A Survey of Secure Wireless Ad Hoc Routing

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Yih-Chun Hu Carnegie Mellon University
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Challenge: Securing Routing Protocols Adrian Perrig
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Secure routing in multi-hop wireless networks (II)
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
The Destination Sequenced Distance Vector (DSDV) protocol
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
“Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC” Analysis of a technical report from Stephan Eichler and Christian Roman,
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Packet Leashes: Defense Against Wormhole Attacks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile and Wireless Networking
ITIS 6010/8010 Wireless Network Security
A Survey of Secure Wireless Ad Hoc Routing
Presentation transcript:

A Survey of Secure Wireless Ad Hoc Routing Article by: YIH-CHUN HU, ADRIAN PERRIG IEEE Security and Privacy special issue on Making Wireless Work, 2(3):28-39,  2004. Presented by: Devendra Salvi 04-17-2007

Multihop Ad Hoc network Access Point Ad Hoc N/W Network boundary

Outline Attacks on Ad hoc networks Key setup in Ad hoc networks SEAD in mobile wireless Ad Hoc network A secure on-demand routing protocol for ad hoc networks Securing AODV Review Questions

Attacks on Ad hoc networks Attacks on ad hoc network routing protocols are mainly Routing disruption attack Wherein the attacker causes legitimate data packets to be routed in dysfunctional ways. Resource consumption attack Wherein the attacker injects packets into the network to consume network resources such as bandwidth or to consume node resources such as memory/computational power.

Attacks on ad hoc network routing protocols Shortest path Routing disruption attack Drop packets Blackhole / Grayhole Source Destination Insert forged routing packets

Attacks on ad hoc network routing protocols Wormhole Records Traffic for network A & replays it in network B Intruder Node X Node A Node B Intruder Node X’ X’mission range of B X’mission range of A

Attacks on ad hoc network routing protocols Solution for wormhole attacks Packet Leashes is keeping constraints on packet in either of two ways Temporal Temporal leashes rely on extremely precise time synchronization and timestamps in each packet. A packet’s travel time is approximated as the difference between the receive time and the timestamp. Geographical

Attacks on ad hoc network routing protocols Solution for wormhole attacks Packet Leashes is keeping constraints on packet in either of two ways Temporal Geographical Where in location information and loosely synchronized clocks is used to create a leash The distance between the sender and receiver is calculated nodes velocity and timestamps.

Key setup in Ad hoc networks To authenticate a legitimate node Establishing private keys Share private keys between each pair of nodes before deployment. Pitfall: when new nodes join network later Solution: 1. Establishing trust and keys between two nodes in an ad hoc network; Master-slave nodes.

Key setup in Ad hoc networks SUCV addresses (statistically unique cryptographically verifiable) Each node generates a public- and private-key pair, and then chooses its address based on a cryptographic hash function of the public key E.g. 1. A node’s entire IPv6 address is the hash function’s output

Key setup in Ad hoc networks Certificates from a certificate authority node address, node public key, and a signature from the CA (s).

Key setup in Ad hoc networks Transitive trust and PGP trust graphs node address, node public key, and a signature from the CA. Node B Node A Node C

SEAD in mobile wireless Ad Hoc network To support use of SEAD with nodes of limited CPU processing capability, and to guard against DoS attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, efficient one-way hash functions are used while asymmetric cryptographic operations in the protocol are not used. SEAD: Secure efficient Ad hoc Distance vector routing protocol.

SEAD in mobile wireless Ad Hoc network Destination-Sequenced Distance-Vector ad hoc network routing protocol (DSDV). Distance vector routing; each router maintains list of all possible destinations within the network. Each node router entry maintains: 1. address of destination (identity) 2. Nodes which form shortest known distance to destination (metric) usually # of hops. 3. address of nodes neighbor which is the first hop on the shortest route to destination

SEAD in mobile wireless Ad Hoc network Destination-Sequenced Distance-Vector ad hoc network routing protocol (DSDV). DSDV introduces a sequence number in each routing table entry. Prevents routing loops.

SEAD in mobile wireless Ad Hoc network Hash Chains A one-way hash chain is built on a one-way hash function. To create a one-way hash chain, a node chooses a random x ∈ {0,1}ρ and computes the list of values h0, h1, h2, h3, ..., hn,where h0 = x, and hi = H(hi –1) for 0 < i ≤ n, for some n. E.g. Given an authenticated hi value, a node can authenticate hi–3 by computing H(H(H(hi –3))) and verifying that the resulting value equals hi

A secure on-demand routing protocol for ad hoc networks Ariadne is a secure on-demand routing protocol that withstands node compromise and relies only on highly efficient symmetric cryptography. Ariadne discovers routes on-demand (as they are needed) through route discovery and uses them to source route data packets to their destinations. *Message authentication code (MAC) computed with key KSD over unique data—for example, a timestamp

Securing AODV The Ad hoc On-demand Distance Vector routing protocol (AODV) spreads distance vector routing information in an on-demand manner. There are two protocols to secure routing protocols Authenticated routing for ad hoc networks (ARAN) SAODV

Securing AODV Authenticated routing for ad hoc networks (ARAN) Kimaya Sanzgiri and her colleagues developed authenticated routing for ad hoc networks (ARAN), which is based on AODV. In ARAN, each node has a certificate signed by a trusted authority, which associates its IP address with a public key.

Securing AODV (ARAN) 1. To initiate a route discovery, the initiator S broadcasts a signed ROUTE REQUEST packet that includes the target D, its certificate (certS), a nonce N, and a timestamp t. 2. Each node that forwards this REQUEST checks the signature or signatures. Node C checks node B’s certificate certB, then checks the signature on the outer message. C then verifies the certificate certS for initiator S and uses the key in the certificate to verify the signature on the REQUEST. 3. If the signatures are valid, the forwarding node removes the last forwarder’s signature and certificate, signs the original REQUEST, and includes its own certificate. The node then broadcasts the REQUEST. Node C removes node B’s signature, signs the resulting REQUEST, and includes its own certificate. Node C then broadcasts the REQUEST. 4. When the first ROUTE REQUEST from a route discovery reaches the target, the target signs a ROUTE REPLY and sends it to the node from which it received the REQUEST. the target D returns a signed ROUTE REPLY to the previous hop C

Securing AODV SAODV: A signature is used to authenticate most fields of a route request and route reply and hash chains are used to authenticate the hop count. A node first authenticates the RREQ to ensure that each field is valid. It then performs duplicate suppression to ensure that it forwards only a single RREQ for each route discovery. The node then increments the hop-count field in the RREQ header, hashes the hop count authenticator, and rebroadcasts the RREQ, together with its RREQ-SSE extension.

Review Strengths Comprehensive study of security protocols on wireless ad hoc networks

Review Weaknesses Authors do not present any evaluations of the protocol.

Improvements Implementation of the discussed protocols.

Questions ?