SUBJECTIVE LOGIC BASED PROBABILISTIC KEY MANAGEMENT FOR MANETS Mahdieh Ahmadi Performance and Dependability Laboratory Sharif University of Technology.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
IT 644: Mobile Computing Instructor: Sridhar Iyer Course Page Lecture Hours Tue:
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Centre for Wireless Communications University of Oulu, Finland
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
1 Secure Ad-Hoc Network Eunjin Jung
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Communication in heterogeneous ad hoc grid Shan Natarajan.
Computer Science and Engineering 1 Mobile Computing and Security.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
A Novel Cryptography for Ad Hoc Network Security ► Pi Jian-yong; Liu Xin-song; Wu Ai; Liu Dan; ► 2006 International Conference on Communications, Circuits.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
MOBILE AD-HOC NETWORKS
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
CSE 4340/5349 Mobile Systems Engineering
Chi Zhang, Yang Song and Yuguang Fang
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Presentation transcript:

SUBJECTIVE LOGIC BASED PROBABILISTIC KEY MANAGEMENT FOR MANETS Mahdieh Ahmadi Performance and Dependability Laboratory Sharif University of Technology Spring 2014

Outline Mobile Ad hoc networks(MANETs) Probabilistic Key Management Subjective Logic Proposed Algorithm SL based Probabilsitic Key Managment 2 Mahdieh Ahmadi

Mobile Ad hoc Networks Wireless Networks Infrastructure-based Networks Wireless LANs Ad hoc Networks Mahdieh AhmadiSL based Probabilsitic Key Managment 3 Useful when infrastructure not available Impractical Expensive

MANETs :: Complexities Mahdieh AhmadiSL based Probabilsitic Key Managment 4 Autonomous and infrastructure less Multi-hop routing Dynamic network topology Device heterogeneity Bandwidth constrained variable capacity links Network Scalability A B A B

MANETs:: Complexities Broadcast nature of the communications Lack of mobility awareness by system/applications Short battery lifetime Limited capacities Security Mahdieh AhmadiSL based Probabilsitic Key Managment 5

MANETs:: Security Nodes rely on other nodes for communication No centralized trusted authorities Intermediate nodes are able to Read, Drop or Change messages before resending them Mahdieh AhmadiSL based Probabilsitic Key Managment 6

Cryptography Symmetric key cryptography Define a shared key between every two node Shared or pairwise Pairwise : every node should store n-1 keys Shared : compromising just one node destroys the security of the whole network Asymmetric cryptography without third party Stores all the public keys in every node Provides authentication, integrity and non-repudiation Mahdieh AhmadiSL based Probabilsitic Key Managment 7 Confidentiality Integrity Authentication Non-repudiation × Availability Confidentiality × Integrity × Authentication × Non-repudiation × Availability

Cryptography :: Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 8 Provide secure procedures for handling cryptographic keying materials

Key Management :: Probabilistic Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 9 j.… Destination Source i j k i.… k.… j a b a b Confidentiality Integrity Authentication Non-repudiation × Availability Need limited capacity Introduced by Gharib et al., 2013.

Probabilistic Key Management :: Features Mahdieh AhmadiSL based Probabilsitic Key Managment 10 Connectivity Probability : 99.99% Storing only a few keys instead of all keys

Probabilistic Key Management :: Concerns Mahdieh AhmadiSL based Probabilsitic Key Managment 11

Subjective Logic Extend probabilistic logic by expressing uncertainty Reason in presence of uncertain or incomplete evidence Prepositions such as “I don’t know” cannot be expressed  ignorance or uncertainty Additivity Principle Sum of mutually disjoint elements in a state space add up to 1 Probabilistic Logic  YES Belief Theory  NO : main reason for creating belief theory Reality  closer to belief theory Mahdieh AhmadiSL based Probabilsitic Key Managment 12 Standard Logic Probabilistic Logic ?? Standard Logic Probabilistic Logic Belief Theory ?

Subjective Logic :: Definitions Mahdieh AhmadiSL based Probabilsitic Key Managment 13 Standard Logic Probabilistic Logic Belief TheorySubjective Logic

Subjective Logic :: Opinion Mahdieh AhmadiSL based Probabilsitic Key Managment 14

Opinion:: Binomial Opinion Mahdieh AhmadiSL based Probabilsitic Key Managment 15

Binomial Opinion :: Evidence Notation Mahdieh AhmadiSL based Probabilsitic Key Managment 16

Subjective Logic :: Probabilistic Notation Mahdieh AhmadiSL based Probabilsitic Key Managment 17

Subjective Logic :: Operators Addition Subtraction Multiplication Division Deduction Abduction Discounting Cumulative fusion Averaging fusion Belief Constraining … Mahdieh AhmadiSL based Probabilsitic Key Managment 18

Subjective Logic :: Fusion Mahdieh AhmadiSL based Probabilsitic Key Managment 19

Subjective Logic :: Trust Transitivity A trusts B B believes that proposition x is true Agent A will also believe that proposition x is true What is the effect of A disbelieving that B will give a good advice? A thinks that B ignores the truth value of x A thinks that B consistently recommends the opposite of his real opinion about the truth value of x Base Rate Sensitive Discounting Mahdieh AhmadiSL based Probabilsitic Key Managment 20

Subjective Logic :: Example Mahdieh AhmadiSL based Probabilsitic Key Managment 21

SL Based Probabilistic Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 22 k Destination a b c d e f g (0, 0, 1, 0.5) (1, 0, 0, 0.5) (0, 0, 1, 0.5) (1, 0, 0, 0.5) (0, 0, 1, 0.5) (1, 0, 0, 0.5) (0, 0, 1, 0.5) (0.7, 0, 0.3, 0.5) C(x, y): node ‘x’ opinion toward node ‘y’ Initial value C(x, y) = (Threshold, 0, (1-Threshold)) Optimistic Threshold > 0.5 Pessimistic Threshold < 0.5

SL Based Probabilistic Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 23

SL Based Probabilistic Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 24 Destination Source i j d s (0.7, 0, 0.3, 0.5) (0, 0, 1, 0.5) (1, 0, 0, 0.5) … (0.7, 0, 0.3, 0.5) … (0, 0, 1, 0.5) (0.7, 0, 0.3, 0.5) (0.49, 0, 0.51, 0.5)

SL Based Probabilistic Key Management Mahdieh AhmadiSL based Probabilsitic Key Managment 25

Results Should be tested in ns3 Mahdieh AhmadiSL based Probabilsitic Key Managment 26

References Mohammed Gharib, Ehsan Emamjomeh-Zadeh, Ashkan Norouzi-Fard, and Ali Movaghar. A novel probabilistic key management algorithm for largescale manets. In Proceedings of the th International Conference on Advanced Information Networking and Applications, AINA '13, pages IEEE Computer Society, Anurag Kumar, D. Manjunath, and Joy Kuri Wireless Networking. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. Audun Jøsang. Subjective Logic. Draft book, February ( February ) Mahdieh AhmadiSL based Probabilsitic Key Managment 27

THANK YOU