Presentation is loading. Please wait.

Presentation is loading. Please wait.

TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.

Similar presentations


Presentation on theme: "TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004."— Presentation transcript:

1 TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004

2 2 Outline  Introduction  Framework of Truman (TRUsted MANETs)  Trust model for Truman  Routing operations in Truman  Analysis  Conclusion and future work

3 3 Introduction  Mobile Ad Hoc Networks (MANETs) No fixed infrastructure Self-organized multi-hop routing among nodes Nodes with high mobility Underlying wireless communication medium Frequent link layer errors Vulnerable to kinds of attacks

4 4 Applications of MANETs  Personal area networking  Meeting rooms  Disaster relief  Battlefield operations  High Security Requirements

5 5 Previous Security Solutions for MANET  Secure routing protocols may perform digital signature authentication at each routing message huge overhead  Key management mechanisms usually need a super-trusted third-party to issue certificates destroy the self-organization nature of MANETs

6 6 Basic Idea of Truman  A secure routing protocol for MANETs Make use of trust relationships among nodes Design a trust model derived from subjective logic Need not sign and verify digital signature at each routing message  Cooperate with a self-organized key management mechanism, such as some threshold solutions More scalable and robust

7 7 Framework of Truman

8 8 Review of Our Trust Model  Use Opinion to represent trust  Discounting Combination: Combine trusts along one path  Consensus Combination: Combine trusts from several paths  Mapping from evidence space to opinion space: p : positive evidences n : negative evidences

9 9 Routing Operations in Truman  Trust Recommendation  Route Table Extension  Trust Judgement  Trust Update  Routing Messages Extensions  Trusted Routing Discovery

10 10 Trust Judgement b – belief d – disbelief u – uncertainty 0.5 – threshold bduActions >0.5Request and verify digital signature >0.5Distrust a node till next certificate renewal >0.5Trust a node and continue routing ≤0.5 Request and verify digital signature

11 11 Trust Update  Update trust from local evidences Successful Communication  Positive events: p++ Failed Communication  Negative events: n++  Update trust from trust combination Combination from different recommendations  Trust update algorithm T=WeTe+WcTc Usually We>Wc  Update fashion Periodical update if high packets frequency On-demand update if lower packets frequency

12 12 Routing Messages Extensions  Add such fields into original routing messages Trust information, or Digital signature information  RREQ  TRREQ  RREP  TRREP  Message structure: {original routing information, trust information/signature information}

13 13 Trusted Routing Discovery: Scenario I-Beginning of Truman  Pre-operations: Each node in this network has generated its own {secret, public} key pair and obtained the public keys of other nodes for further usage of digital signature.  Each node ’ s opinion towards others is (0,0,1), which means total uncertainty of other nodes ’ trustworthiness.

14 14 Trusted Routing Discovery: Scenario I-Beginning of Truman (con ’ d)  A broadcasts RREQ to discover C  B is uncertain about A  request A to sign itself  A unicast {RREQ} A  B verifies it using P A. If pass, broadcast {RREQ} B  C has P B, verify it and reply {RREP} C  B has P C, verify it and forward {RREP} B  A has P B, verify it and begin data communication

15 15  During the initialization period, nodes perform digital signing and verification at each routing message  If a node A has passed B ’ s verification, B will update its local route table (route path and trust value) in a certain update fashion.  After first routing communication, the opinions are all changed to (0.33,0,0.67)  Still high computation overhead in the beginning. Trusted Routing Discovery: Scenario I-Beginning of Truman (con ’ d)

16 16 Trusted Routing Discovery: Scenario II-A Stable Truman S N1 N2 D

17 17 Performance Analysis  Communication overheads can be sharply reduced by avoiding signature generation and verification at each routing message.  Bandwidth overheads can be largely reduced because of replacing 1024/2048 bit signatures to simple trust values.

18 18 Security Analysis  If no misbehavior, trust value will keep increasing.  If an external malicious node, it will at once be denied due to not providing valid signature.  We only consider to prevent external attacks.  Internal attacks can be eased through certificates renewal.

19 19 Conclusion and Future Work  Truman is a trusted MANET which employs two types of security solutions A trusted routing protocol A self-organized key management mechanism  Light computation overheads and a certain security level guarantee.  Perform simulation to proof it.

20 Q&A Thank You!


Download ppt "TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004."

Similar presentations


Ads by Google