PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
URSA: Providing Ubiquitous and Robust Security Support for MANET
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
1 Key Establishment in Ad Hoc Networks Part 1 of 2 S. Capkun, JP Hubaux.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Routing Security in Ad Hoc Networks
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By: Al-Sakib Khan Pathan SECRET: A Secure and Efficient Certificate.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
1 Secure Ad-Hoc Network Eunjin Jung
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Grid Computing Security Mechanisms: the state-of-the-art
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile ad hoc networking: imperatives and challenges
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Secure Mobile UAV-MBN Network
Amar B. Patel , Shushan Zhao
Presentation transcript:

PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008

Introduction  Mobile Adhoc Networks (MANETs): widely spread networking solutions, expected to grow more in the future  Security of transmission mediums, Air vs Wire: 0-1  Absolute security not feasible, nodes become corrupted eventually  But users demand security anywhere, anytime  Who do you trust?

Overview  Motivation  Proposed solution  Design  Architecture (What to do)  Protocol (How to do it)  Evaluation  Q&A (mine)  Q&A, round 2 (your turn)

Motivation  We need security services to be:  Intrusion-tolerant  Available anywhere, anytime  Scalable  We have security services that are:  Centralized: fails on all three accounts  Hierarchical: succeeds on scalability, concerns about the other two

Proposed solution  Two branch solution:  Threshold secret sharing  Secret share updates  Intrusion-tolerant: works with < K-1 adversarial nodes in the neighborhood  Availability: experiments show high availability, even with high mobility  Scalable: all nodes provide security services

Design Challenges  Users of MANETs demand security anywhere, anytime.  Volatile nature of MANETs: mobility of agents, frequent joins/leaves, node failures, channel errors.  Attractive to attackers (air as transmission medium).

Intrusion model  Case #1:  The intruder cannot get the secret key of an entity in time less than the secret key update.  All other information freely accessible.  Case #2:  The intruder can get the secret key…  …but cannot forge the entity ID (intrusion detection mechanisms exist).  We discuss only case #1!

Architecture - Preliminaries  System key pair: RSA(PK,SK)  Each entity maintains:  Unique ID u i  Key pair RSA(pk i,sk i )  Certificate cert i ={u i,pk i,T sign,T expire }  Secret share (of SK) Pu i  Certificate revocation list CRL

Architecture - Services  Certification service requests service responses with SK i An entity requests certification services from its neighbors. Each neighbor computes SK i from Pu i and sends it back. Once the entity has >K SKs, signs its certificate with system key

Architecture - Services  Secret share dealing  Initially, secret shares are distributed by a trusted central authority.  Once K secret shares are out there, new shares can be produced without a central authority.  Secret share updates  It’s a secret!  Explicit certificate revocation  If a cert is considered compromised, a counter-cert is flooded over the network.

Protocol – Background  Secret polynomial  SK={d,n}, polynomial of degree K-1:  Secret shares  ≥K entities can produce d (Langrage interpolation):  But in this way, the secret d can be revealed! (Langrage coefficients)

Protocol – Certification  Multi-signature protocol:  The entity sends certificate M to be signed.  Its neighbors sign it with SK i and send back the partially signed certificate.  The entity constructs, which is.  Using K-bounded coalition offsetting, acquires which is the signed certificate.  Note: the secret d has not been revealed!

Protocol – Secret share dealing  Systemwide SK={d,n}  Secret d, secret share of entity u i :  Self-initialization  If already K shares exist in the neighborhood of …  Complete shuffling scheme (using nonces)

Protocol – Secret share update  Initially: version 1, ID 0  At each update: version++  Self-initialization protocol for new version propagation  In case of version conflicts, lowest ID wins

Evaluation  Real world evaluation: UNIX RSA, cert vs key size (K=5) Cert vs K (key=1024bits) SPEC 20.5 SPEC 12.1 SPEC 1.37

Evaluation  Simulations: NS2

Evaluation  Simulations: NS2

Evaluation  Simulations: NS2

Q&A, round 1  Why certificates?  Standard solution, only anywhere, anytime needs solving  Why threshold secret sharing?  Fits well with MANETs: “1 out of N”, “N out of N”  Why secret share updates?  The MANET will be compromised, SK not easy to change

Q&A, round 1  What about DoS?  Compromised nodes offer false partial certificates  The answer: Verifiable Secret Sharing  What about <K neighbors?  Retry somewhere, sometime!  What about bookkeeping? (Cert Revoc Lists)  Implicit revocation helps keep short lists  In any case: kb/counter-cert and N<1000 but Pr{compromise}<<1

Q&A, round 2  Hit me!