Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Survey Presentation Course: 60-564 Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal.

Similar presentations


Presentation on theme: "1 Survey Presentation Course: 60-564 Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal."— Presentation transcript:

1 1 Survey Presentation Course: 60-564 Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal

2 2 Agenda  Introduction  The DSR Protocol  The SADSR Protocol  The SERAN for Security Equipment  Closing Remarks

3 3 Papers Reviewed  Ghazizadeh, S.; Ilghami, O.; Sirin, E.; Yaman, F.; “ Security-aware adaptive dynamic source routing protocol ”, Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on 6-8 Nov. 2002 Pages:751 – 760  Ben-Othman, J.; Xiaoyun Xue; “ SERAN: a new protocol to hide an equipment in ad hoc networks ”, Computers and Communication, 2003. (ISCC 2003). Proceedings. Eighth IEEE International Symposium on 30 June-3 July 2003 Pages:356 - 361 vol.1

4 4 Introduction  Wireless Networks  Infrastructured Network  Consists of fixed and wired gateways  Fixed base station (Access Point)  Nodes can move geographically  Ad Hoc (or Infrastructureless) Network  All nodes are mobile  Nodes communicate with each other  No centralized entity (base station, Access point)  Nodes are routers

5 5 Infrastructured Network

6 6 Ad Hoc Networks

7 7 Characteristics  Contain a large number of nodes  No pre-existing fixed network infrastructure  Can be deployed rapidly  Nodes can freely move around  Creation and deletion of network links  Dynamically variable topologies  Bandwidth constrained links  Energy constrained operation

8 8 The MANET Model  Nodes have fixed IDs (e.g. IP addresses)  Wireless communication devices  Nodes are powered with lightweight batteries that have limited life  Nodes have equal capability  Identical communication devices.  Nodes connectivity is not transitive

9 9 Routing in MANET  Challenging  Unpredictable node mobility  Dynamic topology variation  Nature of wireless media  Types  Flat  Hierarchical  Geo-assisted  Proactive and Reactive Protocols

10 10 Routing Protocols

11 11 Security in Ad Hoc Networks  Always a weak Point  Inherent quality of wireless media  Mobility of the nodes  Lack of centralized entity  Security Requirements  Availability, Confidentiality, Integrity, Authentication and Non-Repudiation  Threats  DoS, Impersonation, Byzantine Failure, Disclosure and Poor Physical Protection

12 12 The SADSR Protocol  Security-Aware Adaptive Dynamic Source Routing Protocol  Basic Idea  Non-malicious node detects malicious nodes  Non-malicious node Isolates malicious nodes  Goal is to Secure DSR Protocol

13 13 The DSR Protocol  Dynamic Source Routing Protocol  Reactive (on-demand)  Source-Routed  Each node maintains route caches containing the source routes  Updates it whenever it learns about new routes  two major phases  Route discovery  Route maintenance

14 14 Route Discovery Contd..  On-Demand  Check Route Cache  Initiates route discovery process  Broadcast a RREQ packet  Includes Source & Destination Address  Includes an unique ID  May be replied by intermediate nodes  May be replied by destination nodes

15 15 Route Discovery in DSR Ref: Padmini Misra ; “ Routing Protocols for Ad Hoc Mobile Wireless Networks “ http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/adhoc_routing/, 1999

16 16 Route Maintenance  Route Error Packet  Fatal transmission problem at its data link layer  Removes that hop from its route cache  All routes included that particular hop are truncated  Acknowledgment packets  Verify the correct operation of the route links

17 17 The SADSR  Secure DSR protocol by enhancing it  Non-malicious nodes  Detect malicious node  Isolate malicious node  Uses digital signatures to authenticate  Asymmetric cryptography  Keeps  Multiple routes for each destination  A local trust value for each node in the network  Each path is assigned with a trust value

18 18 The Attackers  External attackers  Inject erroneous routing information  Replay previous routing messages  Modify the valid routing information  Internal attackers  Trusted at some point of time  Not committed to their promises anymore  Compromised by external attackers  More difficult to detect  Isolate affected nodes  Pass traffic through special routes

19 19 Assumptions  Both External and Internal attackers exists  Malicious nodes are relatively small  All the connections are bidirectional  public key crypto is used  A secure CA in place  All nodes know the public key of CA,  Certificate issued on off line basis  Certificate bounds a nodes IP with its public key  The certificate obtained from CA never expires

20 20 The SADSR Protocol  Three different stages  Certificate Acquisition  Multi-path Route Discovery  Routing

21 21 Certificate Acquisition  Nodes obtain a certificate from CA  Issued in an off-line process  Certificates remain valid for entire lifetime  Security problem ?  Networks is set up for a certain time only  Certificate of node v  Nodes get public key of CA,

22 22 Multi-path Route Discovery  Initiation of Route discovery process  Generate RREQ message  Sign M  Appends, at the end of M,  Encrypted hash value of M,  Its certificate,  Broadcast M

23 23 Multi-path Route Discovery Contd..  Intermediate node  Checks if RREQ not too old  Verifies each signature with a probability p  Ensures its own signature is not in the sequence  Count is less then [(Max. No. of route, m)/2]  First RREQ msg. from a neighbor for same route  Signs it message  Re broadcast the message  Entries are discarded after a predefined time,

24 24 Multi-path Route Discovery Contd..  Destination node  Sets up a timer for the source node, S  Begin to reply  Replies all RREQ messages up to the number m  Non node-disjoint paths  Use 50% probability to reply  To ensure enough route in case of very few neighbor  Generate RREP message,  Signs M, Unicast back to S, using same path of RREQ  Intermediate nodes checks signature, signs, forwards  Rest of RREQs are dropped after time

25 25 Routing – Basic Idea  Nodes locally calculate and keep trust value (TV) of the other nodes  Based on the observations it has made so far  The trust values of the nodes in a path  Increase every time v successfully sends a message through that path,  Decrease if a message is lost or tampered with  Possible as ACK sent through the same path  TV of a path is the product of TVs of its nodes  For routing, paths with higher TV are preferred

26 26 Assignment of Trust Value  Each source node keeps track of  The paths through which it has sent packets  If it has received the acknowledgement through that path for the corresponding message  Uses two counters for each v in a path, and  The trustworthiness of v,  Trustworthiness of a path =

27 27 Sending Data Packets  For sending a data packet, source node  Chose a path randomly from available paths  s are likely to know m paths for d  Chance of a path to be chosen is proportional to its trust value  Appends a sequence number with the data packet  Appends the chosen path with the data packet  Signs the packet  Sends through the chosen path

28 28 Sending Data Packets Cont’d…  Intermediate nodes  Verify the signature of s with a probability p  Then forward the packet  Destination node  If data packet received through path,  Generate an acknowledgement  Signs M  Sends M to s through the same path, P  Intermediate nodes verify signature, forward

29 29 Updating Trust Values  The source node s maintains a table  of sequence numbers of packets sent  the path used and  a time stamp for time units  Receives a valid ACK  Awards each node on that path  Updates entries for each node on that path  Not -Receives a valid ACK after time  Assumes that the packet is lost  Punish each node on that path  Updates entries for each node on that path

30 30 Intermediate Link Failure  fails to communicate with  Generate a R.E.M.  Signs it  Sends it to s  The source node s, after receiving the M  Locate and eliminate all path containing the link

31 31 Security Analysis  The possible attacks on DSR protocol  Attacks on Route Discovery  Attacks on Routing  Fabrication of Route Error Messages  Denial of Service Attacks

32 32 Attacks on Route Discovery  Modification of source routes  content is changed?  Detected by signature verification  Some or all node info dropped?  No ACK can be reached to S  RREP modified?  Not reached S or discarded there  Route cache poisoning  Only the destination send back RREP  No snooping for intermediate nodes  Not participating in route discovery  Passive maliciousness, nothing can do

33 33 Attacks on Routing  In a Data Packet, may Modify  Data  Signature verification fails, No ACK  Routes  Not reach destination, No ACK  Dropping the Packets  Dropped packet, no ACK  Gradual isolation

34 34 False Route Error Msg. And DoS  Fabrication of Route Error Messages  Node may lie that a link is broken  Intermediate node do not snoop and update  Denial of Service Attacks  Sending RREQs with Fake IDs  Node broadcast may RREQ after spoofing IP  intermediate nodes will caught and get rid of some  Rest will be caught at the destination, no RREP  Still a successful attack can be made  Sending RREQs to a Fake Destination  All intermediate nodes will sign and rebroadcast  Currently nothing, but may be extended to keep TV for each S

35 35 Experimental Results

36 36 Experimental Results

37 37 The SERAN  Security Equipment protocol in Routing in Ad hoc Networks  A node is given ability  Use the ad hoc network but not provide resources  Hide itself from the network  Possible application  Conserving energy for critical node  Isolate congested node

38 38 Basic Idea  Neighbouring nodes know each others at the MAC layer  The protected node, communicate with a neighbor  A new layer, SERAN, between the IP and the transport layer

39 39 Basic Idea Cont’d…  Node needs an IP address to communicate with others  Dynamic IP address  Fixed IP addresses -> Normal node  No IP addresses -> Invisible node  Use of “Smart Cards”  Implementing DHCP in Smart Cards  Every time there is a communication  The smart card assigns a IP address to  Discards it after that session ended  Next time, assigns a different IP address

40 Ref: http://www.acs.com.hk/smartcardoverview.asp 40 The Smart Card

41 41 The Communication in SEARAN  Whenever there is an outgoing packet  Gets an IP address from the smart cards, pass the packet  After passing through the network layer, the address is discarded  the packet is uni-cast to including only the destination address in the SERAN header  The SERAN layer is capable of recognizing and sending the message to the destination.  The SERAN header includes the source MAC address to distinguish the real source.

42 42 The Communication in SEARAN  Incoming packet in the MAC layer, the card checks  The header of the packet to see if the packet’s destination MAC address is its own  If the packet contains the broadcast address (255.255.255.255).  If any of these is true, then get a temporary IP address from the card and pass the packet to the IP layer.  The smart card is capable of decoding the header of the packets.

43 43 Evaluation of

44 44 Improvement

45 45 Advantages and Disadvantages  Advantages  Can keep a node secret  Protected node saves its energy  Protected node can send and receive rapidly  avoid “overflow routing table”, “sleep deprivation”  Disadvantages  Bad influence for the global routing  May reduce the number of multi-routes  Selection of still remains as an issue

46 46 Conclusions  Security is a weak point in ad hoc networks  The SADSR protocol is proposed to secure an existing protocol called DSR  Tests show that SADSR copes well in presence of malicious nodes  SERAN may be used to hide security equipment in ad hoc network  First known approach using smart card  Looking forward to a secure ad hoc network


Download ppt "1 Survey Presentation Course: 60-564 Fall 2004 Ataul Bari Instructor: Dr. A. K. Aggarwal."

Similar presentations


Ads by Google