Ad-HOc presentation

41
Routing Security in Ad Hoc Wireless Networks Presented by J.Jaffer Basha M.Elanthendral II Year – CSE Sree Sowdambika College of Engineering Aruppukottai

Transcript of Ad-HOc presentation

Page 1: Ad-HOc presentation

Routing Security in Ad Hoc Wireless Networks

Presented by

J.Jaffer BashaM.Elanthendral

II Year – CSESree Sowdambika College of Engineering

Aruppukottai

Page 2: Ad-HOc presentation

Wireless Networks

Wireless networks provide rapid, access to information and computing, limiting the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery

Page 3: Ad-HOc presentation

Collection of wireless mobile hosts forming a temporary network

Every device has the role of router and actively participates in data forwarding.

Communication between two nodes can be performed directly if the destination is within the sender’s transmission range, or through intermediate nodes acting as routers if the destination is outside sender’s transmission range.

Ad Hoc Wireless Networks

Page 4: Ad-HOc presentation

Characteristics of Ad Hoc Wireless Networks

Characteristics which differentiate Ad Hoc wireless networks from other networks are: Dynamic Network Topology Distributed Operations Limited Energy Resources

Page 5: Ad-HOc presentation

Routing

Routing is an important operation for data exchange between wireless devices.

Main routing responsibilities are exchanging the routing information, finding a feasible path between source and destination.

Page 6: Ad-HOc presentation

Routing Protocol

The major requirements of a routing protocol are Minimum route acquisition delay Quick route reconfiguration in case of path breaks Loop-Free routing Distributed routing protocol Low control overhead Scalability with network size QoS support as demanded by the application Support of time sensitive traffic Security and Privacy.

Page 7: Ad-HOc presentation

Routing Protocols in Ad Hoc Wireless Networks

The design of routing protocols should take these factors into consideration.

Based on the routing information update mechanism, routing protocols in ad hoc wireless networks can be classified as

Proactive (or table-driven) protocols Reactive (or on-demand) protocols Hybrid routing protocols.

Page 8: Ad-HOc presentation

Proactive Routing Protocols

Nodes exchange routing information periodically to maintain accurate routing information.

The path can be computed rapidly based on the updated information available in the routing table.

The algorithm used is DSDV.

Page 9: Ad-HOc presentation

DSDV

Finds shortest paths between nodes using Bellman-Ford algorithm.

Each node maintains a routing table

For each entry, the following fields are maintained:

the destination address next hop on the shortest path to that destination a destination sequence number

Page 10: Ad-HOc presentation

DSDV

Sequence numbers are used for preventing loop formation.

Each entry in the routing table has a sequence number.

If a node receives an update with a smaller sequence number, then that update is ignored.

Path is adopted if it has a greater sequence number, or if it has the same sequence number but a lower metric.

Page 11: Ad-HOc presentation

When a broken link is detected, the node creates a routing update with next odd sequence number and metric value of infinity.

Destination Next Metric Seq. Nr Install TimeA A 0 A-550 001000B B 1 B-102 001200C B 3 C-588 001200D B 4 D-312 001200

DSDV

Page 12: Ad-HOc presentation

Reactive Routing Protocol

A route discovery mechanism is initiated only when a node does not know a path to a destination it wants to communicate with.

Perform better with significantly lower overheads than proactive routing protocols

Has two main operations Route discovery Route maintenance

Various reactive protocols have been proposed Ad Hoc On-demand Distance Vector (AODV) Dynamic Source Routing (DSR)

Page 13: Ad-HOc presentation

DSR

Is a source routing protocol, each data packet carries the source-destination path in its header.

Using this information, intermediate nodes can determine who is the next hop this packet should be forwarded to.

Every entry has an expiration time after which the entry is deleted in order to avoid stale information.

Page 14: Ad-HOc presentation

Each Route Request contains sequence number generated by source node, to prevent loop formation.

An intermediate node checks the sequence number, and forwards the Route Request only if this message is not a duplicate.

Receiving the Route Reply, the sender starts sending data to the receiver.

Page 15: Ad-HOc presentation

If a node detects a failure, it sends a Route Error message to the source.

All routes that contain this hop are truncated.

If the source does not have an alternative path to the destination, it has to re-initiate the path discovery mechanism.

Page 16: Ad-HOc presentation

DSR has several optimization techniques.

Know a path to the destination to reply to the Route Request message instead of forwarding the request.

Path discovery can use an expanding ring search mechanism when sending the Route Request messages in close destinations, thus avoiding broadcasting in the whole network.

Page 17: Ad-HOc presentation

Hybrid Routing Protocols

Some routing protocols are hybrid of proactive and reactive mechanisms.

examples of hybrid routing protocols: Zone Routing Protocol (ZRP) Core Extraction Distributed Ad Hoc Routing

Protocol (CEDAR)

Page 18: Ad-HOc presentation

Zone Routing Protocol (ZRP)

The network is divided in zones . The intra-zone routing protocol is a proactive routing

protocol, the inter-zone routing protocol is a reactive routing protocol.

When a node transmit data to a destination within the same zone, then this is done using the proactive routing protocol.

If the destination is in another zone, then the source node border casts the Route Request until it reaches the destination zone.

Node of the destination zone sends then back a Route Reply message.

If a broken link is detected, the path reconstruction can be done locally

Page 19: Ad-HOc presentation

Security Attacks onRouting Protocol

Secure system can be achieved by preventing attacks or by detecting them and providing a mechanism to recover for those attacks.

Attacks on ad hoc wireless networks can be classified as Active attacks Passive attacks

Page 20: Ad-HOc presentation

Passive Attacks

Intruder snoops the data exchanged without altering it.

The goal of the attacker is to obtain information that is being transmitted.

These attackers are difficult to detect, since the network is not disrupted

Powerful encryption mechanism can alleviate these attackers.

Page 21: Ad-HOc presentation

Active Attack

Attacker actively participates in disrupting network services.

Attack by modifying packets or by introducing false information in the ad hoc network.

Confuses routing procedures and degrades network performance. Active attacks can be divided into Internal Attack External Attack

Page 22: Ad-HOc presentation

Internal Attack

From compromised nodes that were once legitimate part of the network.

Since they are part of the network, they are much more severe and difficult to detect when compared to external attacks.

Page 23: Ad-HOc presentation

External Attack

Carried by nodes that are not legitimate part of the network.

Such attacks can be defended by using encryption, firewalls and source authentication.

Page 24: Ad-HOc presentation

Attacks using Impersonation

An intruder consume another node resources or to disturb normal network operation.

An attacker node achieves impersonation by misrepresenting its identity.

This can be done by changing its own IP or MAC address to that of some other legitimate node.

Some strong authentication procedures can be used to stop attacks by impersonation.

Page 25: Ad-HOc presentation

ImpersonationMan-in-the-Middle Attack

The attacker can impersonate the receiver with respect to the sender, and the sender with respect to the receiver.

without having either of them realize that they have been attacked.

Page 26: Ad-HOc presentation

Attacks using Modification

This attack disrupts the routing function by having the attacker illegally modifying the content of the messages.

Misrouting Attack: A non-legitimate node sends data packet to the wrong destination.

Detour Attack: The traffic is diverted to other routes that appear to be shorter and might contain malicious nodes which could create other attacks.

Blackmail Attack: Causes false identification of a good node as malicious node.

Page 27: Ad-HOc presentation

Attacks using Fabrication

An intruder generates false routing messages, such as routing updates and route error messages, in order to disturb network operation or to consume other node resources.

Page 28: Ad-HOc presentation

Security Mechanism and Solutions for Routing Protocol

Message encryption and digital signatures are two important mechanisms for data integrity and user authentication.

There are two types of data encryption mechanisms Symmetric Asymmetric

Symmetric : Use the same key (the secret key) for encryption and decryption of a message

Asymmetric : Use one key (the public key) to encrypt a message and another key (the private key) to decrypt it.

Page 29: Ad-HOc presentation

Message Authentication Code (MAC) is used. Cryptographic checksum, computed by the

message initiator as a function of the secret key and the message being transmitted and it is appended to the message.

The recipient re-computes the MAC in the similar fashion.

If the MAC computed by the receiver matches the MAC received with the message then the recipient is assured that the message was not modified.

Page 30: Ad-HOc presentation

Secure Efficient Ad hoc Distance Vector

Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of DSDV.

SEAD routing tables maintain a hash value for each entry.

Page 31: Ad-HOc presentation

The key feature of the proposed security protocol is the use one-way hash chain function H.

Each node computes a list of hash values h0, h1, ・ ・ ・ , hn, where hi = H(hi−1) and 0 < i ≤ n, based on an initial random value h0.

If a node knows H and a trusted value hn, then it can authenticate any other value hi, 0 < i ≤ n by successively applying the hash function H and then comparing the result with hn.

Page 32: Ad-HOc presentation

To authenticate, a node adds a hash value to each routing table entry.

For a metric j and a sequence number i, the hash value hn−i+j is used to authenticate the routing update entry for that sequence number

Since an attacker cannot compute a hash value with a smaller index than the advertised value.

Page 33: Ad-HOc presentation

ARIADNE Design of ARIADNE is based on DSR. It assumes that sender and receiver share secret

keys for message authentication. The initiator (or sender) includes a MAC computed

with an end-to-end key and the target (or destination) verifies the authenticity and freshness of the request using the shared key.

Pre-hop hashing mechanism, a one-way hash function that verifies that no hop is omitted, is also used in Ariadne.

Provides a strong defense against attacks that modify and fabricate routing information.

Page 34: Ad-HOc presentation

Security Aware Routing (SAR)

Is an on demand routing protocol based on AODV The initiator of the route in SAR includes a

security metric in the route request. This security metric is the minimum trust level of

the nodes that can participate in the route discovery.

Only those nodes that have this minimum security level can participate in the route discovery.

All other nodes that are below that trust level will drop the request packets.

Page 35: Ad-HOc presentation

SAR uses sequence numbers and timestamps to stop replay attacks.

Threats like interception and subversion can be prevented by trust level key authentication.

Modification and fabrication attacks can be prevented

Page 36: Ad-HOc presentation

Secure Routing Protocol (SRP)

SRP defends against attacks that disrupt the route discovery process.

Set up a security association without the need of cryptographic validation of the communication data by the intermediate nodes.

SRP assumes that this SA can be achieved through a shared key KST between the source S and target T.

Page 37: Ad-HOc presentation

The SRP uses an additional header called SRP header to the underlying routing protocol packet.

SRP header contains the following fields: the query sequence number QSEC query identifier number QID 96 bit MAC field

Discard a route request message if SRP header is missing.

Otherwise, forward the request towards destination after extracting QID, source, and destination address.

Page 38: Ad-HOc presentation

When the target T receives request packet, it verifies.

If QSEC >=QMAX, the request is dropped. Otherwise it calculates the keyed hash of the request

fields and if the output matches SRP MAC then authenticity of the sender and integrity of the request are verified.

If the two routes match then S calculates the MAC by using the replied route, the SRP header fields, and the secure key between source and destination.

If the two MAC match then the validation is successful and it confirms that the reply did came from the destination T.

Page 39: Ad-HOc presentation

Security Protocols for Sensor Network (SPINS)

It provides important network services like data confidentiality two party data authentication data freshness Through Secure Network Encryption Protocol

(SNEP) and secure broadcast through Micro Timed Efficient Stream Loss-tolerant Authentication (μTESLA).

μTESLA an enhanced version of TESLA, uses symmetric cryptographic techniques for authentications and asymmetry cryptography only for the delayed disclosure of keys.

Page 40: Ad-HOc presentation

CONCLUSION

Achieving a secure routing protocol is an important task that is being challenged by the unique characteristics of an ad hoc wireless network.

In this paper we discuss security services and challenges in an ad hoc wireless network environment.

The current security mechanisms, each defeats one or few routing attacks. Designing routing protocols resistant to multiple attacks remains a challenging task.

Page 41: Ad-HOc presentation

THANK YOU