Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

This Material Will Not be In Final Exam. Cross-Site Scripting (XSS)
Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
Security Issues in Mobile Ad hoc Networks
By Md Emran Mazumder Ottawa University Student no:
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Survey of Secure Wireless Ad Hoc Routing
URSA: Providing Ubiquitous and Robust Security Support for MANET
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Yih-Chun Hu Carnegie Mellon University
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Challenge: Securing Routing Protocols Adrian Perrig
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Security of Routing Protocols in Ad Hoc Wireless Networks presented by Reza Curtmola – Advanced Topics in Wireless Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Ch 6. Security in WMNs Myungchul Kim
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
By Ajith U Kamath Project
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Packet Leashes: Defense Against Wormhole Attacks
Mobile ad hoc networking: imperatives and challenges
An Overview of Security Issues in Sensor Network
Presentation transcript:

Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors

Outline Introduction Security  Security functions  Challenges Classification of attacks Solutions Conclusions References

Introduction Ad Hoc Networks  Characteristics Cost effective Autonomous (stand-alone self organized system) Wireless medium Lack of fixed infrastructure (flexible, reconfigurable) Dynamic topology Limited resources

Security Security functions  Authentication  Confidentiality  Integrity  Non-repudiation  Availability

Security (cont.) Challenges  Vulnerable channels  Vulnerable nodes  No infrastructure => centralized authority or on- line servers difficult to maintain  Dynamic topology  Resource constraints  Different requirements, for different types of applications

Classification of attacks By their source  Internal  External By their type  Passive: eavesdropping, traffic monitoring and analyzing  Active: data altering, route information changing, service disrupting By the mechanisms they attack  Basic mechanisms: routing disruption and resource consumption  Security mechanisms: key management

Classification of attacks (cont.) By the layer at which they occur  Physical layer: communication jamming, eavesdropping, message interception  Data link layer: traffic analysis and monitoring, service disruption  Network layer: route discovery: message flooding, routing table overflow, routing cache poisoning route maintenance: false control messages data forwarding: wormhole attack, blackhole attack other complex attacks: sleep deprivation, location disclosure  Transport layer: session hijacking  Application layer: repudiation, mobile virus, worm attacks

Solutions “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, Yih-Chun Hu, Adrian Perrig, David. B. Johnson  Protection against wormhole attacks  Packet leashes  geographical  the recipient of the packet is within a certain distance from the sender  each node must know its own location; all nodes must have loosely synchronized clocks  temporal  the packet has an upper bound on its lifetime which restricts the maximum travel distance  tightly synchronized clocks (dt in the order of a few microseconds or hundreds of nanoseconds)  transmission time+speed of light or expiration time for the packet

Solutions “Security-Aware Ad Hoc Routing for Wireless Networks”, Seung Yi, Prasad Naldurg, Robert Kravets  protection against blackhole attack  SAR protocol: uses AODV as a platform  Integrated security metric within the RREQ and RREP packets  The discovered routes come with “quality of protection” guarantees  User identity is bound with an associated trust level => impersonating attacks are prevented with stronger access control mechanisms  For each trust level, it is used a simple shared secret to generate a symmetric encryption/decryption key  SAR provides a suite of cryptographic techniques: digital signature, encryption

Solutions “A secure Routing Protocol for Ad Hoc Networks”, Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer  Authenticated Routing for Ad hoc Networks (ARAN) protocol: uses public key cryptography  A managed-open environment with minimal security policy: authentication, message integrity, non-repudiation  Nodes obtain a public key certificate from a common certificate authority  Route discovery: source floods a digitally signed Route Discovery Packet (RDP); destination sends a digitally signed Route Reply packet back to the source (REP)

Conclusions Undiscovered threats and attacks Current solutions address specific problems A general defense system may be impossible to develop! A lot of research still has to be done

References Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions”, IEEE Wireless Communications, February 2004 Adam Burg, “Ad hoc network specific attacks”, Seminar on Ad hoc networking: concepts, applications, and security, Technische Universitat Munchen, 2003 Levente Buttyan, JeanPierre Hubaux, “Report on a Working Session on Security in Wireless Ad Hoc Networks”, 2002 JeanPierre Hubaux, Levente Buttyan, Srdan Capkun, “The Quest for Security in Mobile Ad Hoc Networks”, MobiHOC 2001 Seung Yi, Robin Kravets, “Practical PKI for Ad Hoc Wireless Networks”, August 2001 Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer, “A secure Routing Protocol for Ad Hoc Networks”, 2002

References (cont.) Lidong Zhou, Zygmunt J. Haas, “Securing Ad Hoc Networks”, 1999 YihChun Hu, Adrian Perrig, “A survey of Secure Wireless Ad Hoc Routing”, IEEE Security&Privacy, 2004 Seung Yi, Prasad Naldurg, Robert Kravets, “SecurityAware Adhoc Routing for Wireless Networks”, 2002 Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, “Providing Robust and Ubiquitous Security Support for Mobile AdHoc Network”, 9th International Conference on Network Protocols, 2001 Navid Nikaein, “Think Like an AdHoc Network” Yih-Chun Hu, Adrian Perrig, David. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, September 2002

Thank you! Questions?