security issues in mobile (wireless) ad hoc networking
DESCRIPTION
Security Issues in Mobile (Wireless) Ad Hoc Networking. By Christopher Levari Student ID: 41264681. Agenda. What is Ad Hoc and Why Do We Need It? Ad Hoc Routing The Security Problems Bluetooth Bluetooth Security and It’s Issues Proposed Solutions Conclusion. - PowerPoint PPT PresentationTRANSCRIPT
1
Security Issues in Mobile (Wireless) Ad
Hoc NetworkingBy Christopher LevariStudent ID: 41264681
2
AgendaWhat is Ad Hoc and Why Do We
Need It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
3
What is Ad Hoc and Why Do We Need It?Ad hoc devices can join/leave a network “on the
fly”.This allows devices to be truly mobile.
There are two main technologies:◦ 802.11x (WiFi) - used for normal networking
applications.◦ Bluetooth - designed for short range, low power devices.
Technology and society are headed towards small low power, portable devices for this reason Bluetooth is ideal for ad hoc, and the focus of this paper.
4
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
5
Ad Hoc RoutingThree Main Types:
◦Proactive - Table based routing◦Reactive – On demand routing◦Flow Control – Traffic based routing
Reactive is best!
6
Reactive? How does it work?Three phases to routing a packet:
◦Route Discovery◦Route Reply◦Route Error
Examples: Ad Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Lightweight Mobile Routing (LMR)
7
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
8
Ad Hoc Security IssuesKey Management – Who is
responsible for key management?Trust Management- How do we
know that a device is allowed to join a network?
Secure Routing- Is the device allowed to relay confidential information?
9
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
10
BluetoothBluetooth allows up to 7 devices to
connect together at one time. One device is called the primary master and the others are called slaves.
Figure 1 obtained at: http://www.easycom.com.ua/data/netlan/712162057/img/piconets1.jpg
11
Bluetooth PacketThe Bluetooth Packet
LT_ADDR3 Bits
Type4 Bits
Flow1 Bit
ARQN1 Bit
SEQN1 Bit
Error Check8 Bits
12
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
13
Bluetooth Security Bluetooth handles security with the use of keys, four “link
keys” and one data encryption key.
◦ Unit key - is created once. This key is often used when device has little memory.
◦ Combination key - Each device combines the Unit keys of A and B with the two random numbers to create the key. This key is only used for communication between A and B.
◦ Master key - is used when the master device wants to transmit to several devices at once.
◦ Initialization key- is used in the initialization process.
◦ Encryption key - Encryption key is derived from the current link key. Each time encryption is needed the encryption key will be automatically changed.
14
Bluetooth Security Issues?OK, so this all sounds fine, right? Wrong!
Small devices have limited storage, how do we handle all those keys?
The Unit key is created once, each time it is used there is a chance for a hacker to steal it.
Bluetooth says a device is “trusted” once authentication has happened. This only authenticates the device, what about the user?
No multi-level trust (i.e. Top Secret, Secret, etc.)No secure routing built-in
15
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
16
Proposed SolutionSimple and Effective!
Extend the header
LT_ADDR3 Bits
Type
4 Bits
Flow
1 Bit
ARQN1 Bit
SEQN1 Bit
Capabilities
4 Bits
Trust Level3 Bits
Error Check
8 Bits
17
More Proposed SolutionSecurity Capabilities
4 Bits = 4 Capabilities◦1 – 128 bits keys◦2- 256 bit keys◦3 – Auto –Generated PIN◦4 – Sequence Numbers
18
AgendaWhat is Ad Hoc and Why Do We Need
It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion
19
References Aggelou, George. Mobile Ad Hoc Networks: From Wireless LANs to 4G Networks. McGraw
Hill: New York, 2005. Biagioni, E. & Chen, S. A Reliability Layer For Ad Hoc Wireless Sensor Network Routing.
University of Hawaii: Hawaii, 2004. Davis, Carlton R. A Localized Trust Management Scheme for Ad hoc Networks. McGill
University: Montreal, 2009. IIyas, Mohammad. The Handbook of Ad Hoc Wireless Networks. CRC Press: New York, 2003. Mishra, Amitabh. Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge
University Press: Cambridge, 2008. Muller, Thomas. Bluetooth Security Architecture. Nokia: USA, 1999. Papadimitratos, P. & Haas, Z. Secure Routing for Mobile Ad Hoc Networks. Cornell
University: Ithaca, 2002. Roche, E. & Dunne, K. & O'Loghlin, D. Bluetooth For Ad Hoc Networking.
http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group3/index.html Retrieved on 23 March 2009. Scarfone, K. & Padgette, J. NIST: Guide to Bluetooth Security. NIST Special Publication:
Gaithersburg, 2008. Standards Committee. IEEE Standard 802.15.1: Revision 2005. IEEE: New York, 14 June
2005. (pp. 437-459) Toh, C. K. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall: New
Jersey, 2002. Traskback, Marjaana. Security of Bluetooth: An Overview of Bluetooth Security. Helsinki:
2009 Varadharajan, V. & Shankaran, R. & Hitchens, M. Securing the Ad Hoc On-demand Distance
Vector Protocol. Macquarie University: Australia, 2009.