issue certificate of a public key by nodes cooperation Often need node monitoring mechanism Disadvantages Need at least k neighbors to cooperate Monitoring mechanism is difficult to implement and is performance-consuming

Current Issues in Ad Hoc Networks Lack of security consideration Centralized server or trusted third parties destroy the self-organization nature Pure cryptographic solutions bring high overhead Current self-organized solutions lose flexibility

Our Solutions and Design Goals Design a suitable decentralized trust model that can be used for the security solutions of ad hoc networks. Apply this trust model to design a flexible self- organized key management scheme. Apply this trust model to design a secure and flexible self-organized routing protocol with lower overhead. Demonstrate the principle of the trust model and the security advantages of the resulting ad hoc networks.

Now Come To: Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Research Plan and Future Work Conclusion

Trust Model for Ad Hoc Networks Overview of trust theory Trust is a basic aspect of human life. Trust is regarded as a measurable variable. Trust theory has been applied into the fields of E-Commerce Organization of nodes in ad hoc networks is similar as human society Apply trust theory to secure ad hoc networks

Previous Trust Models Direct and recommendation trust model Continuous value to represent trust Basis of many other trust models Recommendation protocol model Focus on the exchange of trust information Dempster-Shafer Theory based model Upper and lower bound pair to represent trust Trust matrix to represent trust relationship Combine two matrices using Dempster-Shafer theory

Previous Trust Models (Con’d) Model using Fuzzy Logic Trust matrix to represent trust relationship Fuzzy logic to verify transactions Fuzzy logic to combine trust matrices Model using Subjective Logic Use Opinion to represent trust Opinion includes belief, disbelief, uncertainty Combine trust using subjective logic

Comparison of Trust Models Single trust value vs. Opinion Opinion with belief, disbelief and uncertainty can express more information Fuzzy logic vs. Subjective logic Fuzzy logic operates on certain measures about fuzzy propositions Subjective logic operates on uncertain measures about crisp propositions

Comparison of Trust Models (Con’d) Shafer theory vs. Subjective logic Both introduce uncertainty No need to set upper or lower bounds of trust described in Shafer theory

Design Issues of Trust Model Definition of Trust Representation of Trust Combination of Trust Exchange of Trust Information

Our Trust Model Use ‘ Opinion ’ to define and represent trust Combine trust opinions using subjective logic Define a trust recommendation protocol to exchange trust information

Definition and Representation of Trust Opinion: a three-dimensional metric The opinion about the trustworthiness of x, denoted by ω x, is the triple defined by: b(x) represent belief: probability of believing x. d(x) represent disbelief: probability of disbelieving x u(x) represent uncertainty: probability of uncertainty about x’s trustworthiness

Definition and Representation of Trust (Con’d) Property of Opinion: b, d, u is in [0,1] b+d+u = 1 Opinion ω x (0.4,0.1,0.5) can be represented in the right figure.

Combination of Trust Discounting Combination Combine trusts along one path Combine Consensus Combination Combine trusts from several paths Combine

An Example of Combining Trust A want to know B ’ s trustworthiness

Trust Recommendation Protocol Exchange trust information Three types of message: TREQ: Trust Request TREP: Trust Reply TWARN: Trust Warning Message structure

Our Trust Model vs. Subjective Logic Trust Model Simplify the representation of trust, which is more suitable for ad hoc networks Propose a trust recommendation protocol to exchange trust information Handle the dynamic of trust which is not mentioned in subjective logic

Now Come To: Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Research Plan and Future Work Conclusion

Assumption of Our Trusted Routing Protocol Ability to recover node ’ s neighbors. Reliability of broadcasting one-hop messages Uniqueness of node ’ s ID Capability of monitoring behaviors of one-hop neighbors Key management has been done before

Node Model One node has an opinion about others Each node maintains a trust table. For Example, A ’ s trust table is: Initial opinion of a node in others ’ eyes is (0,0,1)

General Framework

Cryptographic Technologies Use cryptographic schemes to do routing in the beginning of this network Adopt ideas in SAODV [42] Digital signature: authenticate the non- mutable fields of the messages Hash chains: secure the only mutable field ‘ hop count ’

Overview of Trusted Self-Organized Routing Protocol Effective when trust relationships have been established among most nodes Based on AODV routing protocol Criteria to determine whether a node can be trusted or not is: belief≥0.5, disbelief<0.5, uncertainty<0.5 Nodes cooperate to decide a opinion

Trusted Routing Discovery

Trust Update Algorithm Each value in a opinion is logically divided into 5 levels. Every 0.25 is one level. Successful verification for ten times: belief+=0.25, disbelief-=0.125, uncertainty-=0.125 Failed verification for each time: belief-=0.125, disbelief+=0.25, uncertainty-=0.125 No verification during expiry time belief-=0.375, disbelief+=0.125, uncertainty+=0.25

Trust Update Algorithm (Con’d) If in opinion A to B, belief 1 Opinion(A  B) will be changed to (0,1,0) Node A broadcast this opinion using TWARN message Neighbors will re-calculate the opinion using trust combination algorithm B will be denied from A ’ s communication

Trusted Key Management Use trust model into key management Advantages: Self-organization Flexible: no limitation of at least k neighbors Lower overhead

Analysis Performance is increased No need to perform cryptographic calculations for every packet  lower overhead Security is enhanced Combination of trust model, cryptographic schemes and monitor mechanism More reasonable and flexible Good nodes who become bad will be denied from network eventually Bad nodes who turn to good will be allowed accessing network again soon

Now Come To: Introduction to Ad Hoc Networks Motivation and Design Goals Trust Model for Ad Hoc Networks Trusted Self-Organized Routing Protocol Conclusion Research Plan and Future Work

Conclusion A promising idea to apply trust model to secure ad hoc networks Node uses ‘ opinion ’ to judge if another node is trustable Nodes cooperate to obtain a more accurate opinion Trusted routing protocol is Self-organized Lower-overhead More reasonable More secure More flexible

Research Plan and Future Work A better trust combination algorithm A better way to apply trust model into key management Study monitor or intrusion detection issues Improve trusted routing protocol to make it prevent or stand more attacks A detailed simulation evaluation using NS-2 or Glomosim simulators

Q&A Thank you !