Network Security Security in Wireless Ad Hoc Networks 1 Network Security Chapter 8. Security in Wireless Ad Hoc Networks.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Security Awareness: Applying Practical Security in Your World
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
IEEE Wireless Local Area Networks (WLAN’s).
Secure Routing in Ad Hoc Wireless Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Routing and Routing Protocols
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Introduction to Dynamic Routing Protocol
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
An Analysis of Bluetooth Security
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
IWD2243 Wireless & Mobile Security Chapter 4 : Security in Wireless Ad Hoc Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Determining IP Routes.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Chapter 7 – Confidentiality Using Symmetric Encryption.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Routing and Routing Protocols
Cisco Systems Networking Academy S2 C 11 Routing Basics.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
IP Routing Principles. Network-Layer Protocol Operations Each router provides network layer (routing) services X Y A B C Application Presentation Session.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Chapter 3: Open Systems Interconnection (OSI) Model
Security Of Wireless Sensor Networks
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Presentation transcript:

Network Security Security in Wireless Ad Hoc Networks 1 Network Security Chapter 8. Security in Wireless Ad Hoc Networks

Network Security Security in Wireless Ad Hoc Networks 2  Introduction  Routing in Multihop Ad Hoc Networks  Key Establishment and Authentication  Confidentiality and Integrity –Loopholes  Bluetooth Objectives

Network Security Security in Wireless Ad Hoc Networks 3 Additional slide for the previous week.

Network Security Security in Wireless Ad Hoc Networks 4 Additional slide for the previous week.

Network Security Security in Wireless Ad Hoc Networks 5 Introduction What is Ad Hoc Network? What is the characteristic?

Network Security Security in Wireless Ad Hoc Networks 6  Ad Hoc Networks –Network formed on-the-fly (ad hoc, or as-needed basis) –Mainly refer to Wireless Ad Hoc network  Mobile Ad Hoc Networks(MANETs) –Nodes forming the network are mobile.  Usage scenario What is Ad Hoc Network?

Network Security Security in Wireless Ad Hoc Networks 7  No dedicated routing devices –Nodes themselves have to act as routers  Network topology may change rapidly and unpredictably as nodes move.  Other things – Battery life, bandwidth. Limitations

Network Security Security in Wireless Ad Hoc Networks 8 Classification  Geographically –Personal area networks(PANs) –Wide area networks(WANs)  Node’s capability of acting as router –Single-hop ad hoc network –Multi-hop ad hoc network – nodes have routing capability.  Normally –PAN – Single hop –Ad hoc LAN & Ad hoc WAN – multi-hop

Network Security Security in Wireless Ad Hoc Networks 9 Routing in Multi-hop Ad Hoc Networks Why routings are problem in a Multi-hop Ad Hoc Network?

Network Security Security in Wireless Ad Hoc Networks 10 Distance Vector Routing Updates(FYI)

Network Security Security in Wireless Ad Hoc Networks 11 Distance Vector Routing Updates(FYI)  RIP – Hop Count  IGRP and EIGRP – Bandwidth, Delay, Reliability, Load No! MTU is never used as a routing metric. Some documentation is incorrect on this item.

Network Security Security in Wireless Ad Hoc Networks 12 Distance Vector Routing Protocols-(FYI) “Routing by rumor” Each router receives a routing table from its directly connected neighbor routers. Router B receives information from Router A. Router B adds a distance vector number (such as a number of hops), which increases the distance vector. Then Router B passes this new routing table to its other neighbor, Router C. This same step-by-step process occurs in all directions between neighbor routers.

Network Security Security in Wireless Ad Hoc Networks 13 Distance Vector Routing Protocols-(FYI)

Network Security Security in Wireless Ad Hoc Networks 14 Distance Vector Network Discovery-(FYI) Routing Update

Network Security Security in Wireless Ad Hoc Networks 15 Distance Vector Network Discovery-(FYI) Routing Update

Network Security Security in Wireless Ad Hoc Networks 16 Distance Vector Network Discovery-(FYI) Convergence!

Network Security Security in Wireless Ad Hoc Networks 17  Modify existing link state or distance-vector routing protocol –Existing link state : OSPF –Existing distance-vector : RIPv2  Periodically distribute routing information.  Based on this information, each router maintains routing table which entries are best paths for a destination network.  Short forwarding delay.  Lots of overhead and battery life – network topology information distribution.  Suitable for a network where the number of nodes is small and nodes have limited mobility. Proactive Routing

Network Security Security in Wireless Ad Hoc Networks 18  Work by computing a route only when it is needed.  To forward a packet. 1) discover the route to the destination 2) sends out the message.  Saving bandwidth and battery life – do not require periodic transmission of messages.  Long forwarding delays.  Most suitable for a network  dynamic topology  A large number of nodes in the network. Reactive Routing

Network Security Security in Wireless Ad Hoc Networks 19 Hybrid Routing  Combine the advantage of proactive routing and reactive routing  Example : Zone Routing Protocol (ZRP)ZRP –Divide the network into zone –Within a zone (tire-1) – run reactive routing protocols. –Inter-zone – run proactive routing, inter zone message – routed via zone gateway. zone gateway forms tire-2 network.

Network Security Security in Wireless Ad Hoc Networks 20  Routing in ad hoc network is based on cooperation among nodes in the network. – inherent trust relationship among nodes –Attractive target for attacks.  Attacking source –External attacks – attack from external nodes (not part of the network) –Internal attacks – compromised node  Attacking type –Injecting erroneous routing information –Replying old routing information –Distorting routing information  Results –Unintended network partitioning, excessive traffic load, loops in the network, insufficient routing, total collapse of the network Routing Attacks

Network Security Security in Wireless Ad Hoc Networks 21 Routing Attacks  Internal attacks are more harder to detect – challenging field –Information is invalid ? Network topology change? Sending node compromised? Compromised node even can generate valid signature.- hard to detect.

Network Security Security in Wireless Ad Hoc Networks 22  Multiple path with sufficient valid nodes –Bypass the compromised nodes.  ARAN (Authenticated Routing for Ad Hoc Networks) –On-demand routing –PKI-based – signing routing massage using private key. –Heavy processing overhead –Does not protect against internal attack from compromised nodes.  SAR (Security-aware Ad Hoc Routing) –Use Symmetric Key Cryptography. – assign a trust level to each node. – Nodes at the same trust level shares symmetric key. – routing message is encrypted/decrypted Secure routing

Network Security Security in Wireless Ad Hoc Networks 23 Secure Routing  Non cryptographic approach – Sergio Marti et al. –Watchdogs Per-link encryption is not applied. listen to the next node’s transmission to find out it forwards the packet correctly. –Pathraters Combines the information collected from the watchdogs with the routing table information to select the most robust routing links. –Weakness Hidden node problem – possibility of collision at the watchdog (hidden node) or the receiver.  corrupt the information collected by watchdog. Does not prevent against internal routing attack (aim to network partition) Network partition – break a link between two nodes in the same network in some way.

Network Security Security in Wireless Ad Hoc Networks 24 Key Establishment and Authentication

Network Security Security in Wireless Ad Hoc Networks 25  Basis of most key establishment and authentication schemes for multi-hop ad networks.  PKC & PKI –use certificate to provide cryptographic service (confidentiality, authentication, data integrity, non-repudiation) –every node trust a third party (Certificate authority)  Roles of CA in PKI 1.Bob  CA : request Alice’s Public key. 2.CA  Bob: Certificate K iCA { Alice’s Public key is K WA } 3.Bob : decrypt the certificate (verify the CA’s signature) with CA’s public key and obtain Alice’s public key. 4.Now Bob trust Alice’s public key.  In Ad Hoc network −distribute CA’s functionality −Define virtual CA. −Use threshold cryptography – threshold secret sharing. Threshold Secret Sharing

Network Security Security in Wireless Ad Hoc Networks 26  Threshold cryptography –Divide the system secret into Q parts –Any S(< Q) of these parts are enough to carry out a cryptographic operation. – Q nodes poses shares of the system secret and any S of the node can work in coalition. –Ex) the concept of threshold cryptography f(x) = ax 2 + bx + c. f(x) : cryptographic function. a, b, c : secret parameter. each 5 nodes have a different valid point for a given secret a, b, c if 3 nodes points is enough to reconstruct the cryptographic function. Threshold Secret Sharing

Network Security Security in Wireless Ad Hoc Networks 27  Server in virtual –Initialize securely its share of the system secret. –A server knows the public key of all nodes which can join the ad hoc network.  Authentication in PKC 1.A  B : rand 2.B  A : E iB (rand) 3.A : decrypt B’s response and compare two rand value.  Authentication in threshold PKC 1.A  * : request B’s certificate 2.CA server  combiner : partial certificate for B 3.Combiner : generate complete certificate with S partial certificate. 4.Combiner  A : B’s certificate. Threshold Secret Sharing

Network Security Security in Wireless Ad Hoc Networks 28 Threshold Secret Sharing (TSS)  How to verify the validity of complete key. –Public key of the virtual CA is known to all nodes. –Combiner can verify the complete certificate by decrypting the complete certificate. –If verifying fails, combiner can use another partial certificate.  What if the combiner is compromised? –Assign the role of combiner to a server which is more secure. –Use multiple combiners. To protect against attack over long term period – periodically update the shared secrets.  What was the assumption in the TSS? –Secure initialization of shares secrets on Q servers. –Each server can be configured securely with the public keys of all nodes which can potentially join the ad hoc network. –How to reduce the dependency of the system on this assumption? – see text p.209.

Network Security Security in Wireless Ad Hoc Networks 29  After Authentication, perform a suitable key establishment protocol to establish a session key for the confidentiality and integrity service.  Because of limited processing power, most ad hoc would prefer to use stream cipher for encryption and an integrity algorithm. But be careful to use stream cipher in wireless environment. Confidentiality and Integrity

Network Security Security in Wireless Ad Hoc Networks 30 Bluetooth

Network Security Security in Wireless Ad Hoc Networks 31  Wireless ad hoc networking technology  Operates in the unlicensed 2.4GHz frequency range (Industrial Scientific and Medical (ISM) band).  Geographical coverage limited to personal areas networks (PAN)  Point-to-point and point-to-multipoint links  Support synchronous and asynchronous traffic  Concentrate on single-hop traffic.  FHSS with GFSK modulation  Low power and low cost given important consideration  Adopted as the IEEE PHY and MAC standard. (Wireless Personal Area Network standard ) Features of Bluetooth

Network Security Security in Wireless Ad Hoc Networks 32 Applications of Bluetooth  Cell phone  Interconnecting the various components (keyboard, mouse, monitor, ….) of PC.  Imagine your application?

Network Security Security in Wireless Ad Hoc Networks 33 Bluetooth Basics  Piconet concept –one master and up to seven active slaves (8 devices in a cell) –A device may participate in more than one piconet simultaneously.  Scatternet – joining more than two piconets. – rare in commercial deployments : routing and timing issue.

Network Security Security in Wireless Ad Hoc Networks 34 Security Modes  Only focus on Single-hop piconets in this study  Bluetooth define layer 1 & 2 protocol.  For the wide range application, tried to solve the problem of interoperability. –Defines application profiles (pf).  Application pf –Defines an unambiguous description of the communication interface between two Bluetooth devices or one particular service or application. –Basic pf - Fundamental procedure for Bluetooth communication. –Special pf – defined for distinct service or applications –Build new pf with existing pf  allowing hierarchical pf.

Network Security Security in Wireless Ad Hoc Networks 35 Profiles in Bluetooth  Each service or application selects the appropriate pf depending on its needs.  Each application may have different security requirements  Each pf may define different security modes.  GAP (Generic Access profile) – Discover Bluetooth device – Link management

Network Security Security in Wireless Ad Hoc Networks 36 Bluetooth Protocol stack

Network Security Security in Wireless Ad Hoc Networks 37 Security Modes  Security mechanism – implemented in Layer 2 link level.  Bluetooth security does not provide end-to-end security.  Dose not deal with application layer security  Implementation –Authentication procedure – must –Encryption procedure – may or may not  But usages are different aspect –master and slaver decide the use of each procedures

Network Security Security in Wireless Ad Hoc Networks 38 Security Modes  Modes 1 : Unsecured mode –If peer wish to auth. – another peer must respond to the challenge. –If peer with to enc.- another peer most use enc if it supports it.  Modes 3 : always on security mode –Always initiate authentication –Encryption is not compulsory term. –If peer want encryption  left to higher layer  Modes 2 : intermediate –All things are left to higher layer security manager.

Network Security Security in Wireless Ad Hoc Networks 39 Security levels  Device level : "trusted device" and "untrusted device.“ –Trusted device have unlimited service access  Services security levels: – Services that require authorization and authentication. – Services that require authentication only. – Services that are open to all devices

Network Security Security in Wireless Ad Hoc Networks 40 Key Establishment

Network Security Security in Wireless Ad Hoc Networks 41 Pass Key  Top level key = Pass-Key (PKEY), –Variable PKEYs – chosen at the time of pairing chosen at the time of pairing user enters during pairing process Usage scenario : conference room Bluetooth network with notebook. –Fixed PKEYs Preconfigured into the Bluetooth device. Usage scenario : network between the headset and cell phone. – can be as long as 127bits (not specify the exact length) – PKEY  Link Key If PKEY is small the dictionary attack is possible.

Network Security Security in Wireless Ad Hoc Networks 42 Initialization Key( K INIT )  Short-lived temporary key.  Used only during the pairing process.

Network Security Security in Wireless Ad Hoc Networks 43 Link Key( LK )  Shed secret when the pairing sequences ends.  Unit link key –Deprecated because of the security holes.  Combination link key –Derived from existing link key When devices are repeatedly communicate, store this link key to reuse. Maintain pairs –Derived from initialization key( K INIT )  3 source of link key –Use an existing link key. –Use an existing link key to generate a fresh link key. –Use the initialization key K INIT to generate a link key.

Network Security Security in Wireless Ad Hoc Networks 44 Combination Link Key Generation  K START : existing LK or K INIT

Network Security Security in Wireless Ad Hoc Networks 45 Encryption Key( CK of K C )

Network Security Security in Wireless Ad Hoc Networks 46  Because of export restriction( key size limitation ) Implemented in hardware using linear feedback and feed forward registers.  Payload Key (K P ) Constraint Key( K c ’ ) & Payload Key

Network Security Security in Wireless Ad Hoc Networks 47 Broadcast Key Hierarchy  Unicast : a master  a slave  Broadcast : a Master  * (with special address) overlay key can then be used for conveying the Master Key to each of the slaves.  Temporary key, never reused

Network Security Security in Wireless Ad Hoc Networks 48  E0 : stream cipher  E1,E3, E21, E22 : 128bit block cipher SAFER+ (was a candidate of AES) The Algorithms

Network Security Security in Wireless Ad Hoc Networks 49  Two party : –Claimant (claims a certain identity), verifier –Master and slave can acts as verifier depends on the upper layer. Who is the verifier depends on higher layers Authentication

Network Security Security in Wireless Ad Hoc Networks 50  ACO : used to generate KC (encryption key). –Serves to link authentication process to rest of the session. –For mutual authentication two ACOs – last ACO is used in KC gen. Authentication

Network Security Security in Wireless Ad Hoc Networks 51 Confidentiality

Network Security Security in Wireless Ad Hoc Networks 52  Access code - unencrypted –derived from masters MAC address of a piconet. –Uniquely identifies a piconet. - Identify the packet for the piconet. –Used by slave to synchronize their clock to the master’s closk.  Header : not encrypted  Payload : encrypted –CRC is appended before encryption. –Stream cipher – in a wireless medium, a security loophole. Changing the key per packet. – CK-VAL (changes every 625 usec) Bluetooth Packet Format

Network Security Security in Wireless Ad Hoc Networks 53  CRC – same loopholes as WEP (Chapter 7).  Some Attacks on Bluetooth –Algebraic attack and correlation attack on E0 frequent payload key change protect correlation attack. –Packet header no protection – Link Layer Attack. –Snarf attack – possible to connect to a cell without the knowledge of the owner. Can access phone book, calender, clock, IMEI (clone) –Ericsson, Nokia –Backdoor attack –BlueBug Integrity Protection

Network Security Security in Wireless Ad Hoc Networks 54  Bluetooth – IEEE Potentials Bluetooth – IEEE Potentials  Bluetooth Security White paper – IEEE Bluetooth expert Group. Bluetooth Security White paper  Security in Bluetooth, WLAN and IrDA: a comparison Security in Bluetooth, WLAN and IrDA: a comparison  Bluetooth Security – with some summary on the attacks Bluetooth Security – with some summary on the attacks Resources