Download Mobile Ad hoc Network Security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

AppleTalk wikipedia , lookup

Distributed firewall wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Wireless security wikipedia , lookup

Peering wikipedia , lookup

Deep packet inspection wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Airborne Networking wikipedia , lookup

Routing wikipedia , lookup

Peer-to-peer wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Single-hop and Multi-hop
MANET Security
S. Srinivasan
Professor of CIS
University of Louisville
Louisville, Kentucky, USA
1
Outline
•
•
•
•
Mobile Ad hoc Network (MANET)
Single-hop Networks
Multi-hop Networks
Current models:
– Denial of Service (DoS)
– Selfish node
– Routing
• Our research
• Open research areas involving MANET
2
MANET
•
•
•
•
•
MANET is a temporary network
No central server
Infrastructure-free
Comparison with wired network
Trust establishment
3
MANET Diagram
Wireless network
HA
Wired
internet
FA
M2
M1
M3
Ad hoc network
M4
4
MANET Security
• Principal aspects are:
– Confidentiality
– Integrity
• Vulnerabilities are:
– Malicious nodes
– Covert channels
– Eavesdroppers
5
Single-hop Networks
• Base Station (BS) plays a critical role
• BS is involved in communication with
every Mobile Node (MN)
• BS takes care of channel assignment for
RTS (Request To Send) and CTS (Clear
To Send) packets
• Usual MAC protocol is slotted ALOHA
(GSM uses this for access requests)
6
Single-hop Networks
MN4
MN1
MN3
BS
MN2
7
Single-hop Networks
• Usually 7 frequencies are reused
• Neighboring cells use different frequencies
• Within each cell dedicated single channels
are used for each direction of traffic
8
Multi-hop Networks
• Extends coverage area of single-hop
networks
• Mobile node to mobile node connections
allowed
• More demands placed on MAC protocols
than single-hop networks
• Multi-hop networks can provide
connection-oriented service by partitioning
available bandwidth to multiple channels
9
Multi-hop Networks
MN6
MN3
MN5
MN4
MN1
BS
MN2
10
Multi-hop Networks
M
N
4
M
N
8
M
N
3
M
N
7
Wired link
M
N
1
B
S
M
N
2
M
N
5
B
S
M
N
6
11
Multi-hop Networks
• Common protocols used are the Floor
Acquisition Multiple Access (FAMA) class
of protocols
• 802.11 DCF (Distributed Coordination
Function) protocol is very cost effective
and mature. This is actually a CSMA/CA.
• Typically the transmission range of a
mobile device is not a constraint but the
traffic a cell can support is
12
Multi-hop Networks
• Policy of not reusing a channel in adjacent cells
works in single-hop networks
• In multi-hop networks, sharing of data and
control channel in the entire service area is
preferable
• Benefits of multi-hop networks over single-hop
networks are:
– robustness
– higher bandwidth availability
– spatial reuse
13
Multi-hop Networks
• Robustness comes from not having a single path
such as via an Access Point (AP)
• Example: email
• Bandwidth is higher at shorter range
• Less power is required to transmit over shorter
distances
• Since multiple paths exist to the network over
multiple nodes, there is no bottleneck of an AP
14
Current Models
• Denial of Service (DoS)
– Malicious nodes and selfish nodes cause DoS
• Yi et al (2002) discuss Mobile Certification
Authority (MOCA) protocol for MANETs
using PKI
• MOCA distributes Certificate Authority
functionality to selected nodes based on
trust
15
Current Models
• Avoine et al (2002) discuss their fair key
exchange model called Guardian Angel
• Uses probabilistic techniques without any
trusted third party for key exchange
16
Current Models
• Selfish nodes
• Buttyan et al (2003) show using simulation how
selfish nodes fail to participate in packet
forwarding
• Buttyan study shows that every node spends
80% of energy for packet forwarding
• A nuglet counter is used here to keep track of
selfish node behavior. It is a tamper resistant
hardware security module attached to a node.
Detects selfishness in packet forwarding.
17
Current Models
• Nuglet counter is decreased when it originates a
packet and increased when it forwards a packet
• Nodes that participate in the ad hoc network
must maintain a positive nuglet counter
• If n is the number of intermediate nodes to the
destination, then the originator can send the
packet if its nuglet counter is >= n. In that case
the nuglet counter is decreased by n.
Otherwise, the node cannot send its packet
• When the node forwards one packet for others
then its nuglet counter is increased by one
18
Current Models
• Michiardi et al (2002) have developed the CORE
(Collaborative Reputation) model for monitoring
behavior of neighboring nodes for selfish behavior
• Each node monitors the behavior of neighboring
nodes for a specific function. If performance matches
expected behavior then observation is positive.
• One node sends a probing message to a node one
hop away. If the message is acknowledged within the
timeout period then the neighbor did the forwarding.
• Lack of positive values would result in node getting
isolated
19
Current Models
• How selfish behavior is detected:
– Each node selects a backoff value in the range
[0, CW] where CW is contention window duration
– When channel is idle, the backoff counter is
decremented by one after every time slot
– Counter is frozen when channel is busy
– Misbehaving nodes attempt to choose a backoff value
in the range [0, CW/4] thereby they get quicker
access to the bus
– This is controlled by the receiver monitoring the
sender behavior by assigning a backoff value to
sender
20
Current Models
• Routing
• Main methods are:
– AODV (Ad hoc On-demand Distance Vector)
– DSDV (Destination Sequenced Distance
Vector)
– AODV is a reactive protocol
– DSDV is a proactive protocol
– DSDV maintains a dynamic routing table at all
times
21
Current Models
• Yang et al, ACM conf., 2002, have developed a
unified method called Self Organized Security
(SOS) scheme using AODV method
• SOS does not assume any prior trust
arrangement among nodes
• Each node in the network needs a token to
participate
• Tokens have expiration time stamp
• Well-behaving nodes gain longer time duration
before renewal
22
Taxonomy
Author
Main Focus
Research
method
Contribution
Software
Results
Yi
Secure
routing
simulation
Secure Aware
routing metric,
Secure routing
protocol
Avoine
Fair key
exchange
analytical
Probabilistic
fair exchange
protocol
without third
parties
Cryptographic
key exchange
without trusted
third parties
Buttyan
Node
cooperation in
packet
forwarding
simulation
Packet
C++
forwarding
Tamper
resistant
security
module, robust
packet
forwarding
Michiardi
Selfishness in
MANET
nodes
simulation
Detect selfish
behavior through
ns2
Lack of
packet
forwarding
Routing and
packet
forwarding
simulation
ns2
Prevents
DOS attacks
in network
layer
Yang
ns2
collaboration
Proactively
isolate
malicious
nodes
Secure
AODV,
secure route
discovery
23
Our Research
• We are pursuing four different research
threads
• Development of Threshold Index (TI) using
fuzzy logic
• X = { xi } is a sample space of significant
parameters (e.g., packets lost, number of
collisions)
• A = { (xi, µj(xi)), xi ε X } where µj is the
grade of membership of xi
24
Our Research
m
Σ wj yj
j=1
TI = --------------------------m
Σ wj
j=1
where yj denotes the output value (weight)
associated with the particular rule in the fuzzy
set. Weight wj is min(µj(NC), µj(PL))
25
Our Research
• Rule strength wj = min(µj (xi)) where
i ε {1, 2, …, n} and n is the number of input
metrics for each rule
• Given k membership values, m = kn
• A sample fuzzy relation is shown next
• In the example, we use the weights to be
1, 5 or 9 based on the firing rule
corresponding to small, medium or large
26
Fuzzy Relation
1
Small
Medium
Large
µ(x)
-20
0
20
40
60
Number of packets lost
27
Example
Rule#(j)
µj(NC)
µj(PL)
Wt. (yj)
1
2
3
4
5
6
7
8
9
0
0
0
0
0
0
1
1
1
0
0
0.5
0
0
0.5
0
0
0.5
1
1
5
1
5
9
5
9
9
RuleStrength
(wj)
0
0
0
0
0
0
0
0
0.5
wjyj
0
0
0
0
0
0
0
0
4.5
28
Our Research
• TI is used to classify the threat faced by
mobile nodes.
• Classifications used are normal, uncertain
and vulnerable
• Extensive simulation using ns2 software
has been done
• Currently we are in the process of testing
the scenarios using specialized hardware
29
Our Research
• A second thread of research involving
MANETs deals with multi-hop networks as
opposed to single-hop networks
• Multi-hop networks involve not only
laptops but also PDAs and cell phones
• Trust aspects play a key role identifying
nodes for inclusion in the network
30
Our Research
• One work is based on a general security control
for a multi-hop network
• This is aimed at preventing attacks on paging
and registration, also forging Foreign Agent (FA)
• Uses mobile IP security (provides continuous
connectivity for mobile hosts)
• One protection method is to require all MNs to
register
• Authenticate MN, FA, HA as a unit
• Allow only authenticated nodes to be in the
multi-hop route
31
Our Research
• Another work is based on secured macro/micromobility protocol for multi-hop cellular IP
• Macro-mobility refers to support between local
domains for mobility of MNs
• Micro-mobility refers to support within a local
domain for mobility of MNs
• Multi-hop paging cache is used to maintain
location of MNs
• Multi-hop routing cache is used to maintain
multi-hop routes
32
Multi-hop Heterogeneous Network
Home/Foreign Agent (HA/FA)
AP
BS2
Internet
BS1
AP
CN
1
2
3
Multi Hop
AP: Access Point
BS: Base Station
Co-located BS and AP Area
CN: Correspondent Node
MN: Mobile Node
33
Simulation Result
P denotes a prime number indicating the number of bits used for
encryption in the elliptic curve cryptosystem
Macro-mobility delay (second)
Macro-mobility delay
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
Micro-mobility without security
Secured Macro-mobility with P = 163
Secured Macro-mobility with P = 175
1
2
3
Number of hops from MS to BS
4
34
Our Research
• A third line of research involves mobility
management
• Mobility management involves knowing
what nodes are allowable in a network at a
given time
• A fourth thread of research involves
traceback of nodes. This will help in
identifying malicious nodes.
35
Open Research areas in MANET
• MOCA method could be extended to browsing
neighboring nodes’ routing tables. Goal is to
find multiple routes. This will help in avoiding
flooding attacks.
• CORE method does not address attacks from
active intruders. Nuglet counter could be better
utilized for mutual provision of information
services
• Guardian Angel method could be extended to
include DoS or routing attacks
36
Open Research areas in Multi-hop
Networks
• Studies are available based on routing or
selfish-node behavior that involve AODV
(Ad hoc On demand Distance Vector) or
DSDV (Destination Sequenced Distance
Vector). A hybrid approach is a viable
alternative for performance considerations.
• In Multi-hop cellular networks, we could
find ways to improve the MAC protocols
for faster throughput
37
References
• Michiardi, P., and Molva, R., “CORE: A COllaborative
REputation mechanism to enforce node cooperation in
Mobile Ad Hoc Networks,” Communication and
Multimedia Security Conference, 2002.
• Buttyán, L., and Hubaux, J., “Stimulating Cooperation in
Self-Organizing Mobile Ad Hoc Networks,” Mobile
Networks (MONET), 2003.
• Avoine, G. and Vaudenay, S., “Cryptography with
Guardian Angels: Bringing Civilization to Pirates” Report
on a Working Session on Security in Wireless Ad
Hoc Networks, Levente Buttyan and Jean-Pierre Hubaux
(eds.), ACM Mobile Computing and Communications
Review (MC2R), Vol. 6., No. 4., 2002.
• Michiardi, P., Molva, R. “Prevention of Denial of Service
Attacks and selfishness in Mobile Ad Hoc Networks,”
Research Report RR-02-063 - January 2002.
38
References
• Ermanno Pietrosemoli, Mesh Networks
http://wireless.ictp.trieste.it/school_2004/lectures/ermann
o/mesh.pdf
• Yi, S., Naldurg, P., Kravets, R., “A Security-Aware Ad
Hoc Routing Protocol for Wireless Networks,” 6th World
Multi-Conference on Systemics, Cybernetics and
Informatics (SCI 2002), 2002.
• S. Alampalayam, A. Kumar, S. Srinivasan, “Mobile Ad
hoc Network Security: A Taxonomy,” 7th IEEE Int’l Conf.
on Computer Communications Security, Phoenix Park,
South Korea, Feb. 23-25, 2005.
• Yang, H., Meng, X., and Lu, S., “Self-Organized Network
Layer Security in Mobile Ad Hoc Networks,” ACM
MOBICOM Wireless Security Workshop (WiSe'02),
Atlanta, 2002.
39
References
• Y.D. Lin and Y.C. Hsu, “Multihop Cellular: A new architecture for
wireless communications,” IEEE InfoCom 2000, 1273-1282.
• R. Ananthapadmanabha, B. S. Manoj, and C. Siva Ram Murthy,
“Multi-hop Cellular Networks: The architecture and routing
protocols,” 12th Int’l Conf. on PIMRC, vol.2, Sept. 2001, G-78-G82.
• B. Xie, A. Kumar, S. Srinivasan, “GSCP: A General Security Control
Protocol for Heterogeneous Multi-hop Network”
• B. Xie, A. Kumar, S. Srinivasan, “Secured Macro/Micro-Mobility
Protocol for Multi-hop Cellular IP”
• C. J. Fullmer and J. J. Garcia-Luna-Aceves, “Floor Acquisition
Multiple Access (FAMA) for Packet Radio Networks,” ACM
SIGCOMM 1995.
40