1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
A Survey of Secure Wireless Ad Hoc Routing
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
An Advanced Signature System for OLSR Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
Multicasting in Mobile Ad-Hoc Networks (MANET)
Optimized Link State Protocol Version 2 Assaf Israel, Eli Nazarov, Asi Bross Version 2 Assaf Israel, Eli Nazarov, Asi Bross.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Routing and Routing Protocols Routing Protocols Overview.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Routing Protocols in Ad-hoc Networks, OLSR Self configuring systems (SCS) TTM3 – Høst 2004 Jørn Andre Berntzen 22/10/2004.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Simulation of the OLSRv2 Protocol First Report Presentation.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Ch 4. Routing in WMNs Myungchul Kim
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Advanced Technology Centre © BAE SYSTEMS All rights reserved. Slide 1 OLSR Simulation and Implementation Christopher Dearlove
Ad Hoc Network.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier March 20, 2003.
Routing Information Protocol
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Identity-Based Signatures for MANET Routing Protocols draft-dearlove-manet-ibs-00 Christopher Dearlove Presented by Ulrich Herberg.
1 Optimized Link State Routing Protocol for Ad Hoc Networks Jacquet, p IEEE INMIC Dec park gi won
NEMO RO Use Case, Issues & Requirements in the MANEMO Scenarios.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Introduction Wireless devices offering IP connectivity
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile ad hoc networking: imperatives and challenges
Other Routing Protocols
Presentation transcript:

1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove

2 29 September 2010 NATO IST-092 Symposium Overview Introduction: Mobile ad hoc networks (MANETs) Optimised Link State Routing (OLSR) New features in OLSR version 2 (OLSRv2) Packet/message format and security: Generalised packet and message format Packet/message authentication signatures Use of Identity Based Encryption (IBE) Link metrics and QoS: Link metrics Quality of Service (QoS) Conclusions

3 29 September 2010 NATO IST-092 Symposium MANETs Mobile ad hoc networks (MANETs): Connect wireless devices into a network. Cooperative, relays packets when out of direct contact. Self-organising and self-healing. MANETs are a good fit to many military, and public safety, scenarios: Soldiers in vehicles and dismounted. Aerial platforms as communications relays. Communications coverage of aircraft hangars and flight decks. Emergency services in underground railway stations, tunnels, etc. Sensor networks, and dual-purpose sensor/communications networks.

4 29 September 2010 NATO IST-092 Symposium Optimized Link State Routing (OLSR) OLSR is a widely used MANET routing protocol: Finds the relays to get packets to their destinations. Proactive link state routing protocol.  Discovers links, keeps a current topology graph, uses it to find routes. Optimisation based on definition and use of Multi-Point Relays (MPRs).  Minimises message flooding overheads, enables use of partial topology. OLSR is good, but not perfect. The IETF (Internet Engineering Task Force) is working on standardising OLSR version 2 (OLSRv2). OLSRv2 retains the key features of OLSRv1, such as MPRs. Improvements from OLSRv1 to OLSRv2 are described in paper.

5 29 September 2010 NATO IST-092 Symposium Major New Features in OLSRv2 Modular protocol, with three major components: OLSRv2, including other components by reference. NeighbourHood Discovery Protocol (NHDP). Generalised packet and message format (RFC 5444):  Multi-message packet.  Message header enables fast decision whether to process and/or forward.  Message body contains addresses, e.g. of self or neighbour, compressed.  Packets, messages, and addresses can have attributes added.  Attributes use a Type-Length-Value (TLV) structure.  Attributes used by OLSRv2 for validity time, link status, MPR signalling, etc. Links to have metrics, not just hop count Reported using TLVs. Shortest path routing using additive directional link metrics.

6 29 September 2010 NATO IST-092 Symposium Packet/Message Authentication Signatures A major security issue in MANETs is network integrity. Hostile devices can impersonate legitimate devices.  Can use same protocols, copied or false identities, etc. Hostile devices can e.g. become relays, but not forward traffic packets. Major step is to authenticate routing packets/messages. Can be achieved using packet/message cryptographic signatures. Reject packets/messages without valid signature. Hostile devices cannot become relays, etc. OLSRv2 allows signatures to be attached as packet/message TLVs. OLSRv1 immutable packet/message format causes signature problems. A B C X

7 29 September 2010 NATO IST-092 Symposium Signature Key Management and Identity Based Encryption Simplest approach is to pre-configure all devices with single shared secret. If one device is compromised, all are. Better approach would be for each device to have a unique secret. Can be done with conventional Public Key Cryptography (PKC): Needs pre-configuration about each device in all devices, vulnerable certificate authority, or certificates in messages. Another solution is using Identity Based Encryption (IBE): Variant of PKC where public key is identity – can use IP address. Each device is uniquely pre-configured prior to deployment.  No knowledge of other devices. More can be added later, unplanned. Computationally expensive, but for routing can be done in real time. Can create shared secrets for traffic encryption with no extra signalling. Good fit to unplanned, decentralised, ad hoc network.

8 29 September 2010 NATO IST-092 Symposium Link Metrics OLSRv1 only finds minimum hop routes. Often not best, e.g. three good links may be better than two poor links. OLSRv2 will include link metrics, to allow use of better routes. Meaning of metric (bandwidth, delay etc.) is outside scope of OLSRv2. Alternative metric types can be defined later without changing OLSRv2. Minimum hop route using OLSRv1 Route using OLSRv2 with suitable metric Good link Poor link

9 29 September 2010 NATO IST-092 Symposium Link Metrics and Quality of Service Link metrics can be a critical feature to support Quality of Service (QoS) in a MANET: Wireless networks often have poor, and variable, links. Link metric is directional, as radio link properties may be. Network layer routing enables heterogeneous MANETs, which have greater need to use the most appropriate links. Link metric type may be chosen as appropriate to network and traffic.  Examples: bandwidth, delay, loss rate, preservation of limited resource (e.g. battery power). Link metric must be specified so as to be additive.  Examples: logarithm of loss rate, suggested approximations for bandwidth. Use alongside other QoS mechanisms: Reservation, prioritisation, queue management, flow control, etc.

10 29 September 2010 NATO IST-092 Symposium An Example UAV relay Partitioned ad hoc network Unwanted use of UAV Wanted use of UAV High value metric links to UAV Low value links in ground network

11 29 September 2010 NATO IST-092 Symposium Conclusions OLSRv2 Improves on OLSRv1:  Generalised packet/message format aids extensibility.  Link metrics.  Numerous other improvements. Major improvements directly facilitate improvements against key requirements for military application of MANETs:  Security (network integrity) using packet/message signatures.  Quality of service. Standards Track in IETF.