An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.

Slides:



Advertisements
Similar presentations
Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means.
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Survey of Secure Wireless Ad Hoc Routing
Application of Bayesian Network in Computer Networks Raza H. Abedi.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Ad Hoc Network.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Computer Science and Engineering 1 Mobile Computing and Security.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Adaptable safety and security in v2x systems
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong 5 Jun 2006 The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006)

Dept. of Computer Science & Engineering, CUHK2 Outline Introduction Related Work Architecture and Models Trust- and Clustering-Based Authentication Service Simulation Results Conclusion

Dept. of Computer Science & Engineering, CUHK3 Mobile Ad Hoc Network An ad-hoc network (of wireless nodes) is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-organized, or spontaneous network.

Dept. of Computer Science & Engineering, CUHK4 Mobile Ad Hoc Network Connected with wireless communication Dynamic Topology Nodes are often mobile Vulnerable to security attacks Applications –Military: for tactical communications –Rescue missions : in times of natural disaster –Commercial use: for sales presentations or meetings

Dept. of Computer Science & Engineering, CUHK5 Vulnerabilities Security in wireless ad hoc network is hard to achieve due to the vulnerabilities of its links, limited physical protection, and the absence of centralized management point Unlike conventional networks, nodes of ad hoc networks cannot be secured in locked cabinets Risk in being captured and compromised Wireless communications are vulnerable to eavesdropping and active interference

Dept. of Computer Science & Engineering, CUHK6 Security Mechanisms Popular network authentication architecture include X. 509 standard and Kerberos systems Pretty Good Privacy (PGP) functions by following a web-of-trust model and using digital signatures Authentication service establishes the valid identities of communicating nodes In reality, a node may turn from trustworthy to malicious under a sudden attack We provide a secure authentication service that can defend against malicious nodes

Dept. of Computer Science & Engineering, CUHK7 Related Work Partially-distributed certificate authority by Zhou and Hass Mobile Certificate Authority (MOCA) by Yi and Kravets Fully-distributed certificate authority by Kong et. al.

Dept. of Computer Science & Engineering, CUHK8 Related Work Pretty Good Privacy (PGP) –following a web-of-trust authentication model Self-issued certificates by Hubaux et. al. –distribute certificates by users themselves without the involvement of any certificate authority

Dept. of Computer Science & Engineering, CUHK9 Our Work Propose a secure public key authentication service in mobile ad hoc networks with malicious nodes Prevent nodes from obtaining false public keys of the others Engage a network model and a trust model Design security operations including public key certification, identification of malicious nodes, and trust value update

Dept. of Computer Science & Engineering, CUHK10 Trust- and Clustering-Based Authentication Service Architecture

Dept. of Computer Science & Engineering, CUHK11 The Network Model Clustering-based network model obtains a hierarchical organization of a network Limit direct monitoring capability to neighboring nodes Allow monitoring work to proceed more naturally Improve network security

Dept. of Computer Science & Engineering, CUHK12 The Trust Model This model uses digital signatures as its form of introduction. Any node signs another's public key with its own private key to establish a web of trust Define the authentication metric as a continuous value between 0.0 and 1.0 Define a direct trust relationship as the trust relationship between two nodes in the same group and a recommendation trust as the trust relationship between nodes of different groups.

Dept. of Computer Science & Engineering, CUHK13 Clustering Structure Maintenance Maintain a balanced clustering structure for supporting our trust model and security operations Adapt to the mobility of nodes Handle leave and join of nodes from one cluster to another Each node requests for the cluster ID of its neighboring nodes periodically In each cycle, a node collects this information and updates its cluster ID

Dept. of Computer Science & Engineering, CUHK14 Clustering Structure Maintenance A node joins the neighbouring cluster with minimum size only if it leaves the original cluster or the sizes of the neighbouring clusters are not within a certain range

Dept. of Computer Science & Engineering, CUHK15 Evolution of Cluster Size It keeps balance cluster sizes

Dept. of Computer Science & Engineering, CUHK16 Authentication Service 1. Public key certification 2. Identification of malicious nodes 3. Trust value update Selects a number of trustable nodes as introducers Sends out request messages to introducers Collects and compares all the public key certificates received Selects the public key of t with majority votes Discovers malicious introducer? Isolates malicious introducer Calculates trust value of t Updates trust table

Dept. of Computer Science & Engineering, CUHK17 Public Key Certification Authentication in our network relies on the public key certificates signed by some trust- worthy nodes Nodes in the same group always know each other better by means of their monitoring components and their short distances Every node is able to request for the public key certificates of other new nodes Nodes in the same cluster are assumed to know each other by means of their mutual monitoring components

Dept. of Computer Science & Engineering, CUHK18 Public Key Certification We focus on public key certification, where s and t belong to different groups Nodes, which are in the same cluster as t and have already built up a trust relationship with s, can be introducers

Dept. of Computer Science & Engineering, CUHK19 Public Key Certification Send request to neighbors if target node in same cluster Send request to introducers if target node in different cluster

Dept. of Computer Science & Engineering, CUHK20 Identification of Malicious Nodes Identify malicious neighboring nodes by monitoring their behaviors Identify introducers who provide public key certificates different from the others Identify a target node as malicious if the trust values provided from the introducers indicate that

Dept. of Computer Science & Engineering, CUHK21 Trust Value Update

Dept. of Computer Science & Engineering, CUHK22 Parameters Setting Network simulator Glomosim Evaluate the effectiveness in providing secure public key authentication in the presence of malicious nodes

Dept. of Computer Science & Engineering, CUHK23 Simulation Metrics Successful rate Fail rate Unreachable rate False-positive error rate False-negative error rate Possible Cases with 3 Introducers

Dept. of Computer Science & Engineering, CUHK24 Effectiveness of Neighbor Monitoring Rates to No. of Cycles with n=40, r=100, (left) m=0.3 (right) m=0.7

Dept. of Computer Science & Engineering, CUHK25 Isolation of Malicious Nodes Rates to No. of Cycles with n=40, r=100, and Isolation of Suspicious Nodes in Cases 2,3,4,6,7 (left) m=0.3 (right) m=0.7 IDCases 0Not enough Introducers 1OOO 2OOX 3OXX 4XXX 5OO 6OX 7XX 8O 9X 10No Reply

Dept. of Computer Science & Engineering, CUHK26 Isolation of Malicious Nodes Rates to No. of Cycles with n=40, r=100, and Isolation of Suspicious Nodes in Cases 2,4,7 (left) m=0.3 (right) m=0.7 IDCases 0Not enough Introducers 1OOO 2OOX 3OXX 4XXX 5OO 6OX 7XX 8O 9X 10No Reply

Dept. of Computer Science & Engineering, CUHK27 Conclusions We developed a trust- and clustering-based public key authentication mechanism We defined a clustering-based network model with a balanced structure and a trust model that allows nodes to monitor and rate each other with quantitative trust values The authentication protocol proposed involves new security operations on public key certification, update of trust table, discovery and isolation of malicious nodes We conducted security evaluation to demonstrate the effectiveness of our solution