View File - University of Engineering and Technology, Taxila
Download
Report
Transcript View File - University of Engineering and Technology, Taxila
Mobile and Ad hoc Networks
Background of Ad hoc
Wireless Networks
Wireless Communication
Technology and Research
Ad hoc Routing and
Mobile IP and Mobility
Wireless Sensor and Mesh
Networks
Student Presentations
Security in Ad hoc Networks
http://web.uettaxila.edu.pk/CMS/SP2012/teAWNms/
Outline
Introduction
Attacks and Challenges
A Multifence Security Solution
Network-layer Security
Secure Ad Hoc Routing
Secure Packet Forwarding
Link-layer Security
Open Challenges
2
Introduction
In order to provide protected communication
between nodes in a potentially hostile environment,
security has become a primary concern
The challenges of MANETs
Open network architecture
Shared wireless medium
Stringent resource constraints
Highly dynamic network topology
3
Security Pragmatism
Q: How do we keep our embedded device from being
messed with?
A: Turn it off.
Sometimes the best we can hope for is to detect
intrusions.
4
Introduction (cont.)
The goal of the security solutions for MANETs
Integrity
Anonymity
Confidentiality
Availability
Authenticity
5
Security Criteria
Three main security concerns:
Confidentiality
Data privacy
Availability
Resistance to DOS attacks
Authenticity
Keeping “foreign objects” out, data integrity
6
Encryption
A basic building block of security
Public vs. Symmetric key cryptography
Embedded devices have power constraints
Asymmetric keys are 103-104 times slower
Use symmetric keys (AES, IDEA)
Can use public key cryptography to setup secret
key
Key exchange – more on that later
Use efficient hardware implementations
http://en.wikipedia.org/wiki/AES
http://en.wikipedia.org/wiki/Rsa
http://en.wikipedia.org/wiki/IDEA_(cipher)
7
Advanced Encryption Standard (AES)
The Rijndael block cipher was selected by NIST in
2000 to be the AES
Replacement
for DES
Key length of
128, 192, or
256 bits, block
is 128 bits
http://www.iaik.tu-graz.ac.at/research/krypto/AES/
http://www.quadibloc.com/crypto/co040401.htm
8
http://www.iaik.tugraz.at/research/publications/2005/IEEIFSTINA2005.htm
Small Hardware AES-128
Implementations
5.4 kgates implementation (Satoh et al., 2001)
AES Implementation on a Grain of Sand (Feldhofer
et al., 2005)
3.4 kgates equivalent
0.25mm²
9 Mbps
“draws only a current of 3.0 µm when operated at
100 KHz and 1.5 V”
http://www.iaik.tugraz.at/research/publications/2005/IEEIFSTINA2005.htm
9
Fast Software Implementations
AES-128
226 cycles/block on a P-III (Aoki & Lipmaa, 2002)
14464 P-III cycles for 1kb
FastIDEA (4-way IDEA) (Lipmaa)
440 cycles for a 4x64 block using MMX
Poly1035-AES message authentication (Bernstein)
3.1n + 780 Athlon cycles for an n-byte message
5361 P-III cycles for 1kb
http://www.cs.ut.ee/~lipmaa/aes/rijndael.html
http://cr.yp.to/mac/poly1305-20050329.pdf
10
Embedded Encryption
Put the encryption in the network device
Wired (100Base-TX) and wireless (802.11b) versions
Supports WPA, WEP
Does 256 bit AES
Not hardware
encryption
820-1280mW
http://www.lantronix.com/device-networking/embedded-device-servers/wiport.html
11
http://www.lantronix.com/device-networking/embedded-device-servers/xport.html
Embedded Encryption (2)
Put the encryption in the CPU
VIA chips now offer a built-in security engine
256 bit AES
Quantum-based random number generator
Montgomery Multiplier for accelerating Public
Key Cryptography
Example: Eden-N Processor (smallest)
Thermal Design Power: 2.5W @ 533MHz
Size: 15x15mm
http://www.via.com.tw/en/initiatives/padlock/hardware.jsp
http://www.via.com.tw/en/products/processors/eden-n/
http://en.wikipedia.org/wiki/Thermal_Design_Point, http://en.wikipedia.org/wiki/Montgomery_reduction
12
http://citeseer.ist.psu.edu/ravi02system.html
Authentication Woes
Central Authentication Mechanisms?
Ad-hoc wireless networks aren’t permanent
Not always reachable
Congestion around central authorities
DOS
Expensive to make rapid changes
Nodes may only connect periodically
How do we know we’re talking to who we think
we’re talking to?
13
Introduction (cont.)
The security issues in each layer
Layer
Security issues
Application layer
Detecting and preventing viruses, worms, malicious
codes, and application abuses
Transport layer
Authenticating and securing end-to-end
communications through data encryption
Network layer
Protecting the ad hoc routing and forwarding
protocols
Link layer
Protecting the wireless MAC protocol and providing
link-layer security support
Physical layer
Preventing signal jamming denial-of-service attacks
14
Introduction (cont.)
A fundamental security problem in MANET: the
protection of its basic functionality to deliver data
bits from one node to another.
ensuring one-hop connectivity through link-layer
protocols (e.g., wireless medium access control,
MAC)
Extending connectivity to multiple hops through
network layer routing and data forwarding
protocols (e.g., ad hoc routing)
15
Introduction (cont.)
Security never comes for free.
Security strength and network performance are
equally important
Achieving a good trade-off between the two
extremes is one fundamental challenge in security
design for MANETs.
16
Attacks
The network-layer operations in MANETs are ad hoc
routing and data packet forwarding
The ad hoc routing protocols
Exchange routing messages between nodes
Maintain routing states at each node accordingly
Two attack categories
Routing attacks
Packet forwarding attacks
17
Attacks (cont.)
Routing attacks
Any action of advertising routing updates that does not
follow the specifications of the routing protocol
Packet forwarding attacks
Cause the data packets to be delivered in a way that is
intentionally inconsistent with the routing states
18
A Multifence Security Solution
The approaches to securing MANETs
Proactive
Prevent security threats in the first place
Adopted by secure routing protocols
Reactive
Seek to detect threats a posteriori and react
accordingly
Adopted by packet forwarding operations
19
A Multifence Security Solution (Cont.)
Secure ad hoc routing
Proactive protection through message
authentication primitives
Proactive
Source
routing
Link state Distance vector
routing
routing
Secure packet forwarding
Reactive protection through
detection and reaction
Reactive
Misbehavior
detection
Misbehavior
reaction
Network-layer security solutions
Secure wireless MAC
Reactive protection through
detection and reaction
Next-generation WEP
Modification to existing protocol
to fix the cryptographic loopholes
Link-layer security solutions
20
Network-layer Security
Protecting the network functionality to deliver
packets between mobile nodes through multi-hop ad
hoc forwarding
Message Authentication Primitives
HMAC
Digital signature
One-way HMAC key chain
21
Network-layer Security (cont.)
HMAC
Two nodes share a secret symmetric key k (the total number
of the pairwise shared key is n(n-1)/2
They can efficiently generate and verify a message
authenticator hk(·)
+Secret key k
22
Digital signature
Based on asymmetric key cryptography
(signing/encrypting and verifying/decrypting)
Each node needs to keep a CRL of revoked
certificates
23
Privacy using asymmetric-key encryption
24
Signing the whole document
25
Signing the Digest. Digital signature does not
provide privacy. If there is a need for privacy,
another layer of encryption/ decryption must be
applied.
26
Signing the Digest (Sender side)
27
Signing the Digest (Receiver side)
28
Network-layer Security (cont.)
One-way HMAC (Hash-based Message
Authentication Code) key chain
Given the output f(x), it is computationally infeasible to
find the input x
By applying f(⋅) repeatedly on an initial input x, one can
obtain a chain of outputs fi(x).
a message with an HMAC using fi(x) as the key is proven
to be authentic when the sender reveals
f(i–1)(x).
Very tight clock synchronization and large storage are
necessary
The release of the key involves a second round of
communication
29
Secure Ad Hoc Routing
Source Routing
Ensure that each intermediate node cannot remove existing
nodes from or add extra nodes to the route
A secure extension of DSR is Ariadne, which uses a oneway HMAC key chain
30
Secure Ad Hoc Routing (cont.)
Distance Vector Routing
The main challenge is that each intermediate node has to
advertise the routing metric correctly
For example, when hop count is used as the routing metric,
each node has to increase the hop count by one exactly
A hop count hash chain is devised so that an intermediate
node cannot decrease the hop count in a routing update
31
Secure Ad Hoc Routing (cont.)
Link State Routing
Secure Link State Routing (SLSP)
Each node seeks to learn and update its neighborhood by
Neighbor Lookup Protocol (NLP)
Periodically flood Link State Update (LSU) packets to
propagate link state information
SLSP adopts a digital signature approach in authentication
NLP’s hello messages and LSU packets are signed with the
sender’s private key
32
Secure Packet Forwarding
Detection
Each node can perform localized detection by overhearing
ongoing transmissions and evaluating the behavior of its
neighbors
Localized detection
Watchdog
Add a next_hop field in AODV packets
ACK-based detection
The source can initiate a fault detection process on a suspicious path
that has recently dropped more packets than an acceptable threshold
33
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,
ACM MOBICOM 2000
Watchdog
Assume bidirectional communication symmetry on
every link between nodes
If a node B is capable of receiving a message from a node
A at time t, then node A could instead have received a
message from node B at time t
Implement the watchdog
Maintain a buffer of recently sent packets
Compare each overheard packet with the packet in the
buffer
34
Watchdog (cont.)
When B forwards a packet from S toward D through
C, A can overhear B’s transmission and can verify
that B has attempted to pass the packet to C
S
A
B
C
D
35
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
ACM WiSe 2002
ACK-based detection
Weight List
Route
Discovery
Path
Byzantine
Fault
Detection
Path
Link
Weight
Management
Byzantine failures
Drop packets
Modify packets
Miss-route packets
36
ACK-based detection (cont.)
The fault detection
Based on using ACKs of the data packets
The source keeps track of the number of recent losses
When the number of recent losses violates the acceptable
threshold
Register a fault between the source and the destination
Start a binary search on the path
The adaptive probing techniques identifies a faulty link
after log n faults have occurred, where n is the length of the
path
37
Secure Packet Forwarding (cont.)
Reaction
Once a malicious node is detected, certain actions are
triggered to protect the network from future attacks
launched by this node
Global reaction
The malicious node is excluded from the network
End-host reaction
Each node may make its own decision on how to react to a malicious
node (e.g., putting this node in its own blacklist)
38
End-host reaction- Pathrater
Each node maintains a rating for every other node
and calculates a path metric by averaging the node
ratings in the path
It gives a comparison of the overall reliability of
different paths
It differs from standard DSR, which chooses the
shortest path in the route cache
39
Link-layer Security
IEEE 802.11 MAC
The vulnerability of the IEEE 802.11 MAC to DoS
attacks was identified
The attacker may exploit its binary exponential
backoff scheme to launch DoS attacks
The solution is that the sender can set the backoff
timer on its own
40
Link-layer Security (cont.)
IEEE 802.11 WEP
Message privacy and message integrity attacks
Short IV
CRC-32 checksum
Key stream recovery by known plaintext attacks
Probabilistic cipher key recovery attacks
41
Open Challenges
The new design perspective is called resiliencyoriented security design
The design possesses several features
Seek to attack a bigger problem space
Intrusion tolerance
Use other noncrypto-based schemes to ensure resiliency
Handle unexpected faults to some extent
The solution may also take a collaborative security
approach
The solution relies on multiple fences
42
Conclusion
The research on MANET security is still in its early stage. The
existing proposals are typically attack-oriented in that they
first identify several security threats and then enhance the
existing protocol or propose a new protocol to thwart such
threats. Because the solutions are designed explicitly with
certain attack models in mind, they work well in the presence
of designated attacks but may collapse under anticipated
attacks. Therefore, a more ambitious goal for ad hoc network
security is to develop a multi-fence security solution that is
embedded into possibly every component in the network,
resulting in in-depth protection that offers multiple lines of
defense against many both known and unknown security
threats.
Sources
[1] Cavin et al., "On the accuracy of MANET simulators," Proc. ACM
Workshop on Princ. Mobile Computing
[2] K.-W. Chin, et al., "Implementation Experience with MANET Routing
Protocols," ACM SIGCOMM Computer Communications Review, Nov.
2002, pp. 49-59. Available online.
[3] Frodigh, et al, "Wireless Ad Hoc Networking: The Art of Networking
without a Network," Ericsson Review, No. 4, 2000. online. [4] M. S.
Corson et al., "Internet-Based Mobile Ad Hoc Networking," IEEE Internet
Computing, July-August 1999
[5] C. Elliott and B. Heile, "Self-Organizing, Self-Healing Wireless
Networks," Proc. 2000 IEEE
[6] K. Kim, "A New Mobile Environment: Mobile Ad Hoc Networks
(MANET)," IEEE
[7] C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector
Routing,” 2nd IEEE Wksp. Mobile Comp. Sys.and Apps., 1999
Assignment #12
Write note on the topics highlighted in Yellow.
Q&A
?