“Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC” Analysis of a technical report from Stephan Eichler and Christian Roman,

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Chris Karlof and David Wagner
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Digital Signatures and Hash Functions. Digital Signatures.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Centre for Wireless Communications University of Oulu, Finland
Secure Routing in Ad Hoc Wireless Networks
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Secure routing in multi-hop wireless networks (II)
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Network Security Celia Li Computer Science and Engineering York University.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Security Outline Encryption Algorithms Authentication Protocols
Packet Leashes: Defense Against Wormhole Attacks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

“Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC” Analysis of a technical report from Stephan Eichler and Christian Roman, IEEE International Conference on Mobile Adhoc and Sensor Systems, 2006. Presented by Martin Dimkovski CSE 6950 November 8th, 2010

Agenda of the Presentation Part I: Security in MANET Routing Part II: AODV-SEC as a Solution Part III: Simulation and Results Part IV: Conclusions and Ideas

Part I: Security in MANET Routing Trouble for routing is a DoS MANETs are different: Open air Dynamic topology Link breaks Channel availability Novel attack models = Novel security approach needed

Easier Physical Access => Careful what is Shared The symmetric / asymmetric dilemma Shared keys could compromise everyone But asymmetric several times more expensive

In-line Tampering Hop Count tampering: DSN tampering: Make itself the desired next hop To eavesdrop To drop packets Invalidate routes DSN tampering: Outdate good route Wraparound numbering

Sybil Attack – Bad Identities Forged identities Pretending to be someone else Eavesdropping makes this easy Multiple identities Causing confusion Bypassing protocol logic

Blackhole and Greyhole Attacks Blackhole = Drop all packets Drop them itself, or Make them loop to max TTL Greyhole = Drop packets selectively Can be achieved with Tampering And/Or Bad identities

Wormhole Attack Invisible to higher layers Current solution = Add packet leashes (marks) Time Geographic

Previous Work on MANET Routing Security Any work on sensor networks applicable SEAD SRP ARIADNE (based on DSR) ARAN (based on AODV) SAODV

Agenda of the Presentation Part I: Security in MANET Routing Part II: AODV-SEC as a Solution Part III: Simulation and Results Part IV: Conclusions and Ideas

Part II: AODV-SEC as a Solution AODV-SEC Motivation Public Keys Signed with External CA Certificates Encryption and Signatures Hash Chains on Hop Count Compact New Certificate Type AODV-SEC Implementation Solved Problems Open Problems

AODV-SEC Motivation Specific use case for vehicular networks Occasional fixed network connection Asymmetric cryptography (no shared keys) Central CA for subscription services Real cryptography simulation

Public Keys Signed with External CA Certificates

Encryption and Signatures Senders use private keys to sign messages Receivers use certified public keys to verify signature

Encryption and Signatures (2) Public/Private key algorithm = RSA Private key signatures protect Authenticity (origin) Integrity of message 2 Signatures in each routing packet Originator, and Last hop

Hash Chains on Hop Count SHA-1 hash chains: Provide a “chain of custody” on hop count Going back to the originator No intermediate node can lower the count Even if a valid MANET member

Hash Chains on Hop Count (2) “Top Hash” field = h(h(..h(seed)..)) h applied Max_Hop_Count times Set by originator “Hash” field Start with h(seed) Each node: Hash = h(Hash) AND Hop_Count++ Receiver’s verification: ? h(h(..(Hash)) = Top Hash where h is applied Max_Hop_Count – Hop_Count

Compact New Certificate Type Bad performance with X.509 due to its size Fragmentation on each control packet New certificate type created – mCert. mCert keeps only critical data and achieves a 50% size reduction (450 B vs ~1000 B).

AODV-SEC Implementation Existing AODV extension options Existing AODV code from Uppsala University Only controller code module required mod. Interoperable with insecure AODV

Improved: Physical Access Risks No private keys are shared

Solved: In-line Tampering All fields signed back to originator

Solved: Sybil Attack – Bad Identities Unique, centrally certified IDs

Solved: Blackhole and Greyhole Attacks Blackhole = Drop all packets Drop them itself, or Make them loop to max TTL Greyhole = Drop packets selectively Prevents sybil attacks and tampering

Solved: Wormhole Attack Packet leashes signed back to originator

Open Problem: DoS from Signed Control Packets If nodes cannot check signatures line speed:

Open Problem: Sleep Deprivation Torture

Agenda of the Presentation Part I: Security in MANET Routing Part II: AODV-SEC as a Solution Part III: Simulation and Results Part IV: Conclusions and Ideas

Simulation Environment NS-2 simulator DSSS, 11 Mbps, 170m range 802.11 DCF Random Waypoint Model (0 to 600 s) CBR, 512B packets, 25-50% of nodes as senders 2 scenarios: 900 x 200 m, 20 nodes 1500 x 300 m, 50 nodes

End-to-End Delay - Not Scalable With only 16 sources: Impractical for real-time applications at moderate load Ex: ITU-T G.114: voice requires < 0.15 s

Larger Network Experiment Confirms Serious Scalability Issues Dramatic increase Problem even for non-real-time applications

End-to-End Delay a Problem? Authors see these results as promising Maybe they are not considering real-time aspects in their specific scenario. They acknowledge cryptographic latency but not as a significant problem We believe the results are concerning And that the main problem is cryptographic performance

Cryptography Performance Factor Per node crypto latency (in ms) Based on this – Authors say 60 ms average not a problem However for an end-to-end total we need: Times each node For both the RREQ and RREP direction This can explain the delays in the results

Route Acquisition Times Shows good results But for home many sources? Inefficiency as per end2end delay comes with many sources And number of hops should go up to group size

Already Bad Overhead Can Get Much Worse With only 16 nodes Overhead at 50% with moderate load Lighter cryptography (smaller packets) identified as a need

Mobile as Much as AODV (but at what load?) Must be at low load Based on previous Nevertheless, as such: Maintains mobility excellence of AODV X.509 results irrelevant after mCert introduction Need load dependency

Succeeds in Blocking Malicious Nodes Attack scenario: Attackers spoofing RREQs No mobility / 16 sources AODV-SEC prevents the bad RREQs Peculiar why both drop above 70%?

Packet Delivery Ratio Conflicting Results? (load data needed?)

Agenda of the Presentation Part I: Security in MANET Routing Part II: AODV-SEC as a Solution Part III: Simulation and Results Part IV: Conclusions and Ideas

Part IV: Conclusions & Ideas Feasible protocol, especially for smaller, lighter scenarios We need to improve cryptography performance Currently induced latency is concerning We need to improve cryptography efficiency Large routing packet size is a problem But probably not the main one

Future Improvement Ideas Evaluate securing only replies Elliptic Curve Cryptography (ECC), would improve: Certificate size / packet size Calculation times Better security More powerful simulation systems More efficient simulation models

Questions

Appendix 1: Example Extension (RREP Single)

Appendix 2 Cryptography Library Selection Crypto++ and libcrypto benchmarked libcrypto (OpenSSL) won

X.509 vs mCert