Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Chapter 14 – Authentication Applications
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
URSA: Providing Ubiquitous and Robust Security Support for MANET
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Centre for Wireless Communications University of Oulu, Finland
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Aggregation in Sensor Networks
1 Secure Ad-Hoc Network Eunjin Jung
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Ad Hoc Network.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Security Outline Encryption Algorithms Authentication Protocols
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu

Department of Computer Science and Engineering, The Chinese University of Hong Kong2 Outline Background Related Work Trust-Level Based Authentication Services Self-Initialization Certificate Renewal Future Work Discussion & Conclusion

Department of Computer Science and Engineering, The Chinese University of Hong Kong3 Mobile Ad Hoc Network An ad hoc network is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. Nodes of ad hoc networks are often mobile, apply wireless communication (MANET) Applications –Personal area networks –Military communications –Sensor networks –Disaster area networks Background

Department of Computer Science and Engineering, The Chinese University of Hong Kong4 Characteristics Dynamic network topology Limited physical security Limited bandwidth Energy constrained nodes Natures of ad hoc networks make them vulnerable to security attacks Passive eavesdropping Denial of service attacks by malicious nodes Attacks from compromised entities or stolen devices Background

Department of Computer Science and Engineering, The Chinese University of Hong Kong5 Vulnerabilities – Traditional network vs Ad hoc network Wired network –Adversary must gain physical access to wired link –Adversary has to sneak through security holes at firewalls or routers Ad hoc network –Wireless links give poor physical protection –Mobile nodes are capable of roaming independently –Decentralized management Background

Department of Computer Science and Engineering, The Chinese University of Hong Kong6 Key Management Security in networks widely rely on key management mechanisms Trust third party (TTP) is an entity trusted by all users and is often used to provide key management services Certificate authorities (CA) is a public key management system responsible for issuing and revoking certificates A certificate binds the identity of an entity to its public key Background

Department of Computer Science and Engineering, The Chinese University of Hong Kong7 Public Key Encryption We use public key encryption to secure the network It can obtain non-repudiation, confidentiality, integrity and authentication Adversary can defeat the system by impersonation when entities are exchanging public keys, or alter the public file containing public keys Public key cryptography requires the authenticity of public keys Background

Department of Computer Science and Engineering, The Chinese University of Hong Kong8 Related Work Traditional network authentication solutions rely on TTP or CA Popular network authentication architectures include X.509 and Kerberos. Some model on hierarchical CAs Ad hoc network is infrastructureless No centralized server for key management Related Work

Department of Computer Science and Engineering, The Chinese University of Hong Kong9 Related Work Pretty Good Privacy (PGP) is proposed following a web of trust authentication model. A node rely on trusted PGP users to introduce others Threshold secret sharing can distribute the functionality of centralized CA server among a fixed group of servers Proactive secret sharing can improve robustness by updating secret keys periodically Related Work

Department of Computer Science and Engineering, The Chinese University of Hong Kong10 Related Work Partially distributed certificate authority –makes use of a (k,n) threshold scheme to distribute the services of CA to a set of specialized server nodes –requires rich network connectivity among group of servers Fully distributed certificate authority –extends certificate services to every nodes and a threshold number of neighboring nodes can collaboratively act as a authentication server –requires enough neighboring nodes Related Work

Department of Computer Science and Engineering, The Chinese University of Hong Kong11 Related Work Self-issued certificates –Issues certificates by users themselves without the involvement of any certificate authority –Any pair of users can find certificate chains to each other using their certificate repositories –Problem exists if certificates issued did not reach certain amont Related Work

Department of Computer Science and Engineering, The Chinese University of Hong Kong12 Primitives Adopt fully distributed certificate authorities approach Combine the authentication services with trust level concept Apply weighted threshold secret sharing instead of general threshold secret sharing scheme Extend certificate services not limited to neighboring nodes using trust chains Trust-Level Based Authentication Services

Department of Computer Science and Engineering, The Chinese University of Hong Kong13 Authentication Services Flowchart Trust-Level Based Authentication Services With valid certificate state High increase in trust level Request for one more polynomial share Join into the network Request for a polynomial share Request for a certificate With valid certificate Certificate renewal Certificate expires? Yes No

Department of Computer Science and Engineering, The Chinese University of Hong Kong14 Trust Model A trust model defines how the nodes in the network trust each other Past work on authentication services just define trust model to be - a node with valid certificate can be trusted in the network We add in the concept of trust level We define that each node keeps a trust value to each of its neighboring nodes Trust-Level Based Authentication Services

Department of Computer Science and Engineering, The Chinese University of Hong Kong15 Trust-Level Concept We define the trust value to be floating number between 0.0 and 1.0 Trust value from node vj to node vi represents the level of trust that node vj towards vi The value is based on the observation on node’s behavior Generally, a node is believed to be trustable if its trust value is above the level of 0.5 Trust-Level Based Authentication Services

Department of Computer Science and Engineering, The Chinese University of Hong Kong16 Trust-Level Concept Neighboring nodes received request message will check the trust level of the nodes send / forward it the message r r r 1. Send request message 3. Reply the message 2. Check trust levels Trust-Level Based Authentication Services

Department of Computer Science and Engineering, The Chinese University of Hong Kong17 Assumptions Each node has a unique ID Each node can discover its one-hop neighbours Communication link within one-hop neighbours is reliable. The mobility is characterized by maximum node moving speed Each node maintains a trust value to each neighbors A node holds a limited number of polynomial shares Trust values on a path can form a trust chain. Trust-Level Based Authentication Services

Department of Computer Science and Engineering, The Chinese University of Hong Kong18 Number of Polynomial Shares per Node Each node holds a number of polynomial shares for initialization and certification A node can hold maximum c shares Each node and each share has a unique ID Self-Initialization Node IDShare IDs 11, 2, …, c 2c+1, c+2, …, 2c 32c+1, 2c+2, …, 3c …… k(k-1)*c+1, (k-1)*c+2, …, k*c …… n(n-1)*c+1, (n-1)*c+2, …, n*c

Department of Computer Science and Engineering, The Chinese University of Hong Kong19 Request for More Polynomial Share A node gets 1 polynomial share when it joins the network It can request for more polynomial share if its trust level is high enough some time later A field “trust level increased” can be added in the reply message in certification A node can make more contribution to certification and initialization if it holds more shares Self-Initialization

Department of Computer Science and Engineering, The Chinese University of Hong Kong20 Algorithm Apply the localized self-initialization algorithm A node vi broadcasts its request for a polynomial share Nodes reply to vi with their partial shares Let a 1, a 2, … a k be the polynomial share IDs received by vi, the corresponding polynomial share are P a1, P a2, … P ak Self-Initialization

Department of Computer Science and Engineering, The Chinese University of Hong Kong21 Algorithm Each node calculates their partial share and return it to vi: P j = P aj * L aj (a i ) mod N where mod N By Lagrange Interpolation, vi can generate a new polynomial share P ai : P ai = f (a i ) = P a1 *L a1 (a i ) + P a2 *L a2 (a i ) + … + P ak *L ak (a i ) = = mod N Self-Initialization

Department of Computer Science and Engineering, The Chinese University of Hong Kong22 Number of Partial Certificate in Reply Assume node vj holds K polynomial shares Each share can sign one partial certificate Trust level to no. of partial certificate Certificate Renewal Trust level (vj to vi)No. of partial certificate vj to vi x<1/20 1/2<= x <½+1/41 ½+1/4<= x <½+1/4+1/82 …… ½+1/4+…1/(2^(K-1))<= x <½+1/4+…1/(2^K)K-1 ½+1/4+…1/(2^K)<= x <=1K

Department of Computer Science and Engineering, The Chinese University of Hong Kong23 Number of Partial Certificates in Reply A node decide number of partial certificates to reply based on the trust level of the requesting node Trust value (ranges from 0.0 to 1.0) 123 K …. Divisions of trust level Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong24 Number of Nodes Required Nodes may sign more partial certificates to a node with high trust level No. of nodes required varies though no. of partial certificates required is fixed kNo. of shares a node holds Min. no. of nodes in a coalition Max. no. of nodes in a coalition K1-CK/CK Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong25 Trust Relationship of Nodes Certification is not limited to neighboring nodes with our trust level model Nodes have never met can determine each other trustable or not by a trust chain Trust values can be calculated to a single value with formula viv2v2 v1v1 V2V1 Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong26 Trust Relationship of Nodes Formula we use: V1  V2 = 1 - (1-V2) V1, where V1  V2 represents the trust level from v1 to vi Analysis on the formula If V1 is high (v1 trusts v2), V1  V2 will be closer to V2 (the view of trust from v2 to vi) ; vice versa viv2v2 v1v1 V2V1 V1 \ V Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong27 Trust Relationship of Nodes Trust value (v5 to vi) = 0.9  0.8 = 1 - (1-0.8) 0.9 = Trust value (v6 to vi) = 0.5  0.8 = 1 - (1-0.8) 0.5 = Number of partial certificate in reply Partial certificates in reply vi v3v3 v4v4 v1v1 v2v2 v5v5 v6v6 2 1 Trust relationship from arrow left to arrow right. vi v3v3 v4v4 v1v1 v2v2 v5v5 v Trust values of different nodes Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong28 Algorithm A node vi broadcasts certificate renewal request Nodes vj sign partial certificates by their polynomial shares and reply to vi Let the k polynomial shares involved be P a1, P a2, … P ak The shares can generate partial certificates using the formula: CERT aj = (cert) Paj mod N Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong29 Algorithm Upon receiving at least k such partial certificates, node vi picks k to form the coalition B Suppose, vi chooses {CERTa 1, CERTa 2, …, CERTa k }, where a1,a2, …, ak are the IDs of the corresponding polynomial shares, candidate certificate can be generated: CERT’aj = (CERTaj) Laj(0) mod N where mod N vi then multiplies {CERT’a 1, CERT’a 2, …, CERT’a k }, CERT’ = mod N vi can employ K-bounded coalition offsetting algorithm to recover its new certificate CERT Certificate Renewal

Department of Computer Science and Engineering, The Chinese University of Hong Kong30 Protocol Certificate Renewal q0q0 w0 c0c0 cjcj ajaj rj qjqj Request? a0a0 < k(Cert j )CERT 0 Request? Cert j Request? >=k(Cert j ) CERT 0 Node makes the requestNodes receive the request s2s2 s1s1 IOIO I: input message received O: output message sent Protocol on certificate renewal Node makes the request q0: making a request w0: waiting for the replies c0: received k or more replies, request successes a0:received less than k replies, request fails Nodes received the request qj: receive a request rj: requesting node is trustable, send reply aj: requesting node is not trustable, no reply is sent cj:receive the new certificate from the requesting node

Department of Computer Science and Engineering, The Chinese University of Hong Kong31 Future Work Simulation will be carried out To evaluate the performance of our authentication services Possible simulators can simulate ad hoc networks are Ns-2, glomosim, etc Main difficulty is how to modify the C++ and Otcl codes in Ns-2 for simulation Future Work

Department of Computer Science and Engineering, The Chinese University of Hong Kong32 Discussion Trust-level concept –Formalizes the authentication services in network –Classifies the trust of nodes by levels –Allows weighted threshold secret sharing and trust chain be applied Weighted threshold secret sharing –Speeds up collection of enough shares in certification and initialization –Nodes can make more contribution with high trust level –Coalition size decreases dynamically according to trust level of nodes Trust chain –Allows nodes never met to determine the trust of each other –Reduces the problem of not enough neighboring nodes in certification and initialization Discussion

Department of Computer Science and Engineering, The Chinese University of Hong Kong33 Conclusion We studied the characteristics, vulnerabilities and key management techniques of mobile ad hoc networks We proposed a scalable distributed authentication services to secure mobile ad hoc networks We combined trust level concept and fully distributed CA approach to provide authentication services We applied weighted threshold secret sharing scheme We extended the services to non-neighboring nodes by trust chains Simulation will be carried out in the future Conclusion

Department of Computer Science and Engineering, The Chinese University of Hong Kong34 Q & A