31
By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Embed Size (px)

Citation preview

Page 1: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

ByAjith U Kamath60-564 Project

Survey onAreas of standardization

ForSecuring Ad hoc networks

Page 2: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Based on

Standardization Areas for securing Ad hoc networksBy Rajesh Talpade and Anthony McAuley

Data Security in Ad hoc networks using Multipath routingBy Souheila Bouam and Jalel Ben-Othman

Page 3: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

AGENDA

Introduction Attacks in Ad hoc networks and Areas of

standardization Node configuration Key Management Routing protocol security

Data security based on multipath routing Intrusion Detection Conclusion

Page 4: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Introduction

What are Mobile Ad hoc networks ?

Characteristics

Problems encountered

Page 5: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Attacks in Ad hoc networks

Passive attacks

Active attacks

Black hole attack

Worm hole attack

Routing tables overflow attacks

Page 6: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Attacks in Ad hoc networks Active attacks

Sleep deprivation attacks

Location disclosure attacks

Denial of service attacks

Impersonation attacks

  "Problems worthy of attack

prove their worth by hitting back.“ – By Piet Hein

Page 7: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Areas of Standardization

It is expected in future, multi vendor ad hoc devices would inter-operate securely on a large scale.

Standardization Areas, Node configuration Key management Routing protocol security Intrusion detection

Page 8: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Node ConfigurationIn realistic deployment scenarios nodes of ad hoc network should support auto-configuration.

Link Local IP address assignmentPrivate address spaces (e.g. 169.254/16 prefix)

IPv6 address generation based on hardware interface

Problems: different designs for different link-layers, non-unique interface addresses in some link-layers or vendors, and changeable interface addresses.

Page 9: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Node Configuration Distributed dynamic host configuration

protocol MANET Initialization New node joining the MANET Graceful departure of the node Migration of Requester

tolerate message losses, network partitioning and mergers

does not account for the possibility of nodes behaving maliciously

Page 10: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Key Management

For enforcing confidentiality, integrity, authentication and non-repudiation of messages in ad hoc networks.

Key management Service through CA

A centralized CA-based approach is not applicable to ad hoc networks.

Replicating the CA, introduces the problem of maintaining the synchronization across the multiple CA’s

Page 11: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Key Management Threshold cryptography

An (n; t + 1) threshold cryptography scheme allows ‘n’ parties to share the ability to perform a cryptographic operation, so that any ‘t + 1’ parties can perform this operation jointly, whereas it is infeasible for at most ‘t’ parties to do so, even by collusion.

Page 12: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Key Management

But places unreasonable requirement of forcing some nodes to “volunteer” for specific roles.

Ref: Parallel reliable threshold multisignature by Yair Frankel and Yvo G

Page 13: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Key Management Self organized public key infrastructure

Public key certificates are issued by the users. When user u wants to obtain the authentic public

key of user v, it acquires a chain of public key certificates such that the first certificate of the chain can directly be verified by u using a public key that u holds and trusts.

Similar to PGP but self organized. The approach is probabilistic.

Page 14: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Key Management

Ref: The Quest for Security in Mobile Ad Hoc Networks by Jean-Pierre Hubaux, Levente Butty´an and Srdan Capkun

Page 15: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security

An attacker can inject incorrect routing information, replay old information, or cause excessive load to prevent proper routing protocol functioning.

Data security based on multipath routing.Exploit the feature of existence of multiple paths

between nodes in an Ad hoc network.

Page 16: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Assumptions made by the protocol

The sender ‘A’ and the receiver ‘B’ are authenticated.

WEP (Wireless Equivalent Privacy) is used for the encryption/decryption of all the frames at MAC layer and the authentication of the terminals.

A mechanism of discovering the topology of the network is available.

The used routing protocol supports multi-routes.

Page 17: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Description

It uses n routes (n ≥ 3) among N available.

There exist two types of channels

The original message m is divided into (n-1) parts.

The protocol generates, then, a random number x (1< x ≤ (n-1), x integer).

Algorithm can be run with both reactive and proactive routing protocols.

Page 18: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security

Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Page 19: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Position of SDMP

The SDMP header

Page 20: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Improvements

(Accepted in the 2004 International Workshop onMobile Ad Hoc Networks and Interoperability Issues.)

Error and Retransmit management

Ref: Securing Data Transmissions and Retransmissions Management in Ad hoc Networks By Souheila BOUAM and Jalel BEN-OTHMAN

Page 21: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Experimental results

Sending data using the algorithm (n=8 and n=4) and using classical method with one channel are compared. The transmitted file is 4.48 MB length and length of each block is 64 Kbytes.

Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Page 22: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security In the second test, different block sizes at each

data transmission were used. A base file of 19200 Bytes was used.

Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN

Page 23: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Drawbacks of the protocol

Diversity coding provides single line failure with only one extra line instantaneously without communicating with the transmitter. But this feature is not made use of in the protocol.

A particular sequence has to be followed to get each message parts. If a message part is lost, all the remaining parts cannot be obtained until receiver receives the lost message part.

More bandwidth is consumed for transmitting the message.

Page 24: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Protocols based on multi path routing

SPREAD (Security Protocol for Reliable data delivery) – uses threshold secret sharing system. Provides maximum security along with reliability of some extent.

Split multi path routing - uses the source routing. The message parts are sent on maximum routes with maximally disjoint paths. The protocol builds multiple routes using request/reply cycles.

M-TCP – Multipath TCP

Page 25: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Dynamic Source Routing

Source routing is a routing technique in which the sender of a packet determines the complete sequence of nodes through which to forward the packet.

Assumes that all hosts wishing to communicate with other hosts within the ad hoc network are willing to participate fully in the protocols of the network.

Route Discovery protocol

Page 26: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Routing Protocol Security Grudging Nodes in DSR

Once non-cooperative behavior has been detected and exceeds threshold values, an ALARM message is sent.

Page 27: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Intrusion Detection

In an ad hoc network, there does not exists natural traffic concentrators such as firewalls/gateways and localized communication pattern.

Intrusion Detection in Ad hoc networks Every node in the ad-hoc network participates

in intrusion detection and response. Each node is responsible for detecting signs of

intrusion locally and independently. Neighboring nodes can collaboratively investigate in

a broader range.

Page 28: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Intrusion DetectionThe conceptual IDS model at every system in the ad hoc network.

Ref: Intrusion Detection in Wireless Ad Hoc Networks By Yongguang Zhang and Wenke Lee

Page 29: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Intrusion Detection

Standardization of the intrusion detection mechanisms and processes enables nodes from multiple vendors to share information and collectively determine the intruding node(s).

Page 30: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Conclusion

Even though significant research work exists in the above areas of ad hoc networks, little or no attempt has been made to standardize mechanisms that would enable multi vendor nodes to inter-operate on a large scale and permit commercial deployments of ad hoc networks. Based on the requirements for each of the identified areas, candidate proposals will need to be evaluated.

Page 31: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks

Thank You

Questions ? Comments ?