Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Security in Mobile Ad Hoc Networks
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Secure routing in multi-hop wireless networks (II)
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Ch 4. Routing in WMNs Myungchul Kim
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
A Survey of Secure Wireless Ad Hoc Routing
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Cross-layer Analysis for detecting Wireless Misbehavior
Computer Networks: Wireless Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee

2 Contents Introduction Attacks A Multi-fence Security Solution –Network-layer security Message authentication primitives Secure ad hoc routing Secure packet forwarding –Link-layer security Open Challenges Conclusions

3 Introduction Mobile Ad Hoc Networks (MANETs) –Self-configuration –Self-maintenance Security Challenges –Shared medium –Resource constraints –Dynamic topology

4 Introduction The Goal of Security for MANETs –Protection of the network connectivity between mobile nodes over potentially multi-hop wireless channels One-hop connectivity through link-layer protocols Multi-hop connectivity through network-layer routing and data forwarding protocols Two Approaches –Proactive –Reactive Network Performance V.S. Security –Scalability, service availability, and robustness

5 Attacks Network-layer –Routing attacks Not to follow the specifications of the routing protocol Example: modification of the source route listed in the RREQ or RREP (DSR), advertising a route with a smaller distance metric than its actual distance to destination (AODV) Goal: attraction of traffic toward certain destinations, generation of routing loops, or introduction of sever network congestion and channel contention –Packet forwarding attacks Not to forward packets properly Example: drop the packets, modify the contents, duplicate the packets, denial-of-service (DoS)

6 Attacks Link-layer –WEP (Wired Equivalent Privacy) Cryptography attacks –DoS attacks Control of backoff value Data corruption using NAV and interfering victim’s link- layer frame

7 Multi-fence Security Solution Multi-fence Security Solution should … –Spread across many individual components –Span different layers –Thwart threats from both outsiders and insiders –Encompass prevention, detection, and reaction –Be practical and affordable Network-layer security solutions Link-layer security solutions Secure ad hoc routing Proactive protection through message authentication primitives Secure packet forwarding Reactive protection through detection and reaction Sour ce routin g Link state routing Distance vector routing Misbehavio r detection Misbehavio r reaction Secure wireless MAC Reactive protection through detection and reaction Next-generation WEP Modification to existing protocol to fix the cryptographic loopholes

8 A Multi-fence Security Solution - Network Layer Security Message Authentication Primitives –HMAC –Digital signature –One-way HMAC key chain Secure Ad Hoc Routing –Source routing –Distance vector routing –Link state routing –Other routing protocols Secure Packet Forwarding –Detection –Reaction

9 A Multi-fence Security Solution - Network Layer Security Message Authentication Primitives –HMAC (Message authentication codes) Symmetric key Cryptographic one-way hash function Verified only by the intended receiver Efficient computation n (n-1) / 2 keys should be maintained

10 A Multi-fence Security Solution - Network Layer Security Message Authentication Primitives –Digital Signature Asymmetric key More computation overhead in signing/decrypting and verifying/encrypting operations Less resilient to DoS attacks Verified by any node given the public key n public/private key pairs should be maintained

11 A Multi-fence Security Solution - Network Layer Security Message Authentication Primitives –One-way HMAC key chain Generated by repeated application of the one-way function Proven to be authentic in reverse order Lightweight computation One authenticator can be verified by large numbers of receivers Shortcomings –Buffer messages –To require additional communication

12 A Multi-fence Security Solution - Network Layer Security Secure Ad Hoc Routing Proactive approach –Source Routing Goal: to prevent intermediate nodes from modifying nodes to the route Solution: to attach a per-hop authenticator Example: Ariadne (extension of DSR) uses a one-way HMAC key chain

13 A Multi-fence Security Solution - Network Layer Security Secure Ad Hoc Routing –Source Routing (Ariadne) S: p S = (RREQ, S, D), m S = HMAC K SD (p S ) S-> *: (p S, m S ) A: h A = H(A, m S ), p A = (RREQ, S, D, [A], h A, []), m A = HMAC K A (p A ) A-> *: (p A, m A ) B: h B = H(B, h A ), p B = (RREQ, S, D, [A,B], h B, [m A ]), m B = HMAC K B (p B ) B -> *: (p B, m B ) C: h C = H(C, h B ), p C = (RREQ, S, D, [A, B, C], h C, [m A, m B ]), m C = HMAC K C (p C ) C -> *: (p C, m C ) D: p D = (RREP, D, S, [A, B, C], [m A, m B, m C ]), m D = HMAC K DS (p D ) D -> C: (p D, m D, []) C -> B: (p D, m D, [K C ]) B -> A: (p D, m D, [K C, K B ]) A -> S: (p D, m D, [K C, K B, K A ]) S A B C D

14 A Multi-fence Security Solution - Network Layer Security Secure Ad Hoc Routing –Distance Vector Routing Goal: correct advertisement of the routing metric Solution: to authenticate aggregation of metric –Link State Routing Goal: to authenticate both neighbor discovery and neighbor broadcast Solution: links only added only if two valid LSUs (Link State Update) from both nodes of the link are received Example: SLSP (Secure Link State Routing) uses digital signatures

15 A Multi-fence Security Solution - Network Layer Security Secure Ad Hoc Routing –Other Routing Protocols ARAN (Authenticated Routing for Ad hoc Networks) To authenticate link to link by public key cryptography Information only about the next hop SAB C

16 A Multi-fence Security Solution - Network Layer Security Secure Ad Hoc Routing –Other Routing Protocols [17] To broadcast both ways to provide redundancy To improve path length More communication and less computation

17 A Multi-fence Security Solution - Network Layer Security Secure Packet Forwarding –Detection Localized detection ACK-based detection –Reaction Global reaction End-host reaction

18 A Multi-fence Security Solution - Link Layer Security IEEE MAC –Intentionally small backoff value Checking deviation and penalizing –Data corruption using NAV and interfering victim’s link- layer frame So far, no clear solution IEEE WEP –Attacks Message privacy and message integrity attacks Probabilistic cipher key recovery attacks –Enhanced in i/WPA

19 Open Challenges Resiliency-oriented Security Solution - Feature –Bigger Problem Space Not only to thwart malicious attacks, but also to cope with other network faults –Intrusion Tolerance Robust against the breakdown of any individual fence –Bigger Solution Space To use other non-crypto-based schemes to ensure resiliency –Unexpected Faults Tolerance To enhance redundancy

20 Open Challenges –To build efficient fence considering each device’s resource constraint –To identify system principles of how to build a new generation of network protocols –To evaluate the security design

21 Conclusions Summary of security issues in MANETs –Resiliency-oriented multi-layered solution design –Focus on network-layer security Many open problems related to security in MANETs