Study and Implementation of Efficient Security for Wireless Networks 8/25/20151 M. Razvi Doomun Faculty of Engineering University of Mauritius

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
1 Routing Techniques in Wireless Sensor networks: A Survey.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Security Issues In Sensor Networks By Priya Palanivelu.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Ad Hoc Wireless Routing COS 461: Computer Networks
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Traffic Analysis Prevention Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Off By One Power-Save Protocols Corey Andalora Keith Needels.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Self-stabilizing energy-efficient multicast for MANETs.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Wireless Protocols WEP, WPA & WPA2.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Presentation transcript:

Study and Implementation of Efficient Security for Wireless Networks 8/25/20151 M. Razvi Doomun Faculty of Engineering University of Mauritius Project Supervisor: Prof. K.M.S. Soyjaudah Research Week 2009/2010 Doctoral Consortium e-Poster

Objectives Design efficient security and privacy mechanisms for resource-constrained wireless networks Analysis of operational complexity and efficiency of IEEE i security protocol Propose integrated security and privacy of source and destination in ad hoc wireless networks against global attackers. 2

Energy-efficient security protocol can be achieved by: Software optimization techniques and better hardware implementation, or a combination of both, for constituent cryptographic operations. Use equivalent alternative cipher primitives that consume less energy Reduce workload of a security protocol Modify or simplify the structure of security protocol components Frame formatting, minimize redundant operations and overheads Innovative and energy-aware security provisioning with flexible security framework Different combinations of security primitives for different security requirements at different operating conditions M. R. Doomun, K.M.S. Soyjaudah, “Adaptive IEEE i security for energy-security optimization,” In Proceedings of The Third Advanced International Conference on Telecommunications AICT ’07, IARIA- Mauritius, May, 2007.

General Energy Cost of Security Protocol

Comparative complexity of WEP, TKIP, AES-CCMP Complexity of TKIP is proportional to the message size encrypted With message size less than 100 bytes, TKIP has faster execution speed than AES-CCMP Complexity of CCMP increases linearly with increasing key length, more encryption rounds, as well as larger payload size. CTR-mode and CBC-MAC contributes almost equally to the overall complexity of CCMP M. R. Doomun, K.M.S. Soyjaudah, D. Bundhoo, “Energy Consumption and Computational Analysis of Rijndael-AES,” In Proceedings of Third IEEE International Conference in Central Asia on Internet The Next Generation of Mobile, Wireless and Optical Communications Networks, September 26-28, M. R. Doomun and K.M.S. Soyjaudah, “Analytical Comparison of Cryptographic Techniques for Resource Constrained Wireless Security”, International Journal of Network Security, Vol.9, No.1, pp. 82–94, July 2009.

Complexity comparison of WEP, TKIP and CCMP

M. R. Doomun, K.M. Sunjiv Soyjaudah, “Modified Temporal Key Integrity protocol for efficient wireless network security,” In Proceedings of International Conference on Security and Cryptography (SECRYPT 2007) IEEE, Spain, July M. R.Doomun and K.M.S. Soyjaudah “LOTKIP: Low Overhead TKIP optimization for Wireless Ad hoc Networks” International Journal of Network Security (IJNS).

Communication Privacy Traffic analysis in large wireless ad hoc networks Passive attack Reveal contextual information Direction of traffic flow, nodes with high packet transmission rate Locate of source and destination nodes Traffic analysis countermeasures: Use multipath to spread the network traffic Use anonymous routing techniques All packets encrypted link-by-link 8

Two types of attackers Local attacker : Eavesdrop on transmitted packets around one node at a time Does not know the overall network traffic flow Global attacker : Visualize the overall network traffic flow Capable of network-wide traffic rate monitoring and time- correlation attacks. Network-wide rate monitoring attack involves counting the number of transmitted/received packets around every node in the network. Time-correlation attack involves finding the communication patterns by analyzing latencies between packet transmissions around nodes in the network. 9

Models and Assumptions (1) Network model Ad hoc grid-distribution or random-distribution network nodes MAC and routing protocol messages are encrypted Assume existing key management protocol that can distribute pair-wise keys between nodes or public-private key pairs for each node All packets are transmitted in the same format and have same length (by padding or fragmenting). Route discovery communications are assumed to be anonymous using any of the anonymous routing protocols 10

Models and Assumptions (2) Attacker Model An external, global, and powerful attacker model Attacker is passive and cannot compromise nodes in the network Knowledge of network topology and can keep statistical measurements for all of the network traffic A possible method for this attack is by deploying an overlay network with several malicious nodes simply to sense traffic from the given ad hoc network

Privacy Evaluation Metrics Anonymity The level of anonymity is defined as the probability that a node of interest is incorrectly identified in an anonymous group Depends on the number of nodes in the anonymous zone If a node is hidden among A nodes that have the same behavior, then the level of anonymity Unlinkability 3-D graph of transmitted data around nodes to determine whether or not a global attacker can visualize the existence of communication between a source and destination. Edge detection algorithms to extract traffic pattern Entropy If node i transmits u i packets and a total of V packets were transmitted in the network in time T, the fraction of packets sent by i is p i = u i /V and the entropy is defined as 12

Privacy Protocol (1) Initialization Source node S broadcasts a hello message to discover all its one - hop neighbors N (1, i ) for i = 1,2, …, m, where m is the total number of neighbor nodes. The nodes in N (1, i ) discover their respective neighbors N (2, i ) which are two - hops away from node S. Consequently, source node S constructs the list : N (1, i ), N (2, i ), N (3, i ), …, N ( k, i ), where N ( k, i ) is the set of k th hop neighbors of node S. This initialization process of neighbor discovery is done periodically by all nodes in the network. 13

Privacy Protocol (2) Cloud Construction Let the cloud region be of maximum width k hops from the source S. For e. g, with k = 3, source node S will randomly select a number of nodes, B < 4 k ( k +1), such that B  { N (1, i )  N (2, i )  N (3, i )}. Nodes in cloud B Marked as pseudosources in the cloud Requested to transmit encrypted dummy packets at a rate similar to the source transmission rate Forward real packets when available from source to delegated sources. Drop dummy packets.

Privacy Protocol (3) Destination node D : do same initialization procedure & also construct a cloud. Size of the source and the destination clouds can be different. Delegated Source and Delegated Destination Node S randomly selects one or more nodes from the set B to act as delegated sources. ( D will do the same ) R. Doomun, T. Hayajneh, P. Krishnamurthy and D. Tipper, “SECLOUD: Source and Destination Seclusion using Clouds for Wireless Ad Hoc Networks”, IEEE Symposium on Computers and Communications (ISCC) Tunisia, 5-8 July, 2009.

Simulation 400 nodes distributed in an area of 2000m x 2000m with average node degree between 7 and 8. Quasi-Unit disk graph (Q-UDG) The source sends 5000 data packets in a time window of T seconds The attacker: Will sample n of the nodes that have the highest number of packets transmitted in T and computes the average value U of packets transmitted. Will mark nodes that transmit at least βU packets where 0<β< 1. Will vizualize graph of nodes, the number of packets transmitted and the marked nodes to determine possible communication paths, sources, and destinations. We pick n = 10 in our simulations. Different values of n and β will create sharp or fuzzy boundaries in the graph 16

17 Results Privacy Technique With single Source-Destination With multiple paths

Example of Security-Privacy Policy Decision Matrix

Conclusions Complexity overhead analysis of existing i wireless security mechanisms Optimizing execution of TKIP and AES - CCM algorithm by minimizing redundant operations and reducing communication overhead E.g. Low Overhead TKIP & Resource Saving AES-CCMP Design with Hybrid Counter Mode Block Chaining –MAC Anonymity level and transmission overhead analysis of existing communication privacy mechanisms Communication overhead cannot be reduced without sacrificing some privacy strength because hiding traffic pattern comes at a cost. Future / Ongoing work Develop privacy techniques for better seclusion for both, source and destination nodes location Adaptive and resource - aware security - privacy model provides more efficient energy consumption