Security Issues in Mobile Ad
Download
Report
Transcript Security Issues in Mobile Ad
SECURITY ISSUES IN MOBILE
AD-HOC NETWORK
Mukul A. Khairatkar
AGENDA
Introduction to MANET
Various Security Model
Operations
Introduction to IPSec
IPSec Operation
Simulation Details
Conclusion
MOBILE AD-HOC NETWORK
No Infrastructure No Server Nothing
Everybody acts like a Router
Security Problem
Network Resources
Source Spoofing
Eavesdropping
Data Transformation
SECURITY
Key Pre-Distribution Scheme
Web of Trust
Public Key Certification
IPSec
SOME SECURITY TERMS
Public Key
Private Key
Digital Signature
Certificate
Digital Signature
Certificate Of Authority
Certificates
Public Key Infrastructure
X.509
KEY PRE-DISTRIBUTION SCHEME
Node 2
Key
Node 1
Key
Node 3
Key
Node 4
WEB OF TRUST
PGP
Public Key
Node 1
Public Key
Node 3
PGP
Node 2
PGP
PUBLIC KEY INFRASTRUCTURE
X.509
Certificate Authority CA
CA CA Root Certificate
Root certificate
Distributed with Web Browser ..etc
SSL/TLS web pages
IPSEC
Why IPSec?
Open Standard Freely Available
Modular
Integrates in Existing IP structure
Transparent to application layer entities
For IPv6
SECURITY ARCHITECTURE
MODES
Transport Mode
Payload Encrypted
IP header is Intact
Routing is Intact
Tunnel Mode
New IP packet
New Routing
NW-NW Communication (tunnel)
IPSEC PACKET
NETWORK MODEL
IP TUNNEL
PERFORMANCE
FOR AD-HOC NETWORK
IPSEC FOR AD-HOC
IP Cloud
Subnet 1
Subnet 2
SECURITY
PROBLEMS
Latency Increases
Overhead Increases
Throughput Decreases
Complexity Increases
CONCLUSION
Ad-hoc Network uses various security methods
Do not violate existing protocol
IPSec is a new approach to secure IPv4 and IPv6
packets
Better approach can be used than IPSec
REFERENCES
[1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and
Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE
2004.
[2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic Institute and State University,
IEEE 2006.
[3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMAN
Laboratoirc CNRS-PRiSM. University of Versailles.
[4]Securing Ad-Hoc Networks by IPSEC, Abhrajit Ghosh, Telcordia Technologies Applied Research Piscataway,
NJ, IEEE paper 2004.
[5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999.
[6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC
2510, Mar 1999
[7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003.
[8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32,
No. 3, pp. 586-615, 2003.