Design of Secure and Energy- Efficient Wireless Ad-Hoc Sensor Networks Mukesh Singhal Laboratory For Advanced Networking Department of Computer Science.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Security in Mobile Ad Hoc Networks
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Wireless Ad-Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Computer Science and Engineering 1 Mobile Computing and Security.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Presented by Edith Ngai MPhil Term 3 Presentation
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Design of Secure and Energy- Efficient Wireless Ad-Hoc Sensor Networks Mukesh Singhal Laboratory For Advanced Networking Department of Computer Science University of Kentucky

Wireless Ad Hoc Networks Security Threats Selective forwarding Wormholes Sinkholes HELLO floods Bogus routing information Sybil attacks Byzantine attacks Black hole attack Flood rushing attack Overlay wormhole attack 2

Wireless Ad Hoc Networks Security: Design Challenges Lack of infrastructure Lack of a backbone to support security measures No trustable entities to support network security Node mobility Any node can join the network Elude detection by changing position Network topology changes rapidly and unpredictably Causes communication breakages Scarcity of resources Battery power/CPU speed/Main memory Device heterogeneity 3

Wireless Ad Hoc Networks “Design and analysis of efficient, secure, and robust wireless mobile ad hoc networks (MANETs).” (supported by three NSF grants) Research Focus Secure route discovery and maintenance Complicated due to node mobility and lack of any fixed infrastructure Efficiency Scalability Robustness (Path healing) Cooperation is critical in ad hoc networks No centralized service Limited radio range (need of relaying) Nodes attempt to save limited resources, such as battery Relaying of packets is energy consuming Trust management 4

Main Research contributions: Secure position-based protocols: Position-based protocols are vulnerable to a new attack: “the position spoofing” attack – a node declares a fake position and uses it to launch other attacks. Developed a secure position-based protocol framework that guards against. Consist of a secure hello protocol and a secure greedy forwarding protocol (SecFwd). The secure hello protocol helps nodes establish a neighbor table free of malicious nodes, defends against IP-spoofing, position-spoofing, and black lists malicious nodes. To detect position-spoofing, nodes use a new distributed position verification algorithm that uses a position-bounding technique. SecFwd mitigates forwarding misbehaviors and insures proper execution of greedy forwarding. 5

Main Research contributions: Authenticating DSR Using a Novel Multisignature Scheme The problem of secure routing in mobile ad hoc networks is long-standing We developed an efficient, single-round multisignature scheme, constructed using cubic linear feedback shift register (LFSR) sequences and a variant of the generalized ElGamal signature scheme. The multisignature engineered to produce an efficient technique to authenticate route discovery in the dynamic source routing (DSR) protocol.

Main Research contributions: Efficient trust collection: Used the concept of “encounter age” to develop a protocol for efficient collection of trust values of nodes. (Significantly reduces the overhead compared to pure flooding-based protocols) A low-overhead truthful route discovery protocol by applying the mechanism design: Finds a least cost route with a much lower routing overhead (O(n 2 ) vs. O(n 3 )).

Authentication in Large Networks Authentication in large-scale systems: Issues Need to handle a large number of users Need to handle large amount of data Heterogeneous environments Often lack of a central trusted-authority. Construction of novel authentication schemes Bridging gap between theoretical cryptography and real- world security problems 8

Authenticating Multicast Acks Multicast/Feedback Delivery Tree Leaves: 1. Register PKs with TTP 2. Send (Ack, Sig) pair toward source Internal nodes: 1. Verify incoming signatures 2. Aggregate PKs of children 3. Aggregate sigs 4. Register Aggregate PKs 5. Send (Ack, Sig) pair 9

Adaptive Content Distribution Need for adaptive content has accelerated Personalized user experience Transcoding of multimedia content Open source “custom” built applications Steps in adaptive content distribution Content creator (tier-1 provider) publishes original content Authorized third parties (tier-2 providers) modify content within restrictions agreed upon with original creator Modified content distributed to end user based on his/her preference 10

Problem: End-to-End Authentication for Adaptive Content Distribution Traditional solutions cannot handle content adaptation while preserving end-to-end authenticity, integrity. Issues – Availability, Scalability, Communication overhead. 11

Our Approach: Proxy Signatures We developed a simple, efficient, secure trapdoor hash-based proxy signatures – first of its kind in the literature. 12

Authentication based on Trapdoor Hash Features Associated with a private (trapdoor) key, a public (hash) key Collisions difficult to find without knowledge of private key Given private key along with trapdoor hash on message, feasible to find collisions Collisions in a trapdoor hash function can be used to implement authentication. An Example (DL-based) Trapdoor key – TK. Hash key – HK = g (TK) Trapdoor hash of message m under hash key HK TH HK (m,r) = g (m) HK (r) Given (m,r), another message w, and trapdoor key TK find collision c such that TH HK (m,r) = TH HK (w,c) as c = TK -1 (m-w) + r 13

Basic Idea Features Non transferable - only proxy knows trapdoor key Highly efficient – fast generation, verification and small signatures Provably secure - using well-known security model (Boldyreva model) Guarantees verifiability, strong undeniability and prevention of misuse. DELEGATORPROXYVERIFIER 14

Summary Security is a major concern in wireless ad hoc networks. State of infancy and much more work needs to be done. At U of Kentucky, we are bridging the gap between theory and practice. Questions? 15