Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Survey of Secure Wireless Ad Hoc Routing
Sri Lanka Institute of Information Technology
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Security Issues In Sensor Networks By Priya Palanivelu.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Centre for Wireless Communications University of Oulu, Finland
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Security for Broadcast Network
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Key Management and Distribution Anand Seetharam CST 312.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Packet Leashes: Defense Against Wormhole Attacks
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
SPINS: Security Protocols for Sensor Networks
BROADCAST AUTHENTICATION
Switching Techniques.
SPINS: Security Protocols for Sensor Networks
Presentation transcript:

Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)

Shambhu Upadhyaya 2 Introduction Ad hoc networks do not implement any network access control Network becomes vulnerable to resource consumption attacks It may be a common attack in adversarial environment Most routing protocols do not address this type of attack – a node trusts its neighbors Some solutions talk about authenticating control packets Need to provide access control for both control and data packets

Shambhu Upadhyaya 3 Naïve Solution Employ a network-wide key so every node can use it to compute a MAC on the packets it sends and verifies packets from neighbors Disadvantage -Attacker needs to compromise one node -If global key is divulged, difficult to identify the compromised node (lack of source authentication) -Expensive to recover from compromise since group key update is involved Digital signature for packet source authentication -Forbiddingly expense Need a lightweight authentication protocol in ad hoc networks

Shambhu Upadhyaya 4 Proposed Solution Hop-by-hop authentication Node joining ad hoc network needs to perform only some inexpensive operations to bootstrap a trust relationship Then switch to a very lightweight protocol for traffic authentication Transparent and resides in between the data link layer and the network layer Based on one-way hash chains and TESLA for broadcast source authentication

Shambhu Upadhyaya 5 Assumptions Links are bidirectional Large networks (may be disjoint or mergeable) Nodes are relatively underpowered Loose time synchronization Physical layer uses techniques such as spread spectrum to prevent jamming attacks

Shambhu Upadhyaya 6 More Assumptions Security Assumptions -Each node possesses a public key certificate issued by a trusted CA (such as in a university) -Triangular inequality in receiving packets Attack models -Resource consumption attacks (external or internal) -Eavesdrop, drop packets, replay older packets or modify overheard packets and re-inject them into network

Shambhu Upadhyaya 7 Design Goals Efficiency -All operations based on public key technique should be minimized Scalability Immediate authentication -Delay will incur buffering overhead Transparency and independence -New protocol should work with other protocols, independent of deployed routing protocols

Shambhu Upadhyaya 8 Background One-way key chains and TESLA One-way Hash Chain -Chain of key generated through repeated application of a one-way hash function on a random no. -If y=F(x), it is computationally infeasible to compute x given y TESLA -Broadcast authentication scheme that uses one-way key chain along with MAC

Shambhu Upadhyaya 9 One-way Hash Chain One-way hash chain authentication -Sender first signs the last value (called commitment) in the chain with its private key -This guarantees the authenticity of K(0) -Then the sender discloses key in the reverse order -Receiver can verify K(j) by checking if K(j-1) = F(K(j)) if it has K(j-1)

Shambhu Upadhyaya 10 Tesla Tesla authentication -Sender uses a key K from its chain to compute a MAC over packet P(i) -Attach the MAC to P(i) -Receiver cannot verify P(i) rightaway -K is disclosed in the next packet P(i+1) -This allows receiver to verify authenticity of K -You can now compute MAC -If both K and MAC are correct and if P(i) is received before P(i+1), receiver accepts P(i) Receiver should be able to determine the sending time of each packet -Done through periodic key disclosure and loose time synchronization Drawback is that there is delay in authenticating a packet

Shambhu Upadhyaya 11 LHAP Details Architecture, Lightweight traffic authentication, trust management Architecture -Transparency and independence -Resides between data link and network layers -To transmit a packet LHAP adds a header (node id, packet type, authentication tag) Pass it to data link layer -To receive a packet Verify authentication If valid, remove the header and pass the packet to network layer; otherwise, discard

Shambhu Upadhyaya 12 Architectural Features Every node in the network verifies every packet Packets from unauthorized nodes are dropped Hop-by-hop authentication Efficiency -Lightweight packet authentication -Lightweight trust management Packet authentication based on one-way hash chain Tesla for bootstrapping trust between nodes and maintaining trust between nodes (reduces no. of public key operations)

Shambhu Upadhyaya 13 Lightweight Traffic Authentication Each node generates a one-way key chain (keys are called Traffic key) Used to authenticate traffic to immediate neighbors When a node joins a network, every neighbor obtains an authenticated traffic key from the node’s key chain to establish trust relationship for the first time When transmitting a packet, a node appends a new traffic key to the packet This helps others verify authenticity of packets when the new node starts transmission (verify the attached traffic key)

Shambhu Upadhyaya 14 Trust Management Trust bootstrapping, trust maintenance, trust termination Don’t want to use public key based technique Instead uses Tesla to reduce the no. of signature operations to one -Every node uses digital signatures only once to bootstrap a Tesla key chain -Tesla keys are then used to provide authenticated traffic keys Trust maintenance is by periodic announcement of its most recently released traffic keys authenticated by its Tesla keys -Neighbors will drop any packets that are authenticated by an old traffic key -This is called KEYUPDATE message -If no KEYUPDATE happens for a long time, you terminate trust relationship

Shambhu Upadhyaya 15 LHAP Building Blocks Traffic authentication and trust management Traffic authentication -Uses one-way key chains (doesn’t use Tesla, why?) -Every node uses traffic keys for authenticating traffic packets from itself or received from neighbor -When a node wants to broadcast a message, it sends the message and its next traffic key -Every receiving node verifies the authenticity of the packet by verifying the traffic key -Advantages Enables instant verification of traffic packets Unlike Tesla, it is not necessary to disclose traffic keys periodically

Shambhu Upadhyaya 16 LHAP Building Blocks, Contd.. Trust bootstrapping -A node that wishes to join a network must compute two key chains Traffic key chain and Tesla key chain -It then signs the commitments of these key chains and broadcasts them to neighbors -Each neighbor first verifies the new node’s certificate using CA’s pubic key Then uses node’s public key in the certificate to verify the signature (authenticity of the commitments) Updates its TRUST table To authenticate itself to node A, it sends an ACK to A -Upon receiving ACK, node A verifies the signature and records the neighbor’s key chain commitments

Shambhu Upadhyaya 17 LHAP Building Blocks, Contd.. Maintenance -Periodically each node broadcasts a KEYUPDATE message to neighbors -Update the TRUST tables accordingly Termination -When a compromised node is detected and announced (permanent) -If a node doesn’t receive a valid KEYUPDAATE message from a neighbor for longer than one Tesla interval (temporary)

Shambhu Upadhyaya 18 Summary Provides protection against all kinds of attacks – outside attacks, wormhole and rushing attacks and insider attacks Simulation indicates that LHAP is efficient and allows a tradeoff between security and performance -Bandwidth overhead, and amount of normal packet drop etc. are studied

Shambhu Upadhyaya 19 References Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia, “LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks”, ACM Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003