Download presentation
Presentation is loading. Please wait.
1
SPLASH Sécurisation des ProtocoLes dans les réseAux mobileS ad Hoc http://www.inrialpes.fr/planete/splash.html 12 Décembre 2003 Refik Molva Institut EURECOM molva@eurecom.fr
2
MANET Security Requirements Wireless & Mobile Limited Energy Lack of physical security Ad Hoc Lack of(or limited) infrastructure Lack of a priori trust Cooperation Enforcement Secure Routing Key management [Recent security solutions for mobile ad hoc networks In “Ad Hoc Networks” IEEE Press - Wiley Ed]
3
Key Management Objectives Bootstrapping from scratch Fully distributed Minimum dependency
4
Key Management Approaches Symmetric crypto [Basagni et al.] (ID, PK) binding –Certificate = (ID,PK) CA Self-organized Authorities [Zhou, Haas] [Kong, et al.] [Yi, Kravets] [Lehane, et al.] Web of trust(PGP) [Hubaux, Buttyan, Capkun] –Certificate-less Crypto-based IDs: ID = h(PK) [Montenegro, Castellucia] [O’Shea, Roe] [Bobba, et al] ID-based Crypto: PK = f(ID) [Halili, Katz, Arbaugh] Context-dependent authentication –location-limited channels [Balfanz, et al.] –Shared passwords [Asokan, Ginzborg]
5
Self-organized Admission Control Performance Comparison Centralized (simple signatures) –member gets t signatures from other members –Server grants GMC when t or more signatures are shown. Distributed (threshold signatures) –member gets “partial” certificates (m SKi ) from other members. –member combines t certificates to get a GMC GMC = m SK1 m SK2 m SK3.. m SKt = m SK Threshold signatures are NOT suitable in MANET and sensor networks. C urrently investigating Bilinear mappings [Admission Control in Peer-to-Peer: Design and Performance Evaluation, ACM SASN Workshop, October 2003.] [On the Utility of Distributed Cryptography in P2P and MANETs, ICNP 2003.]
6
Feature Summary RSAASMTS-RSATS-DSA Dealer involved Simultaneous on-line presence Accountability Unlinkability Verifiable Secret Share NA
7
Some Results Signature generation Signature verification
8
(ID, PK) binding without a PKI Crypto-Generated Addresses (CGA) Statistically Unique Cryptographically Verifiable IDs [Montenegro, Castellucia] [O’Shea, Roe] IPv6 @ = prefix | h( prefix | PK ) Secure Routing using CGA: AODV [Castellucia, Montenegro] DSR [Bobba, et al] PROs: no certificates, no PKI CONs: generation of bogus IDs New: CGA based on the small primes variation of the Feige-Fiat- Shamir (MFFS) [Statistically Unique and Cryptographically Verifiable Addresses: concepts and applications. ACM TISSEC, Feb. 2004] [Protecting AODV against impersonation attacks, ACM MC2R, October 2002]
9
Cooperation Enforcement in MANET Routing and Packet Forwarding cost energy. Selfish node saves energy for itself Without any incentive for cooperation network performance can be severely degraded. [Michiardi, Molva, EW’02]
10
Cooperation enforcement mechanisms Token-based [Yang,Meng,Lu] Nuglets [Buttyan,Hubaux] SPRITE [Zhong, Chen, Yang ] CONFIDANT [Buchegger,Le Boudec] CORE [Michiardi,Molva] Beta-Reputation [Josang,Ismail] Reputation-based Threshold cryptography Micro-payment
11
CORE a b c d E f g h Packet forwarding Source Node: g Destination Node: f Route: Reputation(b) Reputation(d) Reputation(E) Packet forwarding Source Node: a Destination Node: f Route: Reputation(E)
12
Cooperation Enforcement Evaluation with Game Theory Cooperative GT –Study the size (k) of a coalition of cooperating nodes –Nash Equilibrium lower bound on k Non-cooperative GT –Utility function with pricing –Pricing used to guide the operating point (i.e. maximum of utility function) to a fair position –r i : dynamic reputation of node n i evaluated by her neighbors [Michiardi,Molva,CMS’02, WiOpt’03] [Srinivasan,et al.,INFOCOM’03]
13
Simulations: CORE – uniform traffic
14
Simulations: TFT – uniform traffic
15
Simulations: CORE – random traffic
16
Simulations: TFT – random traffic
17
Non-cooperative GT with pricing
18
Summary Specific requirements –Self organized bootstrapping of security associations –Cooperation enforcement Prospects –New tools from crypto bag of tricks (Id-based crypto,...) –Integrated mechanisms: reputation + key management Participation in MOBILEMAN project on Ad Hoc Networks ESAS 2004 1st European Workshop on Security in Ad-Hoc and Sensor Networks. (5.-6. August, 2004)
19
ESORICS 2004 – RAID 2004 September 13-17 Institut EURECOM Sophia Antipolis - FRANCE
20
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.