How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Denial of Service in Sensor Networks Szymon Olesiak.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Security Issues In Sensor Networks By Priya Palanivelu.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Centre for Wireless Communications University of Oulu, Finland
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
WIRELESS COMMUNICATION NETWORKS Modeling and Simulation.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
EAACK—A Secure Intrusion-Detection System for MANETs
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
The Sybil Attack in Sensor Networks: Analysis & Defenses
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois Slightly revised version of slides used for.
1 University of Berne Institute of Computer Science and Applied Mathematics – IAM/RVS An overview on TCP in Wireless Ad hoc Networks Ruy de Oliveira March.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Security of the Internet of Things: perspectives and challenges
Presented by Edith Ngai MPhil Term 3 Presentation
Introduction Wireless devices offering IP connectivity
Packet Leashes: Defense Against Wormhole Attacks
Peer-to-peer networking
Distributed Routing Protocol in Wireless Network Simulation
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
Performance Analysis of the CONFIDANT Protocol
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Distributed Systems and Algorithms
Presentation transcript:

How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center

Introduction Problems in our research area: – Not much to be implemented in the near future. – Researchers do not have enough background (routing protocols and security in wired networks). – Too many people needing to publish papers in order to get a PhD. – Too much simulation, not much analysis.

Tamper resistant devices ● There is no such thing as a tamper resistant device. (See Anderson & Kuhn "Tamper Resistance - a Cautionary Note" & "Low Cost Attacks on Tamper Resistant Devices") ● Trying to combine symmetric cryptography solutions with tamper resistant devices to create the same result provided by alternatives that use asymmetric cryptography does not make sense.

Misbehaving detection schemes ● It is quite likely that it will be not feasible to detect several kind of misbehaving (specially because it is very hard to distinguish misbehaving from transmission failures and other kind of failures). ● It has no real means to guarantee the integrity and authentication of the routing messages! ● With all this being common knowledge, it is amazing that there are some people writing papers on top of this idea (like the guys from EPFL Lausane).

Systems with unrealistic requirements ● MAC addresses identify unquely a node. ● Every node should have some means to know its geographic position. ● There is a central server that is available by all the nodes. ● There is a tight time synchronization between all the nodes of the network (the latest craze using TESLA by Dave Johnson, Perrig and Hu).

Complex systems that use fancy mathematics ● With mathematics you can hide the fact that, actualy, your system does not work at all. Just use a lot of formulas. ● My favourite example is 'Securing Ad hoc Networks' by Zhou & Haas. A distributed CA that does not work if there are only two nodes in a network partition. (Although is good in that recognizes the non-feasibility of the central server approaches).

So what's the right way? ● Securing routing messages vs data messages. ● The scenario that is going to protect. ● The security features that this scenario requires. ● The security mechanisms that will fulfill those security features.

Analisis ● The analysis of requirements: Whether the security features are enough for the targeted scenario. ● The analysis of mechanisms: Whether the security mechanisms are indeed fulfilling all the security requirements. When doing this, it will be found that there are still some attacks that can be performed against your system. Some of them, typically, aren't avoid because a trade off between security and feasibility. ● The analysis of feasibility: Whether the security mechanisms have requirements that are not feasible in the targeted scenario.

That's all Thank you for your atention. More info about SAODV in: