The SADSR Protocol

Download Report

Transcript The SADSR Protocol

Survey Presentation
Course: 60-564
Fall 2004
Ataul Bari
Instructor: Dr. A. K. Aggarwal
1
Agenda

Introduction

The DSR Protocol

The SADSR Protocol

The SERAN for Security Equipment

Closing Remarks
2
Papers Reviewed
 Ghazizadeh, S.; Ilghami, O.; Sirin, E.; Yaman, F.;
“Security-aware adaptive dynamic source routing
protocol”, Local Computer Networks, 2002.
Proceedings. LCN 2002. 27th Annual IEEE
Conference on 6-8 Nov. 2002 Pages:751 – 760
 Ben-Othman, J.; Xiaoyun Xue; “SERAN: a new
protocol to hide an equipment in ad hoc networks”,
Computers and Communication, 2003. (ISCC 2003).
Proceedings. Eighth IEEE International Symposium
on 30 June-3 July 2003 Pages:356 - 361 vol.1
3
Introduction
 Wireless Networks
 Infrastructured Network
 Consists of fixed and wired gateways
 Fixed base station (Access Point)
 Nodes can move geographically
 Ad Hoc (or Infrastructureless) Network
 All nodes are mobile
 Nodes communicate with each other
 No centralized entity (base station, Access point)
 Nodes are routers
4
Infrastructured Network
5
Ad Hoc Networks
6
Characteristics
 Contain a large number of nodes
 No pre-existing fixed network infrastructure
 Can be deployed rapidly
 Nodes can freely move around
 Creation and deletion of network links
 Dynamically variable topologies
 Bandwidth constrained links
 Energy constrained operation
7
The MANET Model
 Nodes have fixed IDs (e.g. IP addresses)
 Wireless communication devices
 Nodes are powered with lightweight batteries
that have limited life
 Nodes have equal capability
 Identical communication devices.
 Nodes connectivity is not transitive
8
Routing in MANET
 Challenging
 Unpredictable node mobility
 Dynamic topology variation
 Nature of wireless media
 Types
 Flat
 Hierarchical
 Geo-assisted
 Proactive and Reactive Protocols
9
Routing Protocols
10
Security in Ad Hoc Networks
 Always a weak Point
 Inherent quality of wireless media
 Mobility of the nodes
 Lack of centralized entity
 Security Requirements
 Availability, Confidentiality, Integrity,
Authentication and Non-Repudiation
 Threats
 DoS, Impersonation, Byzantine Failure,
Disclosure and Poor Physical Protection
11
The SADSR Protocol
 Security-Aware Adaptive Dynamic Source
Routing Protocol
 Basic Idea
 Non-malicious node detects malicious nodes
 Non-malicious node Isolates malicious nodes
 Goal is to Secure DSR Protocol
12
The DSR Protocol
 Dynamic Source Routing Protocol
 Reactive (on-demand)
 Source-Routed
 Each node maintains route caches containing the
source routes
 Updates it whenever it learns about new routes
 two major phases
 Route discovery
 Route maintenance
13
Route Discovery Contd..
 On-Demand
 Check Route Cache
 Initiates route discovery process
 Broadcast a RREQ packet
 Includes Source & Destination Address
 Includes an unique ID
 May be replied by intermediate nodes
 May be replied by destination nodes
14
Route Discovery in DSR
Ref: Padmini Misra; “Routing Protocols for Ad Hoc Mobile Wireless Networks “
http://www.cse.ohio-state.edu/~jain/cis788-99/ftp/adhoc_routing/, 1999
15
Route Maintenance
 Route Error Packet
 Fatal transmission problem at its data link layer
 Removes that hop from its route cache
 All routes included that particular hop are truncated
 Acknowledgment packets
 Verify the correct operation of the route links
16
The SADSR
 Secure DSR protocol by enhancing it
 Non-malicious nodes
 Detect malicious node
 Isolate malicious node
 Uses digital signatures to authenticate
 Asymmetric cryptography
 Keeps
 Multiple routes for each destination
 A local trust value for each node in the network
 Each path is assigned with a trust value
17
The Attackers
 External attackers
 Inject erroneous routing information
 Replay previous routing messages
 Modify the valid routing information
 Internal attackers






Trusted at some point of time
Not committed to their promises anymore
Compromised by external attackers
More difficult to detect
Isolate affected nodes
Pass traffic through special routes
18
Assumptions
 Both External and Internal attackers exists
 Malicious nodes are relatively small
 All the connections are bidirectional
 public key crypto is used
 A secure CA in place
 All nodes know the public key of CA, Au
 Certificate issued on off line basis
 Certificate bounds a nodes IP with its
public key
 The certificate obtained from CA never
expires
19
The SADSR Protocol
 Three different stages
 Certificate Acquisition
 Multi-path Route Discovery
 Routing
20
Certificate Acquisition
 Nodes obtain a certificate from CA
 Issued in an off-line process
 Certificates remain valid for entire lifetime
 Security problem ?
 Networks is set up for a certain time only
 Certificate of node v
Cv  E Ar
 A , IP , v 
u
v
u
 Nodes get public key of CA, Au
21
Multi-path Route Discovery
 Initiation of Route discovery process
 Generate RREQ message M  RREQ, IPd , T 
 Sign M
 Appends, at the end of M,
 Encrypted hash value of M,
 Its certificate, Cv
Evr  H  M  
 Broadcast M
22
Multi-path Route Discovery Contd..
 Intermediate node
 Checks if RREQ not too old
 Verifies each signature with a probability p
 Ensures its own signature is not in the sequence
 Count is less then [(Max. No. of route, m)/2]
 First RREQ msg. from a neighbor for same route
 Signs it message
 Re broadcast the message
 Entries are discarded after a predefined time, Texp
23
Multi-path Route Discovery Contd..
 Destination node




Sets up a timer for the source node, S
Begin to reply
Replies all RREQ messages up to the number m
Non node-disjoint paths
 Use 50% probability to reply
 To ensure enough route in case of very few neighbor




Generate RREP message, M  RREP, IPd ,..., IPs , T 
Signs M, Unicast back to S, using same path of RREQ
Intermediate nodes checks signature, signs, forwards
Rest of RREQs are dropped after Texp time
24
Routing – Basic Idea
 Nodes locally calculate and keep trust value (TV)
of the other nodes
 Based on the observations it has made so far
 The trust values of the nodes in a path
 Increase every time v successfully sends a message
through that path,
 Decrease if a message is lost or tampered with
 Possible as ACK sent through the same path
 TV of a path is the product of TVs of its nodes
 For routing, paths with higher TV are preferred
25
Assignment of Trust Value
 Each source node keeps track of
 The paths through which it has sent packets
 If it has received the acknowledgement through that path
for the corresponding message
 Uses two counters for each v in a path, xv
 The trustworthiness of v, T
 Trustworthiness of a path
v
and yv
 xv 


x


y
v 
 v
s, v1, v2 ,....., vn , d =  i 1Tv 
n
2/ n
i
26
Sending Data Packets
 For sending a data packet, source node
 Chose a path randomly from available paths
 s are likely to know m paths for d
 Chance of a path to be chosen is proportional to its trust
value




Appends a sequence number with the data packet
Appends the chosen path with the data packet
Signs the packet
Sends through the chosen path
27
Sending Data Packets Cont’d…
 Intermediate nodes
 Verify the signature of s with a probability p
 Then forward the packet
 Destination node
 If data packet received through path, P  s, v1, v2 ,...., d
 Generate an acknowledgement M  ACK , IPvn ,....., IPv1 , IPs , qs
 Signs M
 Sends M to s through the same path, P


 Intermediate nodes verify signature, forward
28
Updating Trust Values
 The source node s maintains a table
 of sequence numbers of packets sent
 the path used and
 a time stamp for tacktime units
 Receives a valid ACK
 Awards each node on that path
 Updates entries for each node on that path
 Not -Receives a valid ACK after tack time
 Assumes that the packet is lost
 Punish each node on that path
 Updates entries for each node on that path
29
Intermediate Link Failure
 vk fails to communicate with vk 1

 Generate a R.E.M. M  RERR, IPvk ,....., IPv1 , IPs , qs
 Signs it
 Sends it to s

 The source node s, after receiving the M
 Locate and eliminate all path containing the link
 IP , IP 
vk
vk 1
30
Security Analysis
 The possible attacks on DSR protocol
 Attacks on Route Discovery
 Attacks on Routing
 Fabrication of Route Error Messages
 Denial of Service Attacks
31
Attacks on Route Discovery
 Modification of source routes
 content is changed?
 Detected by signature verification
 Some or all node info dropped?
 No ACK can be reached to S
 RREP modified?
 Not reached S or discarded there
 Route cache poisoning
 Only the destination send back RREP
 No snooping for intermediate nodes
 Not participating in route discovery
 Passive maliciousness, nothing can do
32
Attacks on Routing
 In a Data Packet, may Modify
 Data
 Signature verification fails, No ACK
 Routes
 Not reach destination, No ACK
 Dropping the Packets
 Dropped packet, no ACK
 Gradual isolation
33
False Route Error Msg. And DoS
 Fabrication of Route Error Messages
 Node may lie that a link is broken
 Intermediate node do not snoop and update
 Denial of Service Attacks
 Sending RREQs with Fake IDs
 Node broadcast may RREQ after spoofing IP
 intermediate nodes will caught and get rid of some
 Rest will be caught at the destination, no RREP
 Still a successful attack can be made
 Sending RREQs to a Fake Destination
 All intermediate nodes will sign and rebroadcast
 Currently nothing, but may be extended to keep TV for each
S
34
Experimental Results
35
Experimental Results
36
The SERAN
 Security Equipment protocol in Routing in Ad
hoc Networks
 A node is given ability
 Use the ad hoc network but not provide resources
 Hide itself from the network
 Possible application
 Conserving energy for critical node
 Isolate congested node
37
Basic Idea
 Neighbouring nodes know each others at the
MAC layer
 The protected node, Nse communicate with a
neighbor Nc
 A new layer, SERAN, between the IP and the
transport layer
38
Basic Idea Cont’d…
 Node needs an IP address to communicate with others
 Dynamic IP address
 Fixed IP addresses -> Normal node
 No IP addresses -> Invisible node
 Use of “Smart Cards”
 Implementing DHCP in Smart Cards
 Every time there is a communication
 The smart card assigns a IP address to
 Discards it after that session ended
 Next time, assigns a different IP address
39
The Smart Card
Ref:
http://www.acs.com.hk/smartcardoverview.asp
40
The Communication in SEARAN
 Whenever there is an outgoing packet
 Gets an IP address from the smart cards, pass the packet
 After passing through the network layer, the address is discarded
 the packet is uni-cast to N c including only the destination address in the
SERAN header
 The SERAN layer is capable of recognizing and sending the message to
the destination.
 The SERAN header includes the source MAC address to distinguish the
real source.
41
The Communication in SEARAN
 Incoming packet in the MAC layer, the card checks
 The header of the packet to see if the packet’s destination MAC
address is its own
 If the packet contains the broadcast address (255.255.255.255).
 If any of these is true, then get a temporary IP address
from the card and pass the packet to the IP layer.
 The smart card is capable of decoding the header of the
packets.
42
Evaluation of Nc
43
Improvement
44
Advantages and Disadvantages
 Advantages
 Can keep a node secret
 Protected node saves its energy
 Protected node can send and receive rapidly
 avoid “overflow routing table”, “sleep deprivation”
 Disadvantages
 Bad influence for the global routing
 May reduce the number of multi-routes
 Selection of Nc still remains as an issue
45
Conclusions
 Security is a weak point in ad hoc networks
 The SADSR protocol is proposed to secure
an existing protocol called DSR
 Tests show that SADSR copes well in
presence of malicious nodes
 SERAN may be used to hide security
equipment in ad hoc network
 First known approach using smart card
 Looking forward to a secure ad hoc network
46