Secure and Anonymous Mobile Ad-hoc Routing Jiejun Kong, Mario Gerla Department of Computer Science University of California, Los Angeles August 4, 2005.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad Hoc Networks Ravindra Vaishampayan Department of Computer Science University of California Santa Cruz, CA 95064, U.S.A. Advisor:
Advertisements

Proposed ad hoc Routing Approaches Conventional wired-type schemes (global routing, proactive): –Distance Vector; Link State Proactive ad hoc routing:
URSA: Providing Ubiquitous and Robust Security Support for MANET
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Motion-MIX Mobile Traffic Sensor Network vs. Motion-MIX : Tracing & Protecting Mobile Wireless Nodes # Jiejun Kong, # # Jiejun Kong, * Dapeng Wu, + Xiaoyan.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities Jiejun Kong Mario Gerla Jiejun Kong, * Xiaoyan Hong, Yunjung Yi, Joon-Sang Park,
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Multicast-Enabled Landmark (M-LANMAR) : Implementation and scalability YunJung Yi, Mario Gerla, JS Park, Yeng Lee, SW Lee Computer Science Dept University.
Exploiting the Unicast Functionality of the On- Demand Multicast Routing Protocol Sung-Ju Lee, William Su, and Mario Gerla
GeoLANMAR Routing: Asymptotic Analysis in Large and Dense Networks Broadnets 2005 Boston, Oct 5, 2005 Mario Gerla, Biao Zhou (UCLA) F. de Rango, S. Marano.
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
ANODR : AN onymous O n- D emand R outing with Untraceable Routes for Mobile Ad Hoc Networks MobiHOC 2003 June 3, 2003 Jiejun Kong, Xiaoyan Hong Wireless-Adaptive-Mobility.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
9/25/2000UCLA CSD Gerla, Kwon and Pei On Demand Routing in Large Ad Hoc Wireless Networks With Passive Clustering Mario Gerla, Taek Jin Kwon and Guangyu.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Security of Routing Protocols in Ad Hoc Wireless Networks presented by Reza Curtmola – Advanced Topics in Wireless Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Anonymous Path Routing Protocol in Wireless Sensor Networks Jang-Ping Sheu* §, Jehn-Ruey Jiang* and Ching Tu* National Central University* and National.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
KAIS T AO2P: Ad Hoc On-Demand Position- Based Private Routing Protocol IEEE Transactions on Mobile Computing Vol.4, No. 3, May 2005 Xiaoxin Wu
Multipath TCP in a Lossy ad hoc Wireless Network Medhocnet 2004 Bodrum, June 2004 Jiwei Chen, Kaixin Xu, Mario Gerla UCLA.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
Ad hoc Routing Protocols
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Secure and Anonymous Mobile Ad-hoc Routing Jiejun Kong, Mario Gerla Department of Computer Science University of California, Los Angeles August 4, ONR Meeting

2 Battle between Two MANETs Correlate nodes’ identities and their locations Visualize ad hoc routes Visualize mobile nodes’ motion patterns Disrupt ad hoc communications

3 Outline Adversary –Mobile traffic sensor Stop passive attacks –Privacy-preserving (anonymous) routing Anonymous On Demand Routing (ANODR) Stop active attacks –Secure routing Community-based Security (CBS)

4 The Adversary: Mobile Traffic Sensor Mobile traffic analyst –Unmanned aerial vehicle (UAV) –Coordinated positioning (tri-lateration / tri-angulation) can reduce venue uncertainty If moving faster than the transmitter, can always trace the victim venue

5 WASP Micro-Aerial Vehicle (MAV) Wingspan: 13 inches Combined wing structure (Lithium-Ion battery pack): 4.25 ounces (120 gm) Total weight of the vehicle: 6 ounces (170 gm) Power: 9 Watts during the flight. Flying time: 1 hour and 47 min

6 Outline Adversary –Mobile traffic sensor Stop passive attacks –Privacy-preserving (anonymous) routing Anonymous On Demand Routing (ANODR) Stop active attacks –Secure routing Community-based Security (CBS)

7 Proactive Routing vs. On-demand Routing Hiding network topology from adversary –Critical demand in mobile networks. If revealed, adversary knows who is where (via adversarial localization) Proactive routing schemes vulnerable –In OLSR, each update pkt carries full topology info –Network topology revealed to single adversarial sender On-Demand routing more robust to motion detection –AODV, DSR etc

8 Recent Anonymous On-demand Routing ANODR [MobiHoc ’ 03] : initiates anonymous on- demand routing MASK [Zhang et al.INFOCOM ’ 05], SDAR [Boukerche et al.,LCN ’ 04] –Like ANODR, route discovery is on-demand –Differs in Key agreement and data delivery ASR [Zhu et al., LCN ’ 04] –Nearly identical to ANODR, except some minor revisions

9 ANODR Revisited: The 1 st On-demand Anonymous Scheme ANonymous On Demand Routing On-demand, Identity-free routing –Identity-free routing: node identity not used & revealed (identity anonymity) –protects location & motion pattern privacy MASK and SDAR are not identity-free ASR (an ANODR variant) is also identity-free

10 Identity-free Routing  ANODR : destination E receives  RREQ, global_trap, onion  where Route-REQuest Route-REPly A E K A (hello) K B ( K A (hello)) K C ( K B ( K A (hello))) onion = K D ( K C ( K B ( K A (hello))))   RREP, global_proof, onion  B C D #E #D#D #C#C #B#B K C ( K B ( K A (hello))) K B ( K A (hello)) K A (hello)   RREP, global_proof, onion, # X  # X is a random packet stamp selected by X and shared on the hop K X (m) K X (m) denotes using symmetric key K (only known by X) to encrypt a message m

11 ANODR’s Identity-free Packet Flow

12 Evaluation: Delivery Ratio (vs. mobility) Delivery ratio degradation is small for efficient schemes like ANODR- KPS, but large for SDAR, ASR and unoptimized ANODR

13 Outline Adversary –Mobile traffic sensor Stop passive attacks –Privacy-preserving (anonymous) routing Anonymous On Demand Routing (ANODR) Stop active attacks –Secure routing Community-based Security (CBS)

14 Community Based Security (CBS) Stops active disruption attacks End-to-end communication between ad hoc terminals Community -to- Community forwarding (not node -to- node)

15 Community: 2-hop scenario Area defined by intersection of 2 collision domains Node redundancy is common in MANET –Not unusually high, need 1 “ good ” node inside the community area Community leadership is determined by contribution –Leader steps down (being taken over) if not doing its job (doesn ’ t forward within a timeout T forw ) Community

16 Community: multi-hop scenario The concept of “ self-healing community ” is applicable to multi-hop routing Communities source dest

17 Re-config: 2-hop scenario (PROBE, upstream, … ) (PROBE_REP, hop_count, … ) Old community becomes stale due to random node mobility etc. S D oldF newF Newly re-configured community Node D's roaming trace X no ACK PROBE PROBE_REP

18 Re-config: multi-hop scenario Optimization –Probing message can be piggybacked in data packets –Probing interval T probe adapted on network dynamics Simple heuristics: Slow Increase Fast Decrease source dest PROBEPROBE_REP X no ACK

19 Community Based Security In summary, in mobile networks haunted by non-cooperative behavior, community- based security has exponential gain P community P regular N N  

20 QualNet  simulation verification Perfermance metrics –Data delivery fraction, end-to-end latency, control overhead –# of RREQ x -axis parameters –Non-cooperative ratio  –Mobility (Random Way Point Model, speed min=max) Protocol comparison –AODV: standard AODV –RAP-AODV: Rushing Attack Prevention (WiSe ’ 03) –CBS-AODV: Community Based Security

21 Performance Gap CBS-AODV ’ s performance only drops slightly with more non-cooperative behavior Tremendous Exp Gain justifies the big gap between CBS- AODV and others %

22 Mobility’s impact

23 Less RREQ In CBS-AODV, # of RREQ triggered by an attack is less sensitive to non-cooperative ratio  Enforcing RREQ rate limit is more practical in CBS-AODV %

24 Multicast Security (MSEC) Testbed Resisting passive eavesdroppers IETF MSEC charter –Standard group key management using GCKS (Group Control / Key Server) –Centralized solution in the infrastructure Our testbed –Distributed GCKS backbone –Service provided by the nearest GCKS node –Automated load balancing and resistance to denial-of-service attacks

25 Summary Ad hoc networks can be monitored, disrupted and destroyed –More privacy-preserving (anonymous) routing to defend against passive enemy –More secure routing to defend against active enemy –Given comparable network resources, the most anonymous and most secure MANET wins ANODR has the best anonymity-performance guarantee –Better than other anonymous on-demand schemes CBS has exponential performance gain –Better than other secure routing paradigms