security issues in mobile (wireless) ad hoc networking

19
Security Issues in Mobile (Wireless) Ad Hoc Networking By Christopher Levari Student ID: 41264681 1

Upload: lara

Post on 23-Feb-2016

82 views

Category:

Documents


0 download

DESCRIPTION

Security Issues in Mobile (Wireless) Ad Hoc Networking. By Christopher Levari Student ID: 41264681. Agenda. What is Ad Hoc and Why Do We Need It? Ad Hoc Routing The Security Problems Bluetooth Bluetooth Security and It’s Issues Proposed Solutions Conclusion. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security  Issues in Mobile (Wireless) Ad Hoc Networking

1

Security Issues in Mobile (Wireless) Ad

Hoc NetworkingBy Christopher LevariStudent ID: 41264681

Page 2: Security  Issues in Mobile (Wireless) Ad Hoc Networking

2

AgendaWhat is Ad Hoc and Why Do We

Need It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 3: Security  Issues in Mobile (Wireless) Ad Hoc Networking

3

What is Ad Hoc and Why Do We Need It?Ad hoc devices can join/leave a network “on the

fly”.This allows devices to be truly mobile.

There are two main technologies:◦ 802.11x (WiFi) - used for normal networking

applications.◦ Bluetooth - designed for short range, low power devices.

Technology and society are headed towards small low power, portable devices for this reason Bluetooth is ideal for ad hoc, and the focus of this paper.

Page 4: Security  Issues in Mobile (Wireless) Ad Hoc Networking

4

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 5: Security  Issues in Mobile (Wireless) Ad Hoc Networking

5

Ad Hoc RoutingThree Main Types:

◦Proactive - Table based routing◦Reactive – On demand routing◦Flow Control – Traffic based routing

Reactive is best!

Page 6: Security  Issues in Mobile (Wireless) Ad Hoc Networking

6

Reactive? How does it work?Three phases to routing a packet:

◦Route Discovery◦Route Reply◦Route Error

Examples: Ad Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Lightweight Mobile Routing (LMR)

Page 7: Security  Issues in Mobile (Wireless) Ad Hoc Networking

7

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 8: Security  Issues in Mobile (Wireless) Ad Hoc Networking

8

Ad Hoc Security IssuesKey Management – Who is

responsible for key management?Trust Management- How do we

know that a device is allowed to join a network?

Secure Routing- Is the device allowed to relay confidential information?

Page 9: Security  Issues in Mobile (Wireless) Ad Hoc Networking

9

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 10: Security  Issues in Mobile (Wireless) Ad Hoc Networking

10

BluetoothBluetooth allows up to 7 devices to

connect together at one time. One device is called the primary master and the others are called slaves.

Figure 1 obtained at: http://www.easycom.com.ua/data/netlan/712162057/img/piconets1.jpg

Page 11: Security  Issues in Mobile (Wireless) Ad Hoc Networking

11

Bluetooth PacketThe Bluetooth Packet

LT_ADDR3 Bits

Type4 Bits

Flow1 Bit

ARQN1 Bit

SEQN1 Bit

Error Check8 Bits

Page 12: Security  Issues in Mobile (Wireless) Ad Hoc Networking

12

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 13: Security  Issues in Mobile (Wireless) Ad Hoc Networking

13

Bluetooth Security Bluetooth handles security with the use of keys, four “link

keys” and one data encryption key.

◦ Unit key - is created once. This key is often used when device has little memory.

◦ Combination key - Each device combines the Unit keys of A and B with the two random numbers to create the key. This key is only used for communication between A and B.

◦ Master key - is used when the master device wants to transmit to several devices at once.

◦ Initialization key- is used in the initialization process.

◦ Encryption key - Encryption key is derived from the current link key. Each time encryption is needed the encryption key will be automatically changed.

Page 14: Security  Issues in Mobile (Wireless) Ad Hoc Networking

14

Bluetooth Security Issues?OK, so this all sounds fine, right? Wrong!

Small devices have limited storage, how do we handle all those keys?

The Unit key is created once, each time it is used there is a chance for a hacker to steal it.

Bluetooth says a device is “trusted” once authentication has happened. This only authenticates the device, what about the user?

No multi-level trust (i.e. Top Secret, Secret, etc.)No secure routing built-in

Page 15: Security  Issues in Mobile (Wireless) Ad Hoc Networking

15

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 16: Security  Issues in Mobile (Wireless) Ad Hoc Networking

16

Proposed SolutionSimple and Effective!

Extend the header

LT_ADDR3 Bits

Type

4 Bits

Flow

1 Bit

ARQN1 Bit

SEQN1 Bit

Capabilities

4 Bits

Trust Level3 Bits

Error Check

8 Bits

Page 17: Security  Issues in Mobile (Wireless) Ad Hoc Networking

17

More Proposed SolutionSecurity Capabilities

4 Bits = 4 Capabilities◦1 – 128 bits keys◦2- 256 bit keys◦3 – Auto –Generated PIN◦4 – Sequence Numbers

Page 18: Security  Issues in Mobile (Wireless) Ad Hoc Networking

18

AgendaWhat is Ad Hoc and Why Do We Need

It?Ad Hoc RoutingThe Security ProblemsBluetoothBluetooth Security and It’s IssuesProposed SolutionsConclusion

Page 19: Security  Issues in Mobile (Wireless) Ad Hoc Networking

19

References Aggelou, George. Mobile Ad Hoc Networks: From Wireless LANs to 4G Networks. McGraw

Hill: New York, 2005. Biagioni, E. & Chen, S. A Reliability Layer For Ad Hoc Wireless Sensor Network Routing.

University of Hawaii: Hawaii, 2004. Davis, Carlton R. A Localized Trust Management Scheme for Ad hoc Networks. McGill

University: Montreal, 2009. IIyas, Mohammad. The Handbook of Ad Hoc Wireless Networks. CRC Press: New York, 2003. Mishra, Amitabh. Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge

University Press: Cambridge, 2008. Muller, Thomas. Bluetooth Security Architecture. Nokia: USA, 1999. Papadimitratos, P. & Haas, Z. Secure Routing for Mobile Ad Hoc Networks. Cornell

University: Ithaca, 2002. Roche, E. & Dunne, K. & O'Loghlin, D. Bluetooth For Ad Hoc Networking.

http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group3/index.html Retrieved on 23 March 2009. Scarfone, K. & Padgette, J. NIST: Guide to Bluetooth Security. NIST Special Publication:

Gaithersburg, 2008. Standards Committee. IEEE Standard 802.15.1: Revision 2005. IEEE: New York, 14 June

2005. (pp. 437-459) Toh, C. K. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall: New

Jersey, 2002. Traskback, Marjaana. Security of Bluetooth: An Overview of Bluetooth Security. Helsinki:

2009 Varadharajan, V. & Shankaran, R. & Hitchens, M. Securing the Ad Hoc On-demand Distance

Vector Protocol. Macquarie University: Australia, 2009.