How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Dynamic Location Discovery in Ad-Hoc Networks
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Centre for Wireless Communications University of Oulu, Finland
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Wireless Sensor Network Security Anuj Nagar CS 590.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Network Topologies.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Time of arrival(TOA) Prepared By Sushmita Pal Roll No Dept.-CSE,4 th year.
A Survey of Secure Location Schemes in Wireless Networks /5/21.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security in Wireless Sensor Networks by Toni Farley.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
2/10/2016 Mobile Ad hoc Networks COE 549 Routing Protocols III Tarek Sheltami KFUPM CCSE COE
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Data Communication & Networking. Data communication Not to be confused with telecommunication –Any process that permits the passage from a sender to one.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Introduction Wireless devices offering IP connectivity
Packet Leashes: Defense Against Wormhole Attacks
Presented by Prashant Duhoon
Secure Verification of Location Claims
July 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Threats in IEEE PAC Date.
Protocols.
Protocols.
Presentation transcript:

How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology

Motivation  Wireless networks are more vulnerable to malicious attacks than wireline networks Lack of base station Limited power supply Dynamically changing topology  Demand for innovative security algorithms A lot of work has been done with private/public keys and cryptography Only a few studies address topology-related aspects of security

Problems  Dynamically changing topology  hard to distinguish between legitimate and malicious actions Attackers can cheat on their actual location  Intrusion detection must be performed in a distributed manner No base stations exist

Contribution  In this work.. We show how can the topological aspects of the network affect its safety from attackers We describe the four location estimation techniques We explain why these methods are vulnerable to attacks We present all current mechanisms that detect intrusions having to do with topological aspects We propose a new topology-related scheme that addresses most of the attacks

Attacks  Wormhole / tunnelling Two attackers create a tunnel that can be secretly used to transmit packets.  Fake location claim A node advertizes an erroneous location to its neighbours

Attacks

Relation to Topology  Fake location claims  Mobility allows a modification of the routing table of the victim node  Mobility of legitimate nodes may help attackers disperse their malicious information  Mobile nodes have power and computation limitations

Location Estimation  GPS (Global Positioning System) Satellites provide a 3-D position No information about positions of neighbour devices  Nodes must exchange their GPS information (dangerous) Was not designed for security purposes ● Attack: Attacker feeds the GPS receiver with fake GPS messages

Location Estimation  Radio (RF) Measure either the received RF signal strength, or the signal's ToF Receiver calculates the distance from the RF sender by measuring the signal strength.  The receiver must trust the sender for the power at which the latter sent the RF signal. - RF signals travel at the speed of light  attackers cannot decrease the ToF of the signal  ToF better

Location Estimation  Ultrasound (US) Measure the ToF of the sound signal between two nodes Often used together with the RF  Both the US and RF signals are transmitted at the same time. – Cannot be used outdoors – Animal – unfriendly – Attacker may use the RF link to send the US

Location Estimation  Infrared (IR) Measure ToF of the IR signal Disadvantage: a direct line-of-sight between the nodes is necessary  New links can be established by redirecting the existing light beams – Attacker cannot speed-up the signal from one node to the other: upper-bound distances

Previous studies  They are divided into 3 main categories: Private/public key authentication and management (beyond the scope of our study) Secure position-related ad hoc routing (interesting but we don't have time to talk about it now) Secure location verification of a node's claim

N. Sastry, U. Shankar and D. Wagner, "Secure Verification of Location Claims", EECS, University of California, Berkeley.  A set of verifiers V wish to verify whether a prover p is in a region R of interest Use of RF and US techniques  Time to reach p using RF + the time for the return of the packet using US  If elapsed time > threshold, V will reject the claim

N. Sastry, U. Shankar and D. Wagner, "Secure Verification of Location Claims", EECS, University of California, Berkeley.  Receiver's processing delay must be considered Attack: submit a position claim at the border of R  At the same time, advertise an erroneous value for processing delay  V thinks that p is inside R when in fact it is not  Solution: V shrinks the allowable area V should reject the claim when the claimed position is within Dp * s of the outside border

N. Sastry, U. Shankar and D. Wagner, "Secure Verification of Location Claims", EECS, University of California, Berkeley.  Region of acceptance (ROA)

N. Sastry, U. Shankar and D. Wagner, "Secure Verification of Location Claims", EECS, University of California, Berkeley.  Region R is not always a circle Use more verifiers to cover the whole area  No key management or cryptography required.  No synchronization between V and p is required.  Problem: is advertised Dp the actual one?

 1. Use of Verifiable Multilateration It is performed by a set of verifiers S. Capkun et. al, "Location Verification And Key Management In Wireless Networks", MSc thesis, EPFL 2004

 2. Use of Verifiable Time Difference of Arrival A set of verifiers is also used S. Capkun et. al, "Location Verification And Key Management In Wireless Networks", MSc thesis, EPFL 2004

 Use of Landmarks S. Capkun et. al, "Location Verification And Key Management In Wireless Networks", MSc thesis, EPFL 2004

 Secure distributed positioning Basic Distance Verification (BDV) S. Capkun et. al, "Location Verification And Key Management In Wireless Networks", MSc thesis, EPFL 2004

Possible new scheme

Conclusion  The security aspects of the wireless network are closely related to its topology  Currently there is no optimal solution on many intrusion problems New intelligent attacks are invented all the time Difficult to design a general solution  Hot research subject Slide theme: Tom Karygiannis