Some Issues in MANET, Wireless & Cellular Security/Privacy

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Security in Mobile Ad Hoc Networks
SPLASH Project INRIA-Eurecom-UC Irvine November 2006.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
DARPA Security Mini-task Naveen Sastry. Groups Involved BBN SRI UMass / UMich / U. Arizona UC Berkeley.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Communication in heterogeneous ad hoc grid Shan Natarajan.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Vision: A Robust Architecture for a Diverse Mobile Wireless Internet.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Constraints on Automated Key Management for Routing Protocols
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Presented by Edith Ngai MPhil Term 3 Presentation
Overview of Wireless Networks:
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MOBILE AD-HOC NETWORKS
Intrusion Tolerance for NEST
Wireless Sensor Network (WSN)
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Wide Area Network.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Algorithms for Big Data Delivery over the Internet of Things
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Lecture 45 Review of Lectures Dr. Ghalib A. Shah
Differences between WSN & MANET By: Dana Alotaibi.
Authentication and handoff protocols for wireless mesh networks
SCONCE: Secure Computing and Networking Center
Public-Key, Digital Signatures, Management, Security
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
EEL 6935 Wireless Ad Hoc Networks
Aggregation.
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Some Issues in MANET, Wireless & Cellular Security/Privacy Gene Tsudik UC Irvine gts_AT_ics.uci.edu

Outline WSNs: MANETs: Cellular: Survivability & Intrusion Resilience Secure Scalable Initialization Graceful Degradation MANETs: Oblivious Routing Location-based Addressing Cellular: Secure Association Anonymous Mobility

WSNs Survivability & Intrusion Resilience Not all sensors network; many don’t Collect data, wait for pickup Irregular pickups + possibly long intervals Hostile environment -- intrusion/compromise possible How to protect collected data? Storage, Computation and Bandwidth constraints Secure Scalable Initialization Sensors manufactured in large quantities Key pre-distribution not always viable How to quickly and securely “pair” groups of sensors? Scalability? Usability? Graceful Degradation Strong security can kill sensors When death is near, is strong security important? How to gracefully degrade/relax security services? What metrics to use when degrading? Whither RFID/Sensor hybrid?

MANETs Oblivious Routing Location-based Addressing Fixed node population Nodes move, topology changes Hostile environment How to protect topology (even from insiders) But keep security Location-based Addressing Nodes don’t have identities Node instances known by current location Node instances must be authentic How to keep node behavior (movements) private? Most routing protocols can’t hack it..

Cellular (Wireless Devices) Secure Association/Pairing Heterogeneous devices No PKI, no history Insecure wireless medium How to establish a secure channel? Human-as-a-limited-side-channel Many techniques proposed, usability uncertain! Roaming with Privacy Not a research challenge, just an annoying problem