security issues in mobile ad-hoc network

21
SECURITY ISSUES IN MOBILE AD-HOC NETWORK Mukul A. Khairatkar

Upload: sierra-king

Post on 04-Jan-2016

44 views

Category:

Documents


1 download

DESCRIPTION

Security Issues in Mobile Ad-Hoc Network. Mukul A. Khairatkar. Agenda. Introduction to MANET Various Security Model Operations Introduction to IPSec IPSec Operation Simulation Details Conclusion. Mobile Ad-Hoc Network. No Infrastructure No Server  Nothing - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Issues in Mobile Ad-Hoc Network

SECURITY ISSUES IN MOBILE AD-HOC NETWORKMukul A. Khairatkar

Page 2: Security Issues in Mobile Ad-Hoc Network

AGENDA

Introduction to MANET

Various Security Model

Operations

Introduction to IPSec

IPSec Operation

Simulation Details

Conclusion

Page 3: Security Issues in Mobile Ad-Hoc Network

MOBILE AD-HOC NETWORK

No Infrastructure No Server Nothing Everybody acts like a Router Security Problem

Network Resources Source Spoofing Eavesdropping Data Transformation

Page 4: Security Issues in Mobile Ad-Hoc Network

SECURITY

Key Pre-Distribution Scheme Web of Trust Public Key Certification IPSec

Page 5: Security Issues in Mobile Ad-Hoc Network

SOME SECURITY TERMS

Public Key

Private Key

Digital Signature

Certificate

Digital Signature

Certificate Of Authority

Certificates

Public Key Infrastructure

X.509

Page 6: Security Issues in Mobile Ad-Hoc Network

KEY PRE-DISTRIBUTION SCHEME

Node 1

Node 3

Node 4

Node 2

Key

Key

Key

Key

Key

Key

Page 7: Security Issues in Mobile Ad-Hoc Network

WEB OF TRUST

Node 1

Node 2

Node 3

PGP

PGP

PGP

Public

Key

Public Key

Page 8: Security Issues in Mobile Ad-Hoc Network

PUBLIC KEY INFRASTRUCTURE

X.509

Certificate Authority CA

CA CA Root Certificate

Root certificate

Distributed with Web Browser ..etc

SSL/TLS web pages

Page 9: Security Issues in Mobile Ad-Hoc Network

IPSEC

Why IPSec?

Open Standard Freely Available

Modular

Integrates in Existing IP structure

Transparent to application layer entities

For IPv6

Page 10: Security Issues in Mobile Ad-Hoc Network

SECURITY ARCHITECTURE

Page 11: Security Issues in Mobile Ad-Hoc Network

MODES

Transport Mode Payload Encrypted IP header is Intact Routing is Intact

Tunnel Mode New IP packet New Routing NW-NW Communication (tunnel)

Page 12: Security Issues in Mobile Ad-Hoc Network

IPSEC PACKET

Page 13: Security Issues in Mobile Ad-Hoc Network

NETWORK MODEL

Page 14: Security Issues in Mobile Ad-Hoc Network

IP TUNNEL

Page 15: Security Issues in Mobile Ad-Hoc Network

PERFORMANCE

Page 16: Security Issues in Mobile Ad-Hoc Network

FOR AD-HOC NETWORK

Page 17: Security Issues in Mobile Ad-Hoc Network

IPSEC FOR AD-HOC

IP Cloud

Subnet 1 Subnet 2

Page 18: Security Issues in Mobile Ad-Hoc Network

SECURITY

Page 19: Security Issues in Mobile Ad-Hoc Network

PROBLEMS

Latency Increases

Overhead Increases

Throughput Decreases

Complexity Increases

Page 20: Security Issues in Mobile Ad-Hoc Network

CONCLUSION

Ad-hoc Network uses various security

methods

Do not violate existing protocol

IPSec is a new approach to secure IPv4 and

IPv6 packets

Better approach can be used than IPSec

Page 21: Security Issues in Mobile Ad-Hoc Network

REFERENCES

[1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and

Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE

2004.

[2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic Institute and State University,

IEEE 2006.

[3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMAN

Laboratoirc CNRS-PRiSM. University of Versailles.

[4]Securing Ad-Hoc Networks by IPSEC, Abhrajit Ghosh, Telcordia Technologies Applied Research Piscataway,

NJ, IEEE paper 2004.

[5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999.

[6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC

2510, Mar 1999

[7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003.

[8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32,

No. 3, pp. 586-615, 2003.