Download presentation
1
Castor: Scalable Secure Routing for Ad Hoc Networks
Wojciech Galuba, Panos Papadimitratos, Marcin Poturalski, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo Euro-Labs, Munich, Germany
2
Ad-hoc network routing challenges
source destination
3
Ad-hoc network routing challenges
source destination
4
Ad-hoc network routing challenges
source destination Say this is costly, one of the paths fail, throwing bandwidth at the problem
5
Scale Mobility ? Security
6
Castor Continuously-Adapting Secure Topology-Oblivious Routing
Secure route discovery Castor Secure data transmission Provides routes Avoids compromised nodes Evaluates routes Needs route redundancy Continuously-Adapting Secure Topology-Oblivious Routing Skip arrows
7
Topology-obliviousness
The basic ideas of our approach To achieve what was on the prev slide we use Nodes only aware of their neighbors No routing information exchange no routes included in control traffic no routing table fragments exchanged
8
Flows instead of destinations
An important feature of our protocol In-network state is maintained per-flow not per-destination Flow isolation crucial for security
9
Castor – basic operation
source destination PKTs contain the data payload ACKs follow the reverse path of PKTs
10
Local learning from failures
v3 per-flow per-neighbor reliability estimator + + + - - v2 v1 v4 + + Locality: each node only aware of its neighborhood Autonomy: each node routes independently
11
Broadcast as a fallback
v3 - - - v2 v1 v4 Autonomy: nodes independently decide wether to broadcast or unicast
12
Initial PKT flood source destination No reliability history each node decides to broadcast the PKT ACKs are broadcasted back
13
Routing around failures
source destination Failure ACKs stop returning Local repair: on failure some nodes broadcast, most still unicast alternative route discovered without network-wide flood
14
Castor is failure agnostic
Same recovery mechanism good for: Malicious PKT or ACK dropping Links broken by mobility Wider-area outages (e.g. jamming) Wormholes and tunnels
15
Trust model Untrusted cloud of intermediate nodes
Security associations: Source to destination Neighbor to neighbor Simplest in the literature
16
Crucial property: flow state isolation
v2 v5 v1 v4 v3 Isolate in-network states for the two flows Otherwise malicious flows could disrupt the benign flows node reliability v2 0.9 0.2 v3 0.6 0.95 v4 0.8 v5 0.1 Routing state at v1: In spite of the simple trust assumptions, still we can achieve th e
17
Ensuring flow isolation
Flow authentication Nodes can recognize PKTs belonging to the same flow Only source can generate the next PKT ACK authentication Nodes can match ACKs to PKTs Only destination can generate correct ACK Achieved without public-key crypto
18
Evaluation 1Mbps 802.11b MAC 3 km x 3 km plane
1-20 m/s random waypoint mobility 5 flows, 4 packets/s, 100 nodes
19
Blackhole attack: adversary drops data packets
- As the fraction of compromised nodes increases, Castor is able to maintain high levels of packet delivery rates, while the other protocols do not . - Higher granularity, per-link per-flow instead of per-route Blackhole attack: adversary drops data packets not control traffic
20
Bandwidth utilization under blackhole attack
The bandwidth for proactive protocols is higher (SEAD and Sprout) For Castor the bandwidth consumption stays constant, despite the fact PKTs are 256 Bandwidth utilization under blackhole attack
21
Wormhole drops data packets, no mobility
Complete recovery from wormholes
22
Scalability Mobility, 20% of balckholes Increasing the network size
23
Summary Simple PKT-ACK messaging Scalability Fast adaptation Security
flow-control-ready applicable to other networks than MANETs Scalability No routing information exchanged Local repair, few network-wide floods Fast adaptation Security Failure agnosticism Flow state isolation
25
PKT – ACK pairing H xl h(h(h(b1)||x1)||x2) xl-1 h(h(b1)||x1) x2 h(b1)
Root of the Merkle tree is the flow ID, used by the intermediate nodes for state isolation Source generates Merkle tree per-flow H Included in PKT xl h(h(h(b1)||x1)||x2) xl-1 h(h(b1)||x1) x2 h(b1) x1=h(b2) h(bw) b1=g(a1) b2=g(a2) bw=g(aw) a1 a2 an Included in ACK Included ecrypted in PKT, destination decrypts © 2009 EPFL, Docomo Euro-Labs
26
Time to recover from blackhole attack
No mobility Time to recover from blackhole attack © 2009 EPFL, Docomo Euro-Labs
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.