Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Secure Ad-Hoc Network Eunjin Jung
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
An Energy-Efficient Flooding Algorithm in ad hoc network(APE) Concrete Mathematic mid-term presentation of term project Professor: Kwangjo KimKwangjo Kim.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ITIS 6010/8010 Wireless Network Security
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech

Wireless Service Access Users Service Access Points

Wireless Service Access (cont’d)  Ad Hoc Networking  No fixed infrastructure  Collaborative support of the network operation  Peer-to-peer interaction  Transient associations  No administrative boundaries

Wireless Service Access (cont’d)  Stringent service level requirements  Shared and limited network resources  ‘Quality’ of the communication paths becomes important  Data rate  Delay  Path reliability  Route discovery protocols that convey path attributes are necessary

Problem and Challenges  Seemingly legitimate users, with access privileges, can get high-quality service access while systematically depriving other users from their sought service level  Adversaries can mislead other nodes that the discovered routes are better or worse than they actually are  Authentication cannot solve the problem

Problem and Challenges (cont’d)  The ad hoc networking environment introduces vulnerabilities  Each and every node can disrupt the network operation  No central authority and monitoring facility  Difficult or impossible to distinguish between benign and malicious faults  Frequent network changes

Solution  Secure Discovery of Route Attributes  Secure Routing Protocol for QoS-aware routing (SRP-QoS) between a pair of communicating end nodes  Accurate quantitative description of the discovered path attributes  Wide range of route selection and traffic handling schemes is enabled to configure communication

Network Model  Network node  Unique identity, V  Public/private keys E V, D V  Networking protocols module  Wireless communication module  Primitives: Send L (V,m), Bcast L (m), Receive L (m)  Links: Up, Down

Network Model (cont’d)  Each end node knows the identity and the public key of its peer end node  All nodes know the identities and the public keys of their neighbors  Benign nodes comply with the protocol rules  Adversaries deviate or actively disrupt the network operation

Network Model (cont’d)  Definition 1: Independent adversaries are network nodes that can modify, forge, or replay routing or data packets, but ignore received traffic that does not comply with the operation of the networking protocols  Definition 2: Arbitrary adversaries deviate from the protocol execution in an arbitrary (Byzantine) manner

Secure Route Discovery Specification  N: set of nodes  E: set of unordered pairs of distinct nodes, i.e., links or edges  Route: sequence of nodes V i  N and edges e i,i+1 =(V i, V i+1 )  E  is function that assigns labels to edges, denoted as link metrics m i,i+1  Route metric:  Actual metric:

Secure Route Discovery Specification (cont’d)  Let t 1 and t 2 >t 1 two points in time  t 2 is the point in time at which the routing protocol discovers a route Secure Routing Protocol S, T  N (S,T) - route and a sequence of labels

Secure Route Discovery Specification (cont’d)  Loop-freedom: an (S,T)-route is loop-free when it has no repetitions of nodes  Freshness: an (S,T)-route is fresh with respect to the (t 1,t 2 ) interval if each of the route’s constituent links is up at some point during the (t 1,t 2 )  Accuracy: an (S,T) route is accurate with respect to a route metric g and a constant Δ good >0 if:

SRP-QoS Operation  Nodes estimate metrics for their incident links  For link (V i,V i+1 ), V i calculates and V i+1 calculates  For some  >0,   is a protocol-selectable and metric-specific threshold that allows for metric calculation inaccuracies  is the maximum metric calculation error by a correct node

SRP-QoS Operation (cont’d) S V1V1 V3V3 V2V2 T 1234 Route Request (RREQ): S, T, Q SEQ, Q ID, MAC(K S,T, S, T, Q SEQ, Q ID ) 1.S broadcasts RREQ; 2.V 1 broadcasts RREQ, {V 1 }, { }; 3.V 2 broadcasts RREQ, {V 1,V 2 },{ }; 4.V 3 broadcasts RREQ, {V 1, V 2, V 3 },{ };

SRP-QoS Operation (cont’d)  RREQ processing  PreviouslySeen(RREQ) routine  For each relayed RREQ, V i initializes a ForwardList  V i adds a neighbor V i+1 to ForwardList iff V i+1 is overheard relaying RREQ with NodeList={NodeList, V i+1 } and MetricList={MetricList, } and  Temporarily stores m S,i

SRP-QoS Operation (cont’d) S V1V1 V3V3 V2V2 T Route Reply (RREP): Q ID, {T, V 3, V 2, V 1, S}, { }, MAC (K S,T, Q SEQ, Q ID, T, V 3, …, V 1, S, ) 5. T → V 3 : RREP; 6. V 3 → V 2 : RREP; 7. V 2 → V 1 : RREP; 8. V 1 → S : RREP;

SRP-QoS Operation (cont’d)  RREP processing  If V i is T’s predecessor, check  V i checks if, where is the aggregate of the links metric values reported in the RREP for links (V k,V k+1 ), k<i

SRP-QoS Properties  Metric types ,  If, can be written as where

SRP-QoS Properties (cont’d)  Metric types ,

SRP-QoS Properties (cont’d)

Conclusions  Wireless ad hoc networking domains are a double-edged sword  SRP-QoS enables a general QoS-based route selection even in the presence of adversaries  More information: