An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Survey of Secure Wireless Ad Hoc Routing
Application of Bayesian Network in Computer Networks Raza H. Abedi.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Wireless Sensor Network Security Anuj Nagar CS 590.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A Study on Certificate Revocation in Mobile Ad Hoc Networks Wei Liu,Hiroki Nishiyama,Nirwan Ansari & Nei Kato ICC 2011 Nadia Adem 10/27/2014.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Computer Science and Engineering 1 Mobile Computing and Security.
A Clustering-based QoS Prediction Approach for Web Service Recommendation Shenzhen, China April 12, 2012 Jieming Zhu, Yu Kang, Zibin Zheng and Michael.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
ITIS 6010/8010 Wireless Network Security
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big Sky, MT, March 6-13, 2004

Dept. of Computer Science & Engineering, CUHK 2 Outline Introduction Related Work Models Security Operations Simulation Results Conclusion

Dept. of Computer Science & Engineering, CUHK 3 Mobile Ad Hoc Networks Infrastructure-less Multi-hops Wireless communications Highly mobile Dynamic topology Vulnerable to security attacks

Dept. of Computer Science & Engineering, CUHK 4 Introduction Certificate-based approach Fully distributed manner Detect false public key certificates Isolate dishonest users Propose a secure, scalable and distributed authentication service Assure correctness of public key certification

Dept. of Computer Science & Engineering, CUHK 5 Related Work Traditional network authentication solutions rely on physically present, trust third-party servers, or called certificate authorities (CAs). Partially-distributed certificate authority makes use of a (k,n) threshold scheme to distribute the services of the certificate authority to a set of specialized server nodes. Fully-distributed certificate authority extends the idea of the partially-distributed approach by distributing the certificate services to every node.

Dept. of Computer Science & Engineering, CUHK 6 Related Work Pretty Good Privacy (PGP) is proposed by following a web-of-trust authentication model. PGP uses digital signatures as its form of introduction. When any user signs for another user's key, he or she becomes an introducer of that key. As this process goes on, a web of trust is established. Self-issued certificates issue certificates by users themselves without the involvement of any certificate authority.

Dept. of Computer Science & Engineering, CUHK 7 Our Work Propose a secure public key authentication service in mobile ad hoc networks with malicious nodes Prevent nodes from obtaining false public keys of the others Based on a network model and a trust model Security operations include public key certification and trust value update

Dept. of Computer Science & Engineering, CUHK 8 Architecture Clustering-based network model Trust model with an authentication metric Security operations to detect and isolate malicious nodes

Dept. of Computer Science & Engineering, CUHK 9 The Network Model Obtain a hierarchical organization Minimize the amount of storage for communication information Optimize the use of network bandwidth Direct monitoring capability is limited to neighboring nodes Allow the monitoring work to proceed more naturally Improve network security

Dept. of Computer Science & Engineering, CUHK 10 The Network Model Divide the network into different regions Each region with similar number of nodes Unique group ID E.g. Zonal distributed algorithm, Weight base clustering algorithm, etc

Dept. of Computer Science & Engineering, CUHK 11 The Trust Model Define a fully-distributed trust management algorithm that is based on the web-of-trust model, in which any user can act as a certifying authority This model uses digital signatures as its form of introduction. Any node signs another's public key with its own private key to establish a web of trust Our trust model does not have any trust root certificate; it just relies on direct trust and groups of introducers in certification

Dept. of Computer Science & Engineering, CUHK 12 The Trust Model Define the authentication metric as a continuous value between 0.0 and 1.0 A direct trust is the trust relationship between two nodes in the same group A recommendation trust is the trust relationship between nodes of different groups

Dept. of Computer Science & Engineering, CUHK 13 Security Operations Select introducers Send request messages Compare certificates received Trust value update

Dept. of Computer Science & Engineering, CUHK 14 Authentication in our network relies on the public key certificates signed by some trustable nodes. Nodes in the same group are assumed to know each other by means of their monitoring components and the short distances among them Public Key Certification

Dept. of Computer Science & Engineering, CUHK 15 Operation of Node Select introducers Send request messages to introducers Collect and decrypt the messages Compare the certificates, isolate dishonest nodes Calculate trust value of the new node

Dept. of Computer Science & Engineering, CUHK 16 Trust Value Update s denotes the requesting node t denotes the target node Nodes i 1, i 2, …, i n are the introducers Each V s, i* and V i*, t form a pair to make up a single trust path from s to t V s,i 1 V s,i 2 V s,i n V i 1,t V i 2,t V i n,t

Dept. of Computer Science & Engineering, CUHK 17 Trust Value Update Compute the new trust relationship from s to t of a single path Combine trust values of different paths to give the ultimate trust value of t Insert trust value V t to the trust table of s

Dept. of Computer Science & Engineering, CUHK 18 Simulation Set-Up Network simulator Glomosim Evaluate the effectiveness in providing secure public key authentication in the presence of malicious nodes Simulation Parameters

Dept. of Computer Science & Engineering, CUHK 19 Metrics Successful rate  % of public key requests that lead to a correct conclusion Failure rate  % of public key requests that lead to an incorrect conclusion Unreachable rate  % of public key requests that cannot be made due to not enough number of introducers

Dept. of Computer Science & Engineering, CUHK 20 Ratings to Periods of Time

Dept. of Computer Science & Engineering, CUHK 21 Ratings to Malicious Nodes

Dept. of Computer Science & Engineering, CUHK 22 Ratings to Trustable Nodes at Initialization

Dept. of Computer Science & Engineering, CUHK 23 Comparison with PGP - Successful Rate

Dept. of Computer Science & Engineering, CUHK 24 Comparison with PGP - Failure Rate

Dept. of Computer Science & Engineering, CUHK 25 Comparison with PGP - Unreachable Rate

Dept. of Computer Science & Engineering, CUHK 26 Conclusions We developed a trust- and clustering-based public key authentication mechanism We defined a trust model that allows nodes to monitor and rate each other with quantitative trust values We defined the network model as clustering-based The authentication protocol proposed involves new security operations on public key certification, update of trust table, discovery and isolation on malicious nodes We conducted security evaluation We compared with the PGP approach to demonstrate the effectiveness of our scheme