security in mobile ad hoc networks: challenges and solutions

22
Security in Mobile Ad Hoc Networks: Challenges and Solutions Yang et. al UCLA Computer Science Dept. IEEE Wireless 2004

Upload: buckminster-allen

Post on 30-Dec-2015

23 views

Category:

Documents


0 download

DESCRIPTION

Security in Mobile Ad Hoc Networks: Challenges and Solutions. Yang et. al UCLA Computer Science Dept. IEEE Wireless 2004. Outline. Motivation and background Attacks Network layer security Secure routing Secure forwarding Link layer security Conclusion. Motivation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Security in Mobile Ad Hoc Networks: Challenges and Solutions

Yang et. alUCLA Computer Science Dept.IEEE Wireless 2004

Page 2: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Outline

Motivation and background Attacks Network layer security

Secure routing Secure forwarding

Link layer security Conclusion

Page 3: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Motivation

MANETS recent popularity Self-configuration Self-maintenance

Challenges to security Open network architecture Shared medium Resource constraints Dynamic topology

Page 4: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Goals of MANET Security Protect network connectivity over

multi-hop wireless channels Link level solutions + network level

solutions Approaches

Proactive Reactive

Considerations Overhead versus performance

Page 5: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Attacks (Network Layer) Routing attacks

Attempt to “screw up” the others’ routing tables (remote effect)

Forwarding attacks Leave routing tables alone, but change

delivery of packets (local effect) Attack dependent on underlying

protocol Effects

Page 6: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Attacks (Link Layer)

Key attacks WEP

DoS attacks Manipulation of backoff interval Easy corruption of other’s data

Effects are compounded at higher layers

Page 7: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Solution Outline – A Multi-fence Security Solution

Challenges Distribution Involve multiple layers Attack awareness Completeness

Page 8: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Network Layer Security Overview

Message authentication primitives Secure routing Secure forwarding

Page 9: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Message Authentication Primitives

Message authentication code One-way hash function based on shared

key Send data + MAC Verified only by intended receiver Low computational overhead Storage requirement

O(n2) keys

Page 10: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Message Authentication Primitives

Digital signature Public key infrastructure w/ certificates Encrypt w/ private and decrypt w/ public Verified by all receivers High computational overhead Storage requirement

O(n) keys Certificate revocation lists

Less resilient to DoS attacks

Page 11: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Message Authentication Primitives One-way Hash-based Key Chain

Key chain generated by repeated application of MAC

Keys used in reverse order Verified by nodes w/ commitments Lower computational overhead Storage requirement

Buffer messages, key chains Delayed, lost keys

Extra communication and time synchronization Key revelation

Page 12: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Routing

Usually proactive approach Authenticate source and routing

information Based on routing protocols

Source-based routing Distance vector routing Link state routing Others

Page 13: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Source-based Routing

Append node ids to dynamically create routing path

Goal: Prevent intermediate nodes from altering routing list

End-to-end verification of nodes in paths

Example protocol (Adriadne) uses hash chaining technique

Page 14: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Source-based Routing (2)

e.g. Ariadne (on DSR)

Page 15: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Distance Vector Routing Advertise global shortest paths to

neighbor Based on a distance metric

Goal: ensure correct advertisement of distance metric and authentic sender

Authenticate aggregation of metric Unclear example in the paper that

used hash chain on hop count

Page 16: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Link State Routing

Discover neighbors and broadcast that info to everyone

Links only added if bidirectional Nodes can collude

Goal: authenticate both neighbor discovery and neighbor broadcast

Example protocol (SLSP) uses digital signatures

Page 17: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Other Secure Routing Protocols Broadcast and reply like SBR

Difference route is constructed on the reply Goal: Authenticate link to link

One reply is sent back Possible sub-optimal path or failure

Page 18: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Other Secure Routing Protocols Broadcast both ways to provide redundancy

Improved path length Use of path metric

More communication and less computation

Page 19: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Secure Packet Forwarding

Prevention impossible Detection

Monitor neighbors Probe path (for failures)

Reaction Related to prevention mechanism Global End-host

Page 20: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Open Challenges Larger problem space

Thwart attacks but include failures, misconfigurations, and network overload

Intrusion toleration Make system robust in the presence of attacks

Larger solution space Supplement encryption with other mechanisms

(connectivity or route redundancy) Use redundancy on system and protocol

levels

Page 21: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Open Challenges Collaborative approach

Trust groups of nodes Multi-fence

Devices, layers, protocol stacks, solutions

Better analysis tools Performance tradeoffs Security tradeoffs Interaction of both

Page 22: Security in Mobile Ad Hoc Networks: Challenges and Solutions

Conclusions

High level description of security issues in MANETS

Focused on network layer Especially routing

Proposed “resiliency-oriented” multi-layered solution design – increased fault tolerance in security systems

Called for better analysis models