1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
A Survey of Secure Wireless Ad Hoc Routing
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Yih-Chun Hu Carnegie Mellon University
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
The Zone Routing Protocol (ZRP)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Packet Leashes: Defense Against Wormhole Attacks
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian (Slides Courtesy: Sandeep Mapakshi CS 6910-ACIS – Project 6 Instructor: Prof. Leszek T. Lilien, Fall 2006 Department of Computer Science Western Michigan University)

2 Outline On-Demand Routing Protocols Rushing Attacks Rushing Attack Prevention Evaluation Conclusion

3 On-Demand Route Discovery A A A-B A-C A-C-E A-B-DA-B-D-G B G D E C A F H source Destination

4 The Rushing Attack On-demand routing protocols use duplicate suppression at each node: first ROUTE REQUEST that reaches a node is considered legitimate, next are discarded (all have the same identifier, higher identifiers denote new requests) Attacker scatters RREQ quickly throughout the network suppressing any later legitimate RREQ Initiator will be unable to discover any usable routes containing at least two hops An effective denial-of-service attack

5 Why is the Attack Possible? An attacker can send faster, by avoiding the delays that are part of the design of both routing and MAC (802.11b) protocols. Why Delay in ROUTE REQUEST forwarding ? In a MAC protocols using time division On-demand protocols generally specify a delay Remove these delays at both the MAC and routing layers? - more collisions Attacker can send at a higher wireless transmission level An attacker can take advantage of a wormhole, to create flood rushing attacks, use the wormhole to rush the packets ahead of the normal flow

6 Rushing Attack S D Slide courtesy: [2]

7 Rushing Attack Example ●A sends a ROUTE REQUEST

8 Rushing Attack Example ●A sends a ROUTE REQUEST ●B forwards the REQUEST without checking the signature, or otherwise rushes the REQUEST

9 Rushing Attack Example ●A sends a ROUTE REQUEST ●B forwards the REQUEST without checking the signature, or otherwise rushes the REQUEST ●C correctly processes the REQUEST, and forwards it later as a result

10 Rushing Attack Example ●A sends a ROUTE REQUEST ●B forwards the REQUEST without checking the signature, or otherwise rushes the REQUEST ●C correctly processes the REQUEST, and forwards it later as a result ●Since D has already heard a REQUEST from this discovery, D discards the REQUEST

11 Rushing Attack Example ●B rushes the REQUEST ●C forwards it later ●Since D has already heard a REQUEST from this discovery, D discards the REQUEST ●A discovers a path through B because B rushed the REQUEST

12 Rushing Attack Example Route discovery process under no attack B E D C A Route Query Route Reply

13 Rushing Attack Example Route discovery process under attack B E D C A Route Query Route Reply Attacker

14 Wormhole Attack Attacker records a packet at one location in the network, tunnels the packet to another location. Packets may be replayed from the far end of the wormhole. Puts attacker in a powerful position. It’s a replay so authentication does not help Applications of the Wormhole Attack Denial-of-Service Routing Disruptions Unauthorized Access

15 Routing Tree Adapted from Chris Karlof and David Wagner's WSNPA slides

16 Routing Adapted from Chris Karlof and David Wagner's WSNPA slides

17 Wormhole Attack Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel Adapted from Chris Karlof and David Wagner's WSNPA slides

18 Disrupted Routing Most packets will be routed to the wormhole The wormhole can drop packets or selectively forward packets to avoid detection Adapted from Chris Karlof and David Wagner's WSNPA slides

19 What Protocol s Are Vulnerable? On-demand unsecure (AODV, DSR) and secure (ARAN, Ariadne, etc) protocols Result: when under attack, the routing protocol will not be able to discover paths longer than 2 hops

20 Network Assumption Network links are bidirectional Ignore unidirectional links Ignore jamming attack Requires additional hardware Easier to detect Disregard attacks on MAC protocol MAC (Medium Access Control) ALOHA and Slotted ALOHA Medium-sized 50 ~ 500 nodes Clustering

21 Security Assumptions And Key Setup Fast authentication protocol Instantly-verifiable broadcast authentication Keys setup Broadcast authentication key are distributed in advance Powerful attacker Coordinated attacker

22 Secure Routing Requirements And Protocol Secure Neighbor Detection Secure route delegation Randomized ROUTE REQUEST forwarding Single-Hop? Gather n REQUESTS; Randomly Choose 1 Secure Neighbor Detection Original Routing Protocol yes no

23 Secure Neighbor Detection Neighbor Detection Two nodes detect a bidirectional link between themselves In Proactive routing protocol In Reactive routing protocol Requirements Sender-receiver can check that the other is within the normal communication range Node needs to hear Neighbor Request

24 Secure Neighbor Detection Three-round mutual authentication protocol S broadcasts a Neighbor Request packet R return a Neighbor Reply packet to S S sends a Neighbor Verification to B Short delay timing Within a maximum communication range neighbor Request broadcast neighbor reply senderreceiver neighbor verfication

25 Notation

26 Secure Neighbor Detection (cont.) Nonces η 1, η 2 freshness S R1R1 R2R2

27 Secure Neighbor Detection (cont.) Integration with an On-Demand Protocol A  * :REQUEST || Neighbor Request A B  A:Neighbor Reply B  A || Neighbor Request B A  B:Neighbor Verification A  B || Neighbor Reply A  B B  * :REQUEST || Neighbor Verification A  B || Neighbor Verification B  A

28 Secure Route Delegation Delegate neighbor to forward the Route Request packet To verify that both nodes of each adjacent node pair indeed believes to be a neighbor A received ROUTE REQUEST S  R || id M A = Σ M A =Sign(H(M A )) A  B:

29 Randomized Message Forwarding To minimize the chance that a rushing adversary can dominate all returned routes Randomized message forwarding Collects a number of REQUESTs Selects a REQUEST at random to forward The number of REQUEST packets collected The more the better? The algorithm by which timeouts are chosen Topology closer Geographically closer Randomly

30 Secure Route Discovery To secure any protocol using an on-demand Route Discovery protocol Secure Neighbor Detection Secure route delegation Randomized ROUTE REQUEST forwarding To limit the number of REQUESTs that traverse an attacker The nodes that don’t have n distinct path to the source of the REQUEST Choose a random timeout Two addition security optimizations Each REQUEST signed Use location information

31 Evaluation Simulation Evaluation Underlying protocol: Adriane HORS as broadcast signature 100 nodes 1000 m x 1000 m Random waypoint model Pause Time: 0, 30, 60, 120, 300, 600, 900 Workload: 5 flows 4 packets per second 64-byte packets

32 Overall Evaluation RAP adds significant costs Higher costs due to congestion at lower bit rates. RAP is designed to be used only when necessary Only when underlying protocol is unable to discover a working route Security Analysis Attacker needs to propagate ROUTE REQUEST from each ROUTE DISCOVERY from many locations. Wouldn’t do it if they considered due to intrusion detection

33 Conclusion Described the Rushing attack Presented RAP (Rushing Attack Prevention) RAP incurs higher overhead, but it can find usable routes when other protocols cannot work

34 [Backup Slides] Packet Delivery Ratio % of Offered traffic DSR 99.8% to 100% Ariadne 95% to 100% RAP 7.6% to 47.7% MAC-layer congestion Slide courtesy: [2]

35 [Backup Slides] Median Latency DSR and Ariadne zero mean latency RAP Congestion Waiting to forward a REQUEST Slide courtesy: [2]

36 [Backup Slides] Packet Overhead 5 flows has 5x as much overhead Reduces usefulness Overhead should reduce when congestion not an issue Slide courtesy: [2]

37 [Backup Slides] Introduction Wireless Ad hoc network a collection of mobile computers (or nodes) cooperate to forward packets dynamic topology self-organization

38 [Backup Slides] Introduction (cont.) Routing protocol Transport Subsystem Neighbor State Maintenance Database Maintenance Ad hoc network routing protocols Run in untrusted environments Provide resilience against misconfigured nodes

39 [Backup Slides] Routing Protocols Proactive routing protocol Table-Driven routing protocol Reactive routing protocol Source-Initiated On-Demand routing protocol Forward ROUTE REQUEST packets when needed

40 [Backup Slides] Comparison between Table-Driven Routing and On-Demand Routing Table-driven Routing On-demand Routing Availability of Routing information Immediately from Route Table After Route discovery Route updates Periodic advertisements When requested Routing overhead Proportional to size of network regardless of network traffic Proportional to number of communication nodes and increase with increased node mobility

41 References [1] Yih-Chun Hu,Adrian Perrig, David B.Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols”, Proceedings of the 2003 ACM workshop on Wireless security, San Diego, CA, USA. Available at: routing/wise2003.pdfhttp:// routing/wise2003.pdf [2] Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Tammy Nguyen. Available at: