By Ajith U Kamath Project

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chris Karlof and David Wagner
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
A Survey of Secure Wireless Ad Hoc Routing
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security Improvement for Ad Hoc Wireless Network Visal Kith ECE /05/2006.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Wired Equivalent Privacy (WEP)
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Centre for Wireless Communications University of Oulu, Finland
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Survey Presentation Course: Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Routing Security in Ad Hoc Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Ad Hoc Wireless Routing COS 461: Computer Networks
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
DISPERSITY ROUTING: PAST and PRESENT Seungmin Kang.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Lecture 24 Wireless Network Security
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Cryptography CSS 329 Lecture 13:SSL.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Protocols.
Protocols.
Presentation transcript:

By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks By Ajith U Kamath 60-564 Project

Based on Standardization Areas for securing Ad hoc networks By Rajesh Talpade and Anthony McAuley Data Security in Ad hoc networks using Multipath routing By Souheila Bouam and Jalel Ben-Othman

AGENDA Introduction Attacks in Ad hoc networks and Areas of standardization Node configuration Key Management Routing protocol security Data security based on multipath routing Intrusion Detection Conclusion

Introduction What are Mobile Ad hoc networks ? Characteristics Problems encountered

Attacks in Ad hoc networks Passive attacks Active attacks Black hole attack Worm hole attack Routing tables overflow attacks

Attacks in Ad hoc networks Active attacks Sleep deprivation attacks Location disclosure attacks Denial of service attacks Impersonation attacks   "Problems worthy of attack prove their worth by hitting back.“ – By Piet Hein

Areas of Standardization It is expected in future, multi vendor ad hoc devices would inter-operate securely on a large scale. Standardization Areas, Node configuration Key management Routing protocol security Intrusion detection

Node Configuration In realistic deployment scenarios nodes of ad hoc network should support auto-configuration. Link Local IP address assignment Private address spaces (e.g. 169.254/16 prefix) IPv6 address generation based on hardware interface Problems: different designs for different link-layers, non-unique interface addresses in some link-layers or vendors, and changeable interface addresses.

Node Configuration Distributed dynamic host configuration protocol MANET Initialization New node joining the MANET Graceful departure of the node Migration of Requester tolerate message losses, network partitioning and mergers does not account for the possibility of nodes behaving maliciously

Key Management For enforcing confidentiality, integrity, authentication and non-repudiation of messages in ad hoc networks. Key management Service through CA A centralized CA-based approach is not applicable to ad hoc networks. Replicating the CA, introduces the problem of maintaining the synchronization across the multiple CA’s

Key Management Threshold cryptography An (n; t + 1) threshold cryptography scheme allows ‘n’ parties to share the ability to perform a cryptographic operation, so that any ‘t + 1’ parties can perform this operation jointly, whereas it is infeasible for at most ‘t’ parties to do so, even by collusion.

Key Management But places unreasonable requirement of forcing some nodes to “volunteer” for specific roles. Ref: Parallel reliable threshold multisignature by Yair Frankel and Yvo G

Key Management Self organized public key infrastructure Public key certificates are issued by the users. When user u wants to obtain the authentic public key of user v, it acquires a chain of public key certificates such that the first certificate of the chain can directly be verified by u using a public key that u holds and trusts. Similar to PGP but self organized. The approach is probabilistic.

Key Management Ref: The Quest for Security in Mobile Ad Hoc Networks by Jean-Pierre Hubaux, Levente Butty´an and Srdan Capkun

Routing Protocol Security An attacker can inject incorrect routing information, replay old information, or cause excessive load to prevent proper routing protocol functioning. Data security based on multipath routing. Exploit the feature of existence of multiple paths between nodes in an Ad hoc network.

Routing Protocol Security Assumptions made by the protocol The sender ‘A’ and the receiver ‘B’ are authenticated. WEP (Wireless Equivalent Privacy) is used for the encryption/decryption of all the frames at MAC layer and the authentication of the terminals. A mechanism of discovering the topology of the network is available. The used routing protocol supports multi-routes.

Routing Protocol Security Description It uses n routes (n ≥ 3) among N available. There exist two types of channels The original message m is divided into (n-1) parts. The protocol generates, then, a random number x (1< x ≤ (n-1), x integer). Algorithm can be run with both reactive and proactive routing protocols.

Routing Protocol Security Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Routing Protocol Security Position of SDMP The SDMP header

Routing Protocol Security Improvements (Accepted in the 2004 International Workshop on Mobile Ad Hoc Networks and Interoperability Issues.) Error and Retransmit management Ref: Securing Data Transmissions and Retransmissions Management in Ad hoc Networks By Souheila BOUAM and Jalel BEN-OTHMAN

Routing Protocol Security Experimental results Sending data using the algorithm (n=8 and n=4) and using classical method with one channel are compared. The transmitted file is 4.48 MB length and length of each block is 64 Kbytes. Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Routing Protocol Security In the second test, different block sizes at each data transmission were used. A base file of 19200 Bytes was used. Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Routing Protocol Security Drawbacks of the protocol Diversity coding provides single line failure with only one extra line instantaneously without communicating with the transmitter. But this feature is not made use of in the protocol. A particular sequence has to be followed to get each message parts. If a message part is lost, all the remaining parts cannot be obtained until receiver receives the lost message part. More bandwidth is consumed for transmitting the message.

Routing Protocol Security Protocols based on multi path routing SPREAD (Security Protocol for Reliable data delivery) – uses threshold secret sharing system. Provides maximum security along with reliability of some extent. Split multi path routing - uses the source routing. The message parts are sent on maximum routes with maximally disjoint paths. The protocol builds multiple routes using request/reply cycles. M-TCP – Multipath TCP

Routing Protocol Security Dynamic Source Routing Source routing is a routing technique in which the sender of a packet determines the complete sequence of nodes through which to forward the packet. Assumes that all hosts wishing to communicate with other hosts within the ad hoc network are willing to participate fully in the protocols of the network. Route Discovery protocol

Routing Protocol Security Grudging Nodes in DSR Once non-cooperative behavior has been detected and exceeds threshold values, an ALARM message is sent.

Intrusion Detection In an ad hoc network, there does not exists natural traffic concentrators such as firewalls/gateways and localized communication pattern. Intrusion Detection in Ad hoc networks Every node in the ad-hoc network participates in intrusion detection and response. Each node is responsible for detecting signs of intrusion locally and independently. Neighboring nodes can collaboratively investigate in a broader range.

Intrusion Detection The conceptual IDS model at every system in the ad hoc network. Ref: Intrusion Detection in Wireless Ad Hoc Networks By Yongguang Zhang and Wenke Lee

Intrusion Detection Standardization of the intrusion detection mechanisms and processes enables nodes from multiple vendors to share information and collectively determine the intruding node(s).

Conclusion Even though significant research work exists in the above areas of ad hoc networks, little or no attempt has been made to standardize mechanisms that would enable multi vendor nodes to inter-operate on a large scale and permit commercial deployments of ad hoc networks. Based on the requirements for each of the identified areas, candidate proposals will need to be evaluated.

Thank You Questions ? Comments ?