Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Symmetric Key Infrastructure Karel Masarik, Daniel Cvrcek Faculty of Information Technology Brno University of Technology
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Computer Science Public Key Management Lecture 5.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
30/04/2004Gene Tsudik, UCLA CSD Research Review1 Some Security Issues & Challenges in MANETs and Sensor Nets Gene Tsudik SCONCE: Secure Computing and Networking.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
GROUP N Charles Barrasso Carter May Chih-Yu (Joey) Tang.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
1 Secure Ad-Hoc Network Eunjin Jung
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Chapter2 Networking Fundamentals
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security fundamentals Topic 5 Using a Public Key Infrastructure.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
Security for Broadcast Network
Introduction to Active Directory
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Distributed security – Dynamic Group Key Management by Jaman Bhola
Presentation transcript:

Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok

Agenda Towards Flexible Credential Verification in Mobile Ad-hoc Networks by Keoh and Lupu Towards Flexible Credential Verification in Mobile Ad-hoc Networks by Keoh and Lupu Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups by Kim, Perring, and Tsudik Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups by Kim, Perring, and Tsudik Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks by Huang, Cukier, Kobayashi, Liu and Zhang Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks by Huang, Cukier, Kobayashi, Liu and Zhang

Towards Flexible Credential Verification in Mobile Ad-hoc Networks by Sye Loong Keoh and Emil Lupu Published in ACM Principles of Mobile Computing 2002

Goal and Assumptions Goal Goal Enable credential verification in an ad hoc environment given some natural limitations Enable credential verification in an ad hoc environment given some natural limitations Assumptions Assumptions Ad hoc networks are built around entities with a priori relationships Ad hoc networks are built around entities with a priori relationships E.g. wireless collaboration between colleagues in the same physical location E.g. wireless collaboration between colleagues in the same physical location Trust communications can occur “out of band” Trust communications can occur “out of band” Trusts must be established ahead of time Trusts must be established ahead of time E.g. trust of a certificate authority or individual making assertions E.g. trust of a certificate authority or individual making assertions Ad hoc networks will generally not have connections to verification services (e.g. on-line CA) Ad hoc networks will generally not have connections to verification services (e.g. on-line CA) Off-line verification is done using PGP-like “web of trust” model Off-line verification is done using PGP-like “web of trust” model Verifiers are more likely to have access to on-line resources like CA’s and CRL’s. Verifiers are more likely to have access to on-line resources like CA’s and CRL’s. Limited computational and storage resources Limited computational and storage resources Not enough storage to keep track of all possible public keys Not enough storage to keep track of all possible public keys

Security Assertions The Idea: The Idea: Use credential assertions instead of certificates, attributes, and repeated individual verification of credentials Use credential assertions instead of certificates, attributes, and repeated individual verification of credentials Each device has: Each device has: A key ring which contains trusted keys (including root certificates as needed) A key ring which contains trusted keys (including root certificates as needed) A public/private key pair A public/private key pair User policy for determining trustworthiness User policy for determining trustworthiness

1 Credential Assertion Statement Assertion Signature Statement Signed: Bob Signed: Alice Example Bob Alice 2 Alice verifies Bob’s signature and credentials on the CAS Alice generates ASS and sends it to Bob Bob generates CAS 3 Bob presents CAS and ASS’s to service for access Service 4 Service performs verification on the signature using its trusted key ring and individual policies

Benefits / Shortfalls Benefits Benefits User may have multiple CAS’s depending on usage User may have multiple CAS’s depending on usage Identity is self-asserted; only the authorization assertion is independently certified Identity is self-asserted; only the authorization assertion is independently certified Trust is not transitive (unless you design a trust this way) Trust is not transitive (unless you design a trust this way) Shortfalls Shortfalls In a complex environment would create lots of CAS’s; potentially one for each role In a complex environment would create lots of CAS’s; potentially one for each role Revocation can not be done (no place for the verifier to check). This could limit the duration for any ASS to remain valid. Revocation can not be done (no place for the verifier to check). This could limit the duration for any ASS to remain valid. Concept of trust is simplistic; does not extend to larger environments Concept of trust is simplistic; does not extend to larger environments

Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups by Yongdae Kim, Adrian Perring, Gene Tsudik Published in ACM Conference on Computer and Communications Security 2000

Goals Question: Question: How can we generate and maintain a common encryption key for a frequently changing group? How can we generate and maintain a common encryption key for a frequently changing group? Goals Goals The key generation should not be centralized (to ensure fault tolerance) The key generation should not be centralized (to ensure fault tolerance) Ensure certain security properties for our key Ensure certain security properties for our key Minimize the amount of network traffic associated with key changes Minimize the amount of network traffic associated with key changes

Cryptographic Properties 1. Group Key Secrecy – it is computationally infeasible for a passive adversary to discover any group key 2. Forward Secrecy – a passive adversary who knows a contiguous subset of old group keys cannot discover subsequent group keys 3. Backward Secrecy – a passive adversary who knows a contiguous subset of group keys cannot discover preceding group keys 4. Key Independence – a passive adversary who knows any proper subset of group keys cannot discover any other group key.

M1M1 M3M3 M4M4 M5M5 M6M6 M2M2 A Key Tree

Membership Events Join: a new member is added to the group Join: a new member is added to the group Leave: a member is removed from the group Leave: a member is removed from the group Merge: a subgroup is added to the group Merge: a subgroup is added to the group Partition: a subgroup is split from the group Partition: a subgroup is split from the group Key refresh: the group key is updated Key refresh: the group key is updated

Join M1M1 M3M3 M2M2 M1M1 M3M3 M4M4 M2M2

Leave M1M1 M2M2 M3M3 M4M4 M5M5 M2M2 M4M4 M5M5 M1M1

Conclusion

Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks by Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bede Liu and Jinyun Zhang Published in ACM Wireless Sensor Networks and Applications 2003

The problem Establishing keys securely across a sensor network Establishing keys securely across a sensor network Sensor nodes have very little hardware resources. Sensor nodes have very little hardware resources. Two types of encryption used Two types of encryption used Symmetric Key Encryption – Inexpensive Symmetric Key Encryption – Inexpensive Elliptic Curve Encryption – Expensive Elliptic Curve Encryption – Expensive Offloading the burden onto more powerful machines Offloading the burden onto more powerful machines Reducing Expense of Encryption Operations Reducing Expense of Encryption Operations Public key encryption is expensive Public key encryption is expensive Yet it needs to be done quickly Yet it needs to be done quickly Private key encryption is inexpensive Private key encryption is inexpensive Yet using one group key is insecure Yet using one group key is insecure How can we balance the two while still retaining speed and security? How can we balance the two while still retaining speed and security?

The Solution: Hybrid Authentication Approach Security Managers Security Managers More processing power than Sensor nodes More processing power than Sensor nodes Need to communicate with secure Certificate authority Need to communicate with secure Certificate authority Does not fit with the “Ad Hoc” paradigm - Server based Does not fit with the “Ad Hoc” paradigm - Server based Give the bulk of the work to the Security Manager Give the bulk of the work to the Security Manager Allows sensors to join/leave the network quicker Allows sensors to join/leave the network quicker Puts a major strain on the Security Manager Puts a major strain on the Security Manager Sensors will substitute elliptic encryption for symmetric key encryption Sensors will substitute elliptic encryption for symmetric key encryption Degrades security Degrades security Security Managers become more valuable targets Security Managers become more valuable targets Tradeoff Tradeoff

Conclusion Tradeoff between speed and security Tradeoff between speed and security Sensors will require less power, resources Sensors will require less power, resources Smaller, cheaper, faster Smaller, cheaper, faster Network authentication speed increased Network authentication speed increased Faster overall network performance Faster overall network performance

Questions?

Backup Slides

What is an Ad Hoc Network? Definition: A network which is created on demand, without fixed resources (servers, routers), such as used by wireless devices using short range communications Definition: A network which is created on demand, without fixed resources (servers, routers), such as used by wireless devices using short range communications Characteristics of Ad Hoc Networks Characteristics of Ad Hoc Networks No common resources (such as servers) – all resources must be contributed by the peers involved in the network No common resources (such as servers) – all resources must be contributed by the peers involved in the network Membership in the network may change often Membership in the network may change often Devices may have limited storage and computational power Devices may have limited storage and computational power Network is less reliable and bandwidth limited compared to fixed networks Network is less reliable and bandwidth limited compared to fixed networks