Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security Issues In Sensor Networks By Priya Palanivelu.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Research Trends in MANETs at CIIT, Islamabad Mohammad Mahboob Yasin, PhD COMSATS Institute of Information Technology.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Yih-Chun Hu Carnegie Mellon University
Challenge: Securing Routing Protocols Adrian Perrig
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
presented by Luba Yelovich-Sakharuk
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
1 Timed Efficient Stream Loss-tolerant Authentication.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Security for Broadcast Network
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes Haowen Chan, Adrian Perrig Carnegie Mellon University 1.
Packet Leashes: Defense Against Wormhole Attacks
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Presentation transcript:

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson Presented by : Varagur Karthik Iyer Adapted from the slides by: Qiao Xu, CSC774 Spring04 4/26/2007

Outline Introduction Temporal Leashes TIK Protocol Performance & Security Analysis Future Work & Conclusion 4/26/2007

Introduction Problem: Wormhole Attack Solution: Packet Leash An attacker records packets at one location of the network, tunnel them to another location, and retransmits them there into the network Wormhole attack allows attackers to: Gain unauthorized access Disrupt routing Perform DOS attacks Solution: Packet Leash Add information into the packet to restrict its maximum allowed transmission distance 4/26/2007

Illustration of a wormhole attack A mobile wireless ad hoc network Nodes S and D communicate through wireless multi hop routing Normal Operation S D 4/26/2007

Illustration of a wormhole attack A mobile wireless ad hoc network Nodes S and D communicate through wireless multi hop routing Under Attack Colluding Attackers S Wormhole D 4/26/2007

Packet Leashes Goal Approaches S Wormhole D Limit the distance traveled by a packet in a network Approaches Two approaches to the achieve the goal Space : geographical leashes Limit the range of the packet using the distance it can travel Time : Temporal Leashes Limit the range of the packet using the time it remains valid Colluding Attackers S Wormhole D 4/26/2007

Geographical Leashes (Overview) Definition: a geographical leash establishes an upper bound on the distance that a packet can travel Requirements Every node must have knowledge of its location Loose time synchronization Nodes can be relatively mobile Geographical leashes also enable multiple location detection 4/26/2007

Temporal Leashes Definition: a temporal leash establishes an upper bound on a packet’s lifetime, which restricts the maximum travel distance Key Requirement: all nodes must have tightly synchronized clocks Maximum clock difference (Δ) between any two nodes must be within a few microseconds 4/26/2007

Temporal Leashes Implementation with a packet expiration time Sender calculates a packet expiration time to be sent with each packet: te = ts + L/c – Δ te: packet expiration time ts: packet sent time c: propagation speed of wireless signal L: maximum allowed travel distance; L > Lmin = Δ*c Δ: maximum clock difference between 2 nodes 4/26/2007

Temporal Leashes Receiver will accept and process a received packet if and only if the time when the packet is received (tr) is less than the packet expiration time (te) What’s missing? Need an efficient way for the receiver to authenticate te 4/26/2007

TIK Protocol - Overview TIK – TESLA with Instant Key disclosure TIK implements a temporal leash and provides efficient instant authentication for broadcast communication in wireless networks Based on the observation that a receiver can verify the TESLA security condition, that the corresponding key hasn’t been disclosed, as it receives the packet, this allows sender to disclose the key in the same packet Assume sender can precisely predict ts and receiver can record tr as soon as the packet arrives Requires accurate time synchronization between all the nodes 4/26/2007

TIK Protocol – Sender Setup Sender generates a series of keys, K0, K1,…, Kw-1, using a PRF F and a secret master key X: Ki = Fx(i) Sender selects a key expiration interval I and determines the expiration time (Ti) for its keys: Ti = T0 + i*I, where T0 is the expiration time for K0 Sender constructs a Merkle hash tree to commit to keys: K0, K1,…, Kw-1 4/26/2007

TIK Protocol – Merkle Hash Tree 4/26/2007

TIK Protocol – Merkle Hash Tree How is it constructed? For every leaf node, Ki’ = H(Ki); i.e. K0’ = H(K0) For every parent node, mp = H(ml || mr); i.e. m01 = H(K0’ || K1’), m03 = H(m01 || m23); The root value (m07) is signed by the sender and sent to the receivers, where it can be authenticated with sender’s public key To authenticate K2, for example: Sender must include K3’, m01, m47 in the packet Receiver computes m07’ and compare to the pre-distributed m07 m07’ = H[ H[ m01 || H[ H[K2] || K3’]] || m47 ] 4/26/2007

TIK Protocol – Receiver Bootstrapping Assume all nodes are synchronized with a maximum clock difference of Δ Assume each receiver knows every sender’s hash tree root value and the associated parameter T0 and I 4/26/2007

TIK Protocol – Sending and Verifying Packets Sender HMAC M T Ki Receiver HMAC M T Ki Time at Sender ts Ti Time at Receiver tr ≤ (ts + т - Δ) ≤ (Ti - Δ) 4/26/2007

TIK Protocol – Sending and Verifying Packets S → R: (HMACKi(M), M, T, Ki) M: message payload HMACKi(M): message authentication code for M Ki: key used to generate the HMAC for M T: tree authentication values used to authenticate Ki Receiver: Verifies if the sender has started sending Ki after receiving HMAC, based on Ti Verifies if Ki is authentic based on the hash root value and T Verifies the HMAC, using authenticated Ki Accept the packet as authentic only if all those verifications are successful 4/26/2007

Security & Performance Analysis Security Analysis Temporal leash with TIK protocol can detect and prevent wormhole attacks if all nodes are good nodes Can’t deal with a malicious sender that claims a false timestamp Can’t deal with a malicious receiver that refuses to check the leash Performance Analysis Requires only n public keys in a network with n nodes Efficient hash tree authentication of keys Efficient instant authentication of packet because the key is disclosed in the same packet Modest storage requirement for the Merkle hash tree 4/26/2007

Related Work RF-Watermarking Intrusion Detection Modulating the RF waveform in a way known only to authorized nodes Vulnerable to node capture Intrusion Detection Hard to isolate attacker using a software only approach, since it is hard to distinguish malicious traffic from legitimate traffic 4/26/2007

Future Work & Conclusion An efficient implementation of Geographical leashes Securing TIK against node misbehavior (sender/receiver) Achieving accurate time synchronization among the nodes Conclusion Wormhole attack is a powerful and disruptive attack against wireless networks With precise timestamps and tight clock synchronization, TIK can prevent wormhole attacks 4/26/2007

Thank You! Questions and Comments 4/26/2007