1 Survey Presentation Course: 60-564 Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Centre for Wireless Communications University of Oulu, Finland
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
ITIS 6010/8010 Wireless Network Security
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

1 Survey Presentation Course: Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal

2 Agenda  Introduction  The DSR Protocol  The SADSR Protocol  The SERAN for Security Equipment  Closing Remarks

3 Papers Reviewed  Ghazizadeh, S.; Ilghami, O.; Sirin, E.; Yaman, F.; “ Security-aware adaptive dynamic source routing protocol ”, Local Computer Networks, Proceedings. LCN th Annual IEEE Conference on 6-8 Nov Pages:751 – 760  Ben-Othman, J.; Xiaoyun Xue; “ SERAN: a new protocol to hide an equipment in ad hoc networks ”, Computers and Communication, (ISCC 2003). Proceedings. Eighth IEEE International Symposium on 30 June-3 July 2003 Pages: vol.1

4 Introduction  Wireless Networks  Infrastructured Network  Consists of fixed and wired gateways  Fixed base station (Access Point)  Nodes can move geographically  Ad Hoc (or Infrastructureless) Network  All nodes are mobile  Nodes communicate with each other  No centralized entity (base station, Access point)  Nodes are routers

5 Infrastructured Network

6 Ad Hoc Networks

7 Characteristics  Contain a large number of nodes  No pre-existing fixed network infrastructure  Can be deployed rapidly  Nodes can freely move around  Creation and deletion of network links  Dynamically variable topologies  Bandwidth constrained links  Energy constrained operation

8 The MANET Model  Nodes have fixed IDs (e.g. IP addresses)  Wireless communication devices  Nodes are powered with lightweight batteries that have limited life  Nodes have equal capability  Identical communication devices.  Nodes connectivity is not transitive

9 Routing in MANET  Challenging  Unpredictable node mobility  Dynamic topology variation  Nature of wireless media  Types  Flat  Hierarchical  Geo-assisted  Proactive and Reactive Protocols

10 Routing Protocols

11 Security in Ad Hoc Networks  Always a weak Point  Inherent quality of wireless media  Mobility of the nodes  Lack of centralized entity  Security Requirements  Availability, Confidentiality, Integrity, Authentication and Non-Repudiation  Threats  DoS, Impersonation, Byzantine Failure, Disclosure and Poor Physical Protection

12 The SADSR Protocol  Security-Aware Adaptive Dynamic Source Routing Protocol  Basic Idea  Non-malicious node detects malicious nodes  Non-malicious node Isolates malicious nodes  Goal is to Secure DSR Protocol

13 The DSR Protocol  Dynamic Source Routing Protocol  Reactive (on-demand)  Source-Routed  Each node maintains route caches containing the source routes  Updates it whenever it learns about new routes  two major phases  Route discovery  Route maintenance

14 Route Discovery Contd..  On-Demand  Check Route Cache  Initiates route discovery process  Broadcast a RREQ packet  Includes Source & Destination Address  Includes an unique ID  May be replied by intermediate nodes  May be replied by destination nodes

15 Route Discovery in DSR Ref: Padmini Misra ; “ Routing Protocols for Ad Hoc Mobile Wireless Networks “

16 Route Maintenance  Route Error Packet  Fatal transmission problem at its data link layer  Removes that hop from its route cache  All routes included that particular hop are truncated  Acknowledgment packets  Verify the correct operation of the route links

17 The SADSR  Secure DSR protocol by enhancing it  Non-malicious nodes  Detect malicious node  Isolate malicious node  Uses digital signatures to authenticate  Asymmetric cryptography  Keeps  Multiple routes for each destination  A local trust value for each node in the network  Each path is assigned with a trust value

18 The Attackers  External attackers  Inject erroneous routing information  Replay previous routing messages  Modify the valid routing information  Internal attackers  Trusted at some point of time  Not committed to their promises anymore  Compromised by external attackers  More difficult to detect  Isolate affected nodes  Pass traffic through special routes

19 Assumptions  Both External and Internal attackers exists  Malicious nodes are relatively small  All the connections are bidirectional  public key crypto is used  A secure CA in place  All nodes know the public key of CA,  Certificate issued on off line basis  Certificate bounds a nodes IP with its public key  The certificate obtained from CA never expires

20 The SADSR Protocol  Three different stages  Certificate Acquisition  Multi-path Route Discovery  Routing

21 Certificate Acquisition  Nodes obtain a certificate from CA  Issued in an off-line process  Certificates remain valid for entire lifetime  Security problem ?  Networks is set up for a certain time only  Certificate of node v  Nodes get public key of CA,

22 Multi-path Route Discovery  Initiation of Route discovery process  Generate RREQ message  Sign M  Appends, at the end of M,  Encrypted hash value of M,  Its certificate,  Broadcast M

23 Multi-path Route Discovery Contd..  Intermediate node  Checks if RREQ not too old  Verifies each signature with a probability p  Ensures its own signature is not in the sequence  Count is less then [(Max. No. of route, m)/2]  First RREQ msg. from a neighbor for same route  Signs it message  Re broadcast the message  Entries are discarded after a predefined time,

24 Multi-path Route Discovery Contd..  Destination node  Sets up a timer for the source node, S  Begin to reply  Replies all RREQ messages up to the number m  Non node-disjoint paths  Use 50% probability to reply  To ensure enough route in case of very few neighbor  Generate RREP message,  Signs M, Unicast back to S, using same path of RREQ  Intermediate nodes checks signature, signs, forwards  Rest of RREQs are dropped after time

25 Routing – Basic Idea  Nodes locally calculate and keep trust value (TV) of the other nodes  Based on the observations it has made so far  The trust values of the nodes in a path  Increase every time v successfully sends a message through that path,  Decrease if a message is lost or tampered with  Possible as ACK sent through the same path  TV of a path is the product of TVs of its nodes  For routing, paths with higher TV are preferred

26 Assignment of Trust Value  Each source node keeps track of  The paths through which it has sent packets  If it has received the acknowledgement through that path for the corresponding message  Uses two counters for each v in a path, and  The trustworthiness of v,  Trustworthiness of a path =

27 Sending Data Packets  For sending a data packet, source node  Chose a path randomly from available paths  s are likely to know m paths for d  Chance of a path to be chosen is proportional to its trust value  Appends a sequence number with the data packet  Appends the chosen path with the data packet  Signs the packet  Sends through the chosen path

28 Sending Data Packets Cont’d…  Intermediate nodes  Verify the signature of s with a probability p  Then forward the packet  Destination node  If data packet received through path,  Generate an acknowledgement  Signs M  Sends M to s through the same path, P  Intermediate nodes verify signature, forward

29 Updating Trust Values  The source node s maintains a table  of sequence numbers of packets sent  the path used and  a time stamp for time units  Receives a valid ACK  Awards each node on that path  Updates entries for each node on that path  Not -Receives a valid ACK after time  Assumes that the packet is lost  Punish each node on that path  Updates entries for each node on that path

30 Intermediate Link Failure  fails to communicate with  Generate a R.E.M.  Signs it  Sends it to s  The source node s, after receiving the M  Locate and eliminate all path containing the link

31 Security Analysis  The possible attacks on DSR protocol  Attacks on Route Discovery  Attacks on Routing  Fabrication of Route Error Messages  Denial of Service Attacks

32 Attacks on Route Discovery  Modification of source routes  content is changed?  Detected by signature verification  Some or all node info dropped?  No ACK can be reached to S  RREP modified?  Not reached S or discarded there  Route cache poisoning  Only the destination send back RREP  No snooping for intermediate nodes  Not participating in route discovery  Passive maliciousness, nothing can do

33 Attacks on Routing  In a Data Packet, may Modify  Data  Signature verification fails, No ACK  Routes  Not reach destination, No ACK  Dropping the Packets  Dropped packet, no ACK  Gradual isolation

34 False Route Error Msg. And DoS  Fabrication of Route Error Messages  Node may lie that a link is broken  Intermediate node do not snoop and update  Denial of Service Attacks  Sending RREQs with Fake IDs  Node broadcast may RREQ after spoofing IP  intermediate nodes will caught and get rid of some  Rest will be caught at the destination, no RREP  Still a successful attack can be made  Sending RREQs to a Fake Destination  All intermediate nodes will sign and rebroadcast  Currently nothing, but may be extended to keep TV for each S

35 Experimental Results

36 Experimental Results

37 The SERAN  Security Equipment protocol in Routing in Ad hoc Networks  A node is given ability  Use the ad hoc network but not provide resources  Hide itself from the network  Possible application  Conserving energy for critical node  Isolate congested node

38 Basic Idea  Neighbouring nodes know each others at the MAC layer  The protected node, communicate with a neighbor  A new layer, SERAN, between the IP and the transport layer

39 Basic Idea Cont’d…  Node needs an IP address to communicate with others  Dynamic IP address  Fixed IP addresses -> Normal node  No IP addresses -> Invisible node  Use of “Smart Cards”  Implementing DHCP in Smart Cards  Every time there is a communication  The smart card assigns a IP address to  Discards it after that session ended  Next time, assigns a different IP address

Ref: 40 The Smart Card

41 The Communication in SEARAN  Whenever there is an outgoing packet  Gets an IP address from the smart cards, pass the packet  After passing through the network layer, the address is discarded  the packet is uni-cast to including only the destination address in the SERAN header  The SERAN layer is capable of recognizing and sending the message to the destination.  The SERAN header includes the source MAC address to distinguish the real source.

42 The Communication in SEARAN  Incoming packet in the MAC layer, the card checks  The header of the packet to see if the packet’s destination MAC address is its own  If the packet contains the broadcast address ( ).  If any of these is true, then get a temporary IP address from the card and pass the packet to the IP layer.  The smart card is capable of decoding the header of the packets.

43 Evaluation of

44 Improvement

45 Advantages and Disadvantages  Advantages  Can keep a node secret  Protected node saves its energy  Protected node can send and receive rapidly  avoid “overflow routing table”, “sleep deprivation”  Disadvantages  Bad influence for the global routing  May reduce the number of multi-routes  Selection of still remains as an issue

46 Conclusions  Security is a weak point in ad hoc networks  The SADSR protocol is proposed to secure an existing protocol called DSR  Tests show that SADSR copes well in presence of malicious nodes  SERAN may be used to hide security equipment in ad hoc network  First known approach using smart card  Looking forward to a secure ad hoc network