SPLASH Project INRIA-Eurecom-UC Irvine November 2006.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
SPLASH Project INRIA-Eurecom-UC Irvine November 2006.
A Survey of Key Management for Secure Group Communications Celia Li.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
URSA: Providing Ubiquitous and Robust Security Support for MANET
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
SPLASH Sécurisation des ProtocoLes dans les réseAux mobileS ad Hoc 12 Décembre 2003 Refik Molva Institut EURECOM.
1 A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
30/04/2004Gene Tsudik, UCLA CSD Research Review1 Some Security Issues & Challenges in MANETs and Sensor Nets Gene Tsudik SCONCE: Secure Computing and Networking.
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
1 Secure Ad-Hoc Network Eunjin Jung
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Taiming Feng, Chuang wang, Wensheng Zhang and Lu Ruan INFOCOM 2008 Presented by Mary Nader.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Communication Support for Location- Centric Collaborative Signal Processing in Sensor Networks Parmesh Ramanathan University of Wisconsin, Madison Acknowledgements:K.-C.
High-integrity Sensor Networks Mani Srivastava UCLA.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Mobile ad hoc networking: imperatives and challenges
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
SCONCE: Secure Computing and Networking Center
Presentation transcript:

SPLASH Project INRIA-Eurecom-UC Irvine November 2006

SPLASH project review July July 2006 Security of Wireless Adhoc Networks –From MANET security… –To WSN (Wireless Sensor Network) Security! Many contributions in many different areas...

Outline MANET Security –Membership Management –Collaboration Enforcement WSN Security –The security Challenges –Secure Aggregation Conclusions

What is a MANET? No centralized control No hierarchy Fault-tolerant Dynamic membership MANET Distributed and scalable security services required Set of nodes (5-50) that establish A network Wireless and multi-hop Does not rely on any fixed infrastructure Spontenuous (no prior association)

MANET two main Security Challenges Membership/Key Management –How does a new node become a member of the MANETand receive key material without relying on a trusted membership controller? Secure Routing/Collaboration Enforcement –How can we make sure that all node collaborate i.e. relays others’ packets?

Topic 1: Membership Management The Centralized Approach A B C D E F Membership manager Single point of failure!

Our Approach: Distributed Membership Management A B C E F All members are equal and can participate in new node admission Secure as long as less than t nodes out of n get compromized

Our approach:Admission Control Step 1: Join request Step 2: Join commit (Vote) Step 3: GMC issuance & share acquisition M new New member (M new ) wants to join the group A quorum of t current members need to issue M new a group membership certificate (GMC) If no quorum found, membership is denied Vote 1 Vote 2

Some details …. Initialization –Dealer (or set of founding nodes) randomly selects polynomial f(x) of degree t-1 –… distributes a secret ssi to each authorized member –And publishes its witnesses f(x) = S + a 1 x + a 2 x 2 + … + a t-1 x t-1 (mod q) ss i = f(id i ) (mod q) Wj = g aj (mod p)

Node Admission A new node new receives the partial secret share, pssj, from node j, –Pssj = ssj.lj(new), where lj(.) is the Lagrange coefficient. –Computes its secret share, from at least t partial secrets share by summing them.

Key Exchange Once a node becomes a member it has a secret share ss_{new} that can be used: –To Vote for new member admission –To Establish a key with any other MANET member n_i Compute n_i’s public key, PK(i) K_{new,i} = PK(i)^ss_{new} = g^{ssi})^ss_{new} Node i can do the same computation and retrieve the same secret key –To Prove membership Our scheme is fully distributed and secure as long as less than t out of the n members are compromised. It was fully implemented and evaluated… More infos?: –Robust Self-Keying Mobile Ad Hoc Networks, Claude Castellucia, Nitesh Saxena, and Jeong H. Yi, Elsevier Computer Networks, April 2007.Elsevier Computer Networks (mod q) (mod p)

Topic 2: Secure Collaboration How to make sure that members are not selfish? –Some nodes might drop packets to save energy or to perform DoS attacks We have developped: – a reputation based solution (CORE) Introduced at Paristic 2004 –a Cryptographic solution

Collaboration Enforcement Problem statement: A B C CA

Collaboration Enforcement (2) Problem statement: A B C CA

Boomerang Routing Some packets addressed to B are routed via C –Boomerang routing ;-) A C B CABA A C B CABA BA

Boomerang Routing If B drops packets…it may drop some of its packets  … It is forced to collaborate since he does not know the final destination… Reference: Pocket bluff (INRIA Research Report) Pocket bluff A C B CABA

Topic3 : Wireless Sensor Networks Security Another type of adhoc networks Network of sensors that usually monitor the environment Sensors are very small and cheap devices They usually send their monitored data to the sink (a more powerful device) Sink a bc d e

Application Spectrum Hazard Detection Biological Monitoring Linear Structure Protection Smart Environment Wearable Computing Immerse Environments Earth Science & Exploration Context-Aware Computing Interactive VR Game Wireless Sensor Networks Urban Warfare Military Surveillance Disaster Recovery Environmental Monitoring

MANET vs WSN MANET and WSN look similar but they are quite different.. MANETWSN Nodes are MobileNodes are Fixed Nodes1000/10000 Nodes Nodes belong to same entityNodes belong to different entities Nodes sends to BSP2P communication Nodes can easily be physically corrupted Nodes have very Limited CPU/memory/energy

Manet Security Challenges MANET WSN Access/Membership Management Scalability Collaboration enforcement/ Secure routing Energy/CPU efficient security protocols Sensor revocation

Some Contributions Key establishment/pairing –Shake them Up! (presented at Paristic 2005) Dara Aggregation in WSN –Aggregation is a useful technique to save energy Transmission is the most costly: Transmitting 1 bit is equivalent to executing 1000 instructions! –User is often more interested in the aggregate (i.e. average in a give area) than each individual value –Instead of sending each value to the sink, the values are added by intermediate nodes… –Less packets are transmitted, i.e. energy is saved… Sink a bc d e y’=a+b+c+…e y=y’/n CH

Secure Aggregation Aggregation is simple without security –Intermediate nodes process data of their children But what happens if the data sent by each sensor is encrypted using a key that it shares with the sink? We’ve developed a new additively homomorphic cipher Enc(k1, a) + Enc(k2, b) = Enc(k1+k2, a+b) –Intermediate nodes can add the ciphers they receive from children …and the sink can still recover the sum of the plaintexts. –But intermediate nodes do not have access to the plaintext values, i.e. privacy is provided… Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, Mobiquitous 2005, July 2005 Mobiquitous 2005 Sink aggregation function “average” of n sensor nodes a E(a) E(b) b E(c) c E(d) d e y’=E(a)+…+E( d) y=D(y’)/n E(e)

Conclusions The SPLASH project was a very productive, collaborative and successful project –Pars Mutaf (INRIA) visited Eurecom for 1 year. –Claude Castelluccia (INRIA) visited UCI for 2 years. The scientific contributions were numerous and many papers were published We participated in many conf. PC and launched ESAS (European Workshop on Security in Adhoc and Sensor Network) Most of our results were implemented and evaluated experimentally –Not just papers or simulations!

Some Papers Key distribution/Membership Management in MANET –Robust Self-Keying Mobile Ad Hoc Networks, Elsevier Computer Networks, April 2007.Elsevier Computer Networks –Ad hoc network security, book chapter in Mobile Adhoc networking, 2004 and in Handbook of Information Security (2006). Secure and Private MANET routing protocol –Packet coding for strong anonymity in ad hoc networks, IEEE Securecomm 2006, –Securing Route Discovery in DSR, IEEE Mobiquitous'05 Collaboration Enforcement in MANET –CORE: a collaborative reputation mechanism to enforce node cooperation in MANET (Michiardi phd thesis, publications) –Pocket Bluff, INRIA Tech. Report, WSN Security –Shake Them Up! Mobisys –Efficient Aggregation of Encrypted Data in Wireless Sensor Networks IEEE Mobiquitous'05 –Authenticated Interleaved Encryption, eprint, –More to come soon ;-)