Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec. 2006.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
By Md Emran Mazumder Ottawa University Student no:
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Centre for Wireless Communications University of Oulu, Finland
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Survey Presentation Course: Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Applied Cryptography for Network Security
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Network Security David Lazăr.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Outline Introduction Existing solutions for ad hoc
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
CSE 4905 Network Security Overview
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
by Saltanat Mashirova & Afshin Mahini
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
Routing in Mobile Ad-hoc Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec. 2006

Agenda Overview of ad hoc networks (MANET) Characteristics Risks and threats : (Kinds of attacks) Criteria for securing ad hoc network Some possible solutions Suggestion (Securing – ZRP protocol) Corrections & Discussion

Overview of ad hoc networks (MANET) Mobile nodes equipped with wireless Interfaces No established Infrastructure Self Organized No Centralized Control Network topology changes dynamically

Characteristics May be out of wireless transmitter range of others Need to use other nodes as routers for forwarding Find new routes after movement or change Xteristic It’s characteristics makes it most vulnerable

Ad Hoc networks Ad hoc networks depend on honest cooperation: -You forward packets correctly and honestly for me, and: -I’ll forward packets correctly and honestly for you Two general areas of security lapses: -Lack of cooperation -Forging routes and maliciously breaking routes

Risks and threats Two sources of threats External attackers -Inserting erroneous routing updates -Replaying old routing information -Changing routing updates Internal Attackers (node) -Malicious node advertises incorrect routing information

Two kinds of Attacks Passive attacks - Attempt to discover valuable information by listening to the routing traffic (Eavesdropping of data) Active attacks - Modification and deletion of exchanged data - Spoofing -Routing table overflow

Criteria for securing ad hoc network Isolation – Identify misbehaving nodes and make them unable to interfere with routing Lightweight computations. – Confine heavy computing task to the least possible number of nodes (battery power protection) Location privacy – Protect information about the location of nodes in a network and the network structure (location disclosure) Self-stabilization – Automatically recover from any problem in a finite amount of time without human intervention. Certain discovery – Always possible to find the available route (routing table overflow, rushing attack)

Some possible solutions Encrypt all Data (confidentiality) - Ensure that all data are encrypted before sending Trusted Route Discovery – Send packets via trusted routes to avoid internal attacks Redundant paths – Increase route robustness by providing more route choices Hierarchical structure or zone-based routing – Provide foundation for authentication and local link state routing

Possible Solutions... Attack traffic pattern detection – Validate destination sequence Intrusion detection – Monitor behavior of suspected hosts for intrusion detection Authentication among hosts – Prevent impersonation (spoofing) Encrypt and authenticate all packets with a key

Suggestion and Contribution: Protocols Drawback Handling of compromised nodes still a problem Protocols Discussed Proactive (Table Driven): DSDV Reactive (on-demand): DSR, AODV, ARAN Hybrid: ZRP

Suggestion and Contribution: Securing – ZRP protocol Diffie-Hellman Key Agreement Alice generates a random private value a and Bob generates a random private value b. Both a and b are drawn from the set of integers. Alice Bob Alice and Bob derive their public values using parameters p and g and their private values Alice's public value is g a mod p Bob's public value is g b mod p Alice and Bob exchange their public values Alice computes g ab = (g b ) a mod p Bob computes g ba = (g a ) b mod p Since g ab = g ba = k, Alice and Bob now have a shared secret key k

Secure Diffie-Hellman Key Agreement Obtain a public/private key pair and a certificate for the public key prior to execution The immunity is achieved by allowing Alice and Bob to authenticate themselves to each other by the use of digital signatures and public-key certificates Alice Bob Suggestion and Contribution: Secured – ZRP protocol During the protocol, Alice computes a signature on certain messages, covering the public value g a mod p. Bob proceeds in a similar way covering the public value g b mod p. Man-in-the-middle could still intercept message between the parties BUT cannot forge signatures without Alice's private key and Bob's private key. This enhances the defeats of the man-in-the-middle attack.

Conclusion Problems may still persist due to: Dynamic network environment: -Nodes may move at any time (and often) - Nodes may join and leave the network Standard security services such as : Integrity, Authentication, Non-Repudiation None of these satisfy ad hoc network security needs: Reasons... - Can’t force nodes to cooperate or detect all cases when they do not -Can’t protect against a compromised node sending malicious routing packets

Difference between AODV and DSR protocols The main difference between both protocols is that in DSR a source routing option is used; i.e. when a node wants to send something to a destination it sets the whole route for that packet, indicating the addresses of the terminals it has to pass through. In this sense all packets have a DSR header included, and it is needed that all nodes within the ad hoc network know the whole network topology. On the other hand, AODV does not perform source routing at all; when a terminal wants to send something to a destination, it checks its routing table, looking for the next hop towards that destination, and sends the packet to it, and so on. In this sense, data packets "travel" through the ad hoc network without any AODV specific information.