Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 4 Instructor: Haifeng YU.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
Marcin Poturalski, Manuel Flury,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Effectiveness of Distance Decreasing Attacks Against Impulse Radio Ranging Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves.
Data Consistency in Sensor Networks: Secure Agreement Fatemeh Borran Supervised by: Panos Papadimitratos, Marcin Poturalski Prof. Jean-Pierre Hubaux IC-29.
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks Reza Shokri Tutors: Panos Papadimitratos, Marcin Poturalski 29 January 2008.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Yih-Chun Hu Carnegie Mellon University
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Signalling Systems System which allows various network components to exchange information –In particular, it supports call / connection control network.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Sensor Node Architecture Issues Stefan Dulman
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
TICTOC -Topology-Discovery and Clock-Discovery TICTOC BOF IETF70 Stewart Bryant
Timing-sync Protocol for Sensor Networks (TPSN) Presenter: Ke Gao Instructor: Yingshu Li.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Vehicular Networking An introduction
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
A Multi-Channel MAC Protocol for Wireless Sensor Networks Chen xun, Han peng, He qiu-sheng, Tu shi-liang, Chen zhang-long The Sixth IEEE International.
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Energy-Optimal Online Algorithms for Broadcasting in Wireless Network Shay Kutten Hirotaka ono David Peleg Kunihiko Sadakane Masafumi Yamashita.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Hoda Jannati School of Computer Science
ADG 1 Fall 2013 Review A slide to a chapter summary of the material covered (based on the 8/e book)
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Security in Wireless Networks Mike Swift CSE b Summer 2003.
Cooperation and Directionality: Friends or Foes? Zhifeng Tao, Thanasis Korakis, Feilu Liu, Shivendra Panwar, Jinyun Zhang, Leandros Tassiulas IEEE ICC.
Energy-Efficient Protocol for Cooperative Networks.
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
GUIDED BY: N.SRIDHAR Assoc Professor Dept of IT GMRIT Rajam PROJECT MEMBERS: E.PRASAD BABU(06341A1214) G.SRIRAMULU(07341A1275) S.SRAVANI(07341A1272) P.KARTIKEYAN(06341A1233)
System Architecture for C2C Communications Based on Mobile WiMAX Michiyo ASHIDA VTT Technical Research Centre of Finland
TICTOC -Topology-Discovery and Clock-Discovery
Packet Leashes: Defense Against Wormhole Attacks
Presentation transcript:

Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1

Neighbor Discovery (ND) “Who are my neighbors?” In wireless networks: “Can I communicate directly with B?” Fundamental Building Block 2

Neighbor Discovery: Routing in ad-hoc networks C A 3 B

Naïve Neighbor Discovery A B “A: Hello” 4 A is a neighbor

Naïve ND: relay attack C B A “A: Hello” 5 A is a neighbor “A: Hello” PHY preamble… MAC A …… IP A …“A:Hello”…… PHY preamble… MAC A …… IP A …“A:Hello”……

Routing in ad-hoc networks: Violation of ND 6 B A C D M

7

ND is an important and fragile building block Secure ND protocols have been proposed – Distance Bounding Does not quite solve the problem… To what extent is secure ND possible? 8

Outline Model of wireless networks – language: set theory, 1 st order logic Specification of ND Investigate two classes of protocols: – Time-based (T-protocols) – Time- and Location-based (TL-protocols) Results: – T-protocol ND impossibility (general case) – T-protocol solving ND (restricted case) – TL-protocol solving ND (general case) 9

Model 10

Traces and events Trace is a set of events 11 A B C

SS  S,P Feasible traces System execution: feasible trace Traces feasible with respect to: - setting S - protocol P - adversary A 12  S,P,A 

Setting 13 { A, B, C, D, E, F, G, H } ……… H A C B D G F E

Trace  feasible wrt setting S Causal and timely message exchange A B 14 v – signal propagation speed

Trace  feasible wrt setting S Causal and timely message exchange 15

Local trace 16 A B

17 Local view

Protocol 18 Actions:

19 Correct nodes follow the protocol Trace  feasible wrt protocol

Trace  feasible wrt adversary 20 Adversarial nodes can only relay messages, with minimum delay A

21 Neighbor Discovery Specification

Neighbor Discovery specification 1)Discovered neighbors are actual neighbors 2)It is possible to discover neighbors 22 Protocol P solves Neighbor Discovery for adversary A if

Neighbor Discovery specification 1)Discovered neighbors are actual neighbors 2)It is possible to discover neighbors 23 Protocol P solves Neighbor Discovery for adversary A if in the ND range R … 2-party ND

Results T-protocol ND impossibility (general case) T-protocol solving ND (restricted case) TL-protocol solving ND (general case) 24

Results T-protocol ND impossibility (general case) T-protocol solving ND (restricted case) TL-protocol solving ND (general case) 25

T-protocol impossibility 26 No T-protocol can solve Neighbor Discovery for adversary if Proof (sketch): Any T-protocol P which satisfies ND 2 cannot satisfy ND 1

T-protocol impossibility 27 A B C A B

T-protocol impossibility 28 A B

T-protocol impossibility 29 A B A B C

T-protocol impossibility Trace  b is feasible in S b A declares B a neighbor in  b A and B are not neighbors in S b ND 1 is violated 30 A B C C A B

Results T-protocol ND impossibility (general case) T-protocol solving ND (restricted case) TL-protocol solving ND (general case) 31

Temporal packet leash: T-protocol solving ND 32

Results T-protocol ND impossibility (general case) T-protocol solving ND (restricted case) TL-protocol solving ND (general case) 33

TL-protocol solving ND “Geo-Temporal” packet leash: 34

Conclusion Investigation of Neighbor Discovery in wireless networks for two general classes of protocols T-protocols can solve ND iff TL-protocols can solve ND if 35

Conclusion Problems with proposed protocols: – require synchronized clocks – require very accurate time measurements – require line-of-sight communication (TL) – require secure location (TL) 36

Future work Reasoning about a wider range of protocols – e.g. Challenge-Response schemes Multi-party ND? Moving closer to the physical layer – ? 37