Amar B. Patel , Shushan Zhao

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
P2P Over MANET An Introduction to Mobile Resource Sharing.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Traffic Analysis Prevention Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Taiming Feng, Chuang wang, Wensheng Zhang and Lu Ruan INFOCOM 2008 Presented by Mary Nader.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
Anonymous Communications in Mobile Ad Hoc Networks Yanchao Zhang, Wei Liu, Wenjing Lou Presenter: Bo Wu.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Presented by Edith Ngai MPhil Term 3 Presentation
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Grid Computing Security Mechanisms: the state-of-the-art
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Security&Privacy Considerations for IP over p OCB
VANET.
Golden Linear Group Key Agreement Protocol
Zueyong Zhu† and J. William Atwood‡
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Anonymous Communication
Location Cloaking for Location Safety Protection of Ad Hoc Networks
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Information and Network Security
CSE 4905 Network Security Overview
Net 435: Wireless sensor network (WSN)
0x1A Great Papers in Computer Security
Mobile ad hoc networking: imperatives and challenges
Security through Encryption
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Anonymous Communication
Multi-party Authentication in Web Services
Security Of Wireless Sensor Networks
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
An Improved Novel Key Management Protocol for RFID Systems
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Protocols.
Cryptography and Network Security
Anonymous Communication
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Protocols.
Presentation transcript:

Amar B. Patel , Shushan Zhao 60-564 Assignment #1 Protecting Privacy in Mobile Ad-hoc Networks Amar Bahadur Patel , Shushan Zhao October 23rd ,2007 School of Computer Science University of Windsor Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Note Due to small time of presentation we will not discuss all the details of the assignments#1 Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Outline of the Presentation Introduction Back ground study Privacy threats in MANET,s Overview of a MANET system with Privacy Protection A Basic Scheme to Implements the System Analysis and Improvements of the Scheme Conclusion Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Introduction In a mobile ad hoc network (MANET),nodes join or leave the network freely, and the nodes may move on a consistent basis. the network does not have a fixed structure and topology. Moreover, the nodes communicate via wireless radio frequency channel that is exposed to all adversaries. Due to these specific characteristics of MANETs, security and privacy face much difficulty in this environment. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Background study A great deal of research in literature has focused on providing confidentiality, integrity, and authenticity of data in MANETs, but privacy and anonymity remains an open problem. Jiang proposed to prevent traffic analysis in ad hoc networks by using traffic padding, i.e., generating dummy traffic into the network This approach did not aim to hide the identifiers of communicating nodes and so cannot completely prevent traffic analysis. They also explored the use of mixes in ad hoc networks by designing a mix discovery protocol that allows communicating nodes to choose mix nodes at run time. The second approach is not an anonymous routing protocol and also vulnerable to the compromise of mix nodes. Some previous papers also discussed about designing anonymous communication protocols for MANETs. The essence of anonymous communications is to hide sender and/or receiver's identities from outside observers. As a result, adversaries cannot correlate eavesdropped traffic information to actual network traffic patterns so that traffic analysis attack can be efficiently defeat. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Problem Continue……. Zhang propose a scheme for anonymous communication in MANETs. The scheme is based on an anonymous neighborhood authentication protocol that allows neighboring nodes to authenticate each other without revealing their identities. In this scheme, each node stores a set of pseudonyms of itself. When two nodes, A and B, communicate, they first use pseudonyms to set up a shared session key in this way: We think that this scheme is not strong enough to protect privacy in MANETs. The source node has to use real identity of destination when sending out a packet. The adversary can collect enough real identities and then try to match them to anonymous identities and link-ids with assistance of traffic analysis on payload. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Proposed solution We propose a solution to conceal real identities end to end in communication. We propose a MANET system that takes into consideration the privacy of the identity, location, and moving track of a node. We propose to use cluster-based structure to achieve a scalable privacy-protecting MANET system. Basically the system is divided into multiple clusters according to geographical or administrative relationships. Figure 1. The structure of a Cluster-based MANET. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

A Scheme to Implement The System Anonymous Identities and Communication inside a Cluster Design a set of anonymous identities and distribute them among the cluster members. Since the membership of a cluster is rather stable, we have time to distribute the anonymous identities off-line and maybe update them periodically E.g. A Pseudonym Hash-map Table Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

A Scheme to Implement The System Anonymous Identities and Communication between Clusterheads Since clusters do not communicate regularly, and they need to communicate only in an ad hoc way, we cannot expect them to share the anonymous identity table in advance Minimum data exchange and hide real identities on the fly ElGamal encryption scheme Determine and distribute <G, q, g> and a one-time key k Identity Secret Key: k Encrypted identities: h= r: random Identity Public Key: Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

A Scheme to Implement The System Anonymous Identities and Communication across Clusters Encapsulated packets are used in case of forwarded packets from a non-head node inside one cluster to another non-head node inside another cluster. The inner packet contains the real identity of a non-head node in the destination cluster. Destination clusterhead decrypts and translates the real identity into intra-cluster anonymous identity before forwarding the packet to destination node. Anonymous ID of Destination Clusterhead ID Public Key Real ID of Destination Node Message for Destination Node Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Improvement and Discussion Our scheme is only a proof-of-concept system. Much room is left for improvement. To improve the integrity of identities used in inter-cluster communications, we can use idea of [4] which is proposed originally for untraceable RFID tags. In their scheme, the identity is accompanied by a certificate. The certificate and the identity are bound together cryptographically. The identity cannot be forged unless the adversary can also forge a certificate. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Improvement and Discussion A CA private-public key pair: (S, T) A key generation pair: Certificate of a Node: Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao CONCLUSIONS In this paper, we analyze the privacy issues that threat the MANETs Particularly, to counter the identity exposure and traceability problems existing in MANETs, we propose a system architecture and implementation mechani-sms to protect this kind of privacy. The system architecture is scalable and implemen-tation technologies are feasible. Besides applicability to MANETs, the scheme can also be applied to wired networks that have concerns of privacy threats. Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao REFERENCES [1] Yanchao Zhang; Wei Liu; Wenjing Lou; Anonymous communications in mobile ad hoc networks INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE Volume 3, 13-17 March 2005 Page(s):1940 - 1951 vol. 3 [2] Jacobsson, M.; Niemegeers, I.; Privacy and Anonymity in Personal Networks Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on 8-12 March 2005 Page(s):130 - 135 [3] F. D¨otzer, “Privacy issues in vehicular ad hoc networks,” in Proc. of the Workshop on Privacy Enhancing Technologies (PET), 2005. [4] Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros Untraceable RFID Tags via Insubvertible Encryption Proceedings of the 12th ACM conference on Computer and communications security CCS '05 November 2005, ACM Press Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao

Amar B. Patel , Shushan Zhao Thanks QUESTIONS? Wednesday, January 16, 2019Wednesday, January 16, 2019 Amar B. Patel , Shushan Zhao