Security Issues in Mobile Ad hoc Networks

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Security in Mobile Ad Hoc Networks
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Centre for Wireless Communications University of Oulu, Finland
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Packet Leashes: Defense Against Wormhole Attacks
Internet Networking recitation #4
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
A Survey of Secure Wireless Ad Hoc Routing
Presentation transcript:

Security Issues in Mobile Ad hoc Networks Sudipto Das BCSE – IV, Roll – 02892 Department of Computer Science & Engineering, Jadavpur University, Kolkata – 32

Presentation Outline Mobile Ad hoc Networks - Overview Challenges in Securing MANETs Ongoing Research in Securing MANETs Conclusion

Mobile Ad hoc Networks (MANETs) - Overview MANET is a self-configuring network of mobile nodes connected by wireless links—the union of which form an arbitrary topology Individual nodes act as routers - cooperate to forward both its own traffic as well as its neighbors traffic Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural or human-induced disasters, military conflicts, emergency medical situations etc Such a network may operate in a standalone fashion, or may be connected to the larger Internet - All these features have helped MANETs gain popularity in the last decade

MANETs: Operation Internet C B D E A E F Gateway Stand-alone MANET After one of the nodes is configured as a gateway, the entire network is connected to an external network like Internet Stand-alone MANET

Presentation Outline Mobile Ad hoc Networks - Overview Challenges in Securing MANETs Ongoing Research in Securing MANETs Conclusion

Challenges in Securing MANETs The salient features of ad hoc networks pose both challenges and opportunities in achieving these security goals - use of wireless links renders a MANET susceptible to link attacks ranging from passive eavesdropping to active impersonation, message replay, and message distortion - to achieve high survivability, ad hoc networks should have a distributed architecture with no central entities - due to dynamic nature of MANETs, an a priori trust relationship between the nodes cannot be derived. It is desirable for the security mechanisms to adapt on-the-fly to these changes - a MANET may consist of hundreds or even thousands of nodes. Security mechanisms should be scalable to handle such a large network.

Challenges in Securing MANETs Security in MANET is an essential component for basic network functions like packet forwarding and routing - network operation can be easily jeopardized if countermeasures are not embedded into their design To secure an ad hoc network, the following attributes may be considered: - Availability - Confidentiality - Integrity - Authentication - Non-repudiation

Challenges in Securing MANETs Security exposures of ad hoc routing protocols are due to two different types of attacks: - Active attacks through which the misbehaving node has to bear some energy costs in order to perform some harmful operation, and - Passive attacks that mainly consist of lack of cooperation with the purpose of energy saving. Nodes that perform active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious. Nodes that perform passive attacks with the aim of saving battery life for their own communications are considered to be selfish Selfish nodes can severely degrade network performances and eventually partition the network

Challenges in Securing MANETs - Wormhole Attacks In a wormhole attack a malicious node can record packets (or bits) at one location in the network and tunnel them to another location through a private network shared with a colluding malicious node. Most existing ad hoc routing protocols would be unable to find consistent routes to any destination When an attacker forwards only routing control messages and not data packets, communication may be severely damaged

Challenges in Securing MANETs - Wormhole Attacks Here is a simple routing algorithm for constructing a spanning tree rooted at a base station. The base station broadcasts a beacon. Those nodes who can hear the beacon, mark the base station as its parent. The beacon is then rebroadcast recursively to construct the spanning tree. Those nodes who don’t have a parent yet and receive the beacon will mark the sender as its parent. Initial Routing before attack Adapted from Chris Karlof and David Wagner's WSNPA slides

Challenges in Securing MANETs - Wormhole Attacks The routing tree enables dissemination of information from base station to nodes or collection of data from nodes to base station. Here is an example, all data packets will be sent to base station through the constructed routing tree. Initial Routing before attack Adapted from Chris Karlof and David Wagner's WSNPA slides

Challenges in Securing MANETs - Wormhole Attacks Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel Wormholes can attack the routing algorithm. Since node chooses its parent based on the first copy of the beacon it receives. If an adversary can tunnel the beacon to distant parts of the network faster than it would reach there through normal multi-hop transmission, then the adversary can influence a node’s choice of its parent. Adapted from Chris Karlof and David Wagner's WSNPA slides

Challenges in Securing MANETs - Wormhole Attacks Most packets will be routed to the wormhole The wormhole can drop packets or more subtly, selectively forward packets to avoid detection Adapted from Chris Karlof and David Wagner's WSNPA slides

Presentation Outline Mobile Ad hoc Networks - Overview Challenges in Securing MANETs Ongoing Research in Securing MANETs Conclusion

Ongoing Research in Securing MANETs - Securing Routing in MANETs The Secure Routing Protocol (SRP) is designed as an extension compatible with a variety of existing reactive routing protocols. SRP combats attacks that disrupt the route discovery process and guarantees the acquisition of correct topological information ARIADNE (a secure routing protocol based on DSR) guarantees that the target node of a route discovery process can authenticate the initiator the initiator can in turn authenticate each intermediate node on the path to the destination present in the RREP message no intermediate node can remove a previous node in the node list in the RREQ or RREP messages.

Ongoing Research in Securing MANETs - Securing Routing in MANETs ARAN secure routing protocol (conceived as an on-demand routing protocol) that detects and protects against malicious actions carried out by third parties and peers in the ad hoc environment. It introduces authentication, message integrity and non-repudiation as part of a minimal security policy for the ad hoc environment Consists of a preliminary certification process, a mandatory end-to-end authentication stage and an optional second stage that provides secure shortest paths

Ongoing Research in Securing MANETs - Dealing with Selfish and Malicious Nodes CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) aims at detecting malicious nodes by means of combined monitoring and reporting and establishes routes by avoiding misbehaving nodes It is designed as an extension to a routing protocol such as DSR. Another approach is a Token based Cooperation Enforcement Scheme that requires each node of the ad hoc network to hold a token in order to participate in the network operations Tokens are granted to a node collaboratively by its neighbors based on the monitoring of the node’s contribution to packet forwarding and routing operations Upon expiration of the token, each node renews its token through a token renewal exchange with its neighbors.

Ongoing Research in Securing MANETs - Key Management and Node Authentication A Self-Organized Public-Key Management scheme based on PGP has been proposed to support security of ad hoc network routing protocols Users issue certificates for each other based on their personal acquaintances In authentication based on Polynomial Secret Sharing public-key certificate of each node is cooperatively generated by a set of neighbors - based on the behavior of the node as monitored by the neighbors Using a group signature mechanism based on polynomial secret sharing, the secret digital signature key used to generate public-key certificates is distributed among several nodes

The Secure Routing Protocol (SRP) SRP allows the initiator of a route discovery to detect and discard bogus replies SRP relies on the availability of a security association (SA) between the source node (S) and the destination node (T). The SA could be established using a hybrid key distribution based on the public keys of the communicating parties. S and T can exchange a secret symmetric key (KS,T) using the public keys of one another to establish a secure channel.

The Secure Routing Protocol (SRP) S and T can then further proceed to mutual authentication of one another and the authentication of routing messages. SRP suffers also from the lack of a validation mechanism for route maintenance messages: route error packets are not verified SRP is, however, not immune to the wormhole attack: two colluding malicious nodes can misroute the routing packets on a private network connection and alter the perception of the network topology by legitimate nodes

ARIADNE ARIADNE needs some mechanism to bootstrap authentic keys required by the protocol In particular, each node needs a shared secret key (KS,D, is the shared key between a source S and a destination D) with each node it communicates with at a higher layer In ARIADNE, the basic RREQ mechanism is enhanced by eight additional fields used to provide authentication and integrity to the routing protocol as follows: <ROUTE REQUEST, initiator, target, id, time interval, hash chain, node list, MAC list>

ARIADNE When the target node receives the RREQ, it checks the validity of the request by determining that the keys from the time interval specified have not been disclosed yet, and that the hash chain field is equal to: H [ηn , H [ηn-1 , H [ . . . , H [η1 , MACKSD (initiator, target, id, time interval) ] . . . ] ] ] where ηi is the node address at position i of the node list in the request, and where n is the number of nodes in the node list If the target node determines that the request is valid, it returns a RREP to the initiator, containing eight fields: <ROUTE REPLY, target, initiator, time interval, node list, MAC list, target MAC, key list> ARIADNE is protected also from a flood of RREQ packets that could lead to the cache poisoning attack.

ARAN ARAN requires the use of a trusted certificate server (T): The certificate contains the IP address of the node, its public key, a timestamp of when the certificate was created and a time at which the certificate expires along with the signature by T All nodes are supposed to maintain fresh certificates with the trusted server and must know T’s public key The goal of the first stage of the ARAN protocol is for the source to verify that the intended destination was reached. In this stage, the source trusts the destination to choose the return path

ARAN The second stage of the ARAN protocol guarantees in a secure way that the path received by a source initiating a route discovery process is the shortest. The ARAN protocol protects against exploits using modification, fabrication and impersonation but the use of asymmetric cryptography makes it a very costly protocol to use in terms of CPU and energy usage. ARAN is not immune to the wormhole attack

SEAD In order to secure the DSDV-SQ routing protocol, SEAD makes use of efficient one-way hash chains rather than relaying on expensive asymmetric cryptography operations. SEAD assumes some mechanism for a node to distribute an authentic element of the hash chain that can be used to authenticate all the other elements of the chain. It suggests to ensure the key distribution relaying on a trusted entity that signs public key certificates for each node Each node can then use its public key to sign a hash chain element and distribute it The basic idea of SEAD is to authenticate the sequence number and metric of a routing table update message using hash chains elements. In addition, the receiver of SEAD routing information also authenticates the sender, ensuring that the routing information originates form the correct node.

CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) CONFIDANT components in each node include - a network monitor, - reputation records for first-hand and trusted second-hand observations about routing and forwarding behavior of other nodes, - trust records to control trust given to received warnings, and - a path manager to adapt the behavior of the local node according to reputation and to take action against malicious nodes. The term reputation is used to evaluate routing and forwarding behavior according to the network protocol, whereas the term trust is used to evaluate participation in the CONFIDANT meta-protocol

CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) The dynamic behavior of CONFIDANT is as follows. - Nodes monitor their neighbors and change the reputation accordingly - If they have a reason to believe that a node misbehaves, they can take action in terms of their own routing and forwarding and they can decide to inform other nodes by sending an ALARM message. - When a node receives such an ALARM either directly or by promiscuously listening to the network, it evaluates how trustworthy the ALARM is based on the source of the ALARM and the accumulated ALARM messages about the node in question - It can then decide whether to take action against the misbehaved node in the form of excluding routes containing the misbehaved node, re-ranking paths in the path cache, reciprocating by non-cooperation, and forwarding an ALARM about the node.

Token-based cooperation enforcement The token-based cooperation enforcement mechanism includes four interacting components: - neighbor verification through which the local node verifies whether neighboring nodes are legitimate, - neighbor monitoring that allows the local node to monitor the behavior of each node in the network and to detect attacks from malicious nodes, - intrusion reaction that assures the generation of network alerts and the isolation of attackers, and - security enhanced routing protocol that consists of the ad hoc routing protocol including security extensions.

Self-Organized Public-Key Management based on PGP In the proposed self-organizing public-key management system, each user maintains a local certificate repository When two users want to verify the public keys of each other, they merge their local certificate repositories and try to find appropriate certificate chains within the merged repository The success of this approach very much depends on the construction of the local certificate repositories and on the characteristics of the certificate graphs. The vertices of a certificate graph represent public-keys of the users and the edges represent public-key certificates issued by the users

Authentication based on polynomial secret sharing Using a group signature mechanism based on polynomial secret sharing, the secret digital signature key used to generate public-key certificates is distributed among several nodes Certification services like issuing, renewal and revocation of certificates thus are distributed among the nodes: a single node holds just a share of the complete certificate signature key. a localized trust model has been proposed to characterize the localized nature of security concerns in large ad hoc wireless networks. When applying such trust model, an entity is trusted if any k trusted entities claim so: these k trusted entities are typically the neighboring nodes of the entity. A locally trusted entity is globally accepted and a locally distrusted entity is regarded untrustworthy all over the network.

Presentation Outline Mobile Ad hoc Networks - Overview Challenges in Securing MANETs Ongoing Research in Securing MANETs Conclusion

Conclusion Security of ad hoc networks has recently gained momentum in the research community Due to the open nature of ad hoc networks and their inherent lack of infrastructure, security exposures can be an impediment to basic network operation Security solutions for MANET have to cope with a challenging environment including scarce energy and computational resources and lack of persistent structure

Conclusion The solutions presented in this presentation only cover a subset of all threats and are far from providing a comprehensive answer to the security problem in ad hoc networks They often address isolated issues away from a global approach to security As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing, key management and cooperation enforcement are expected to appear

Questions? Thank You References Y-C Hu, A. Perrig, D. B. Johnson, “ARIADNE: A secure On-Demand Routing Protocol for Ad Hoc Networks”, in proceedings of MOBICOM 2002. B. Dahill, B. N. Levine, E. Royer, C. Shields, “ARAN: A secure Routing Protocol for Ad Hoc Networks”, UMass Tech Report 02-32, 2002. P. Papadimitratos, Z. Haas, “Secure Routing for Mobile Ad Hoc Networks”, in Proc. of CNDS 2002. M. Reiter, S. Stybblebine, “Authentication metric analysis and design”, ACM Transactions on Information and System Security, 1999. S. Capkun, L. Buttyan and J-P Hubaux, “Self-Organized Public-Key Management for Mobile Ad Hoc Networks”, in ACM International Workshop on Wireless Security, WiSe 2002. Y-C Hu, D. B. Johnson, A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”, in 4th IEEE Workshop on Mobile Computing Systems and Applications. H. Yang, X. Meng, S. Lu, “Self-Organized Network-Layer Security in Mobile Ad Hoc Networks”, in Proc. of WiSe’02 S. Buchegger, J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol”, in proc. of MobiHoc 2002. S. Buchegger, J.Y. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks”, in proc. of 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing. H. Luo, S. Lu, “Ubiquitous and Robust Authenticaion Services for Ad Hoc Wireless Networks”, UCLA-CSD-TR-200030. A. Shamir, “How to share a secret”, Communications of ACM 1979.