Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Routing Security in Ad Hoc Networks Justin Lomheim Shirshanka Das Outline Ad Hoc Networks DSR Review AODV Review Specific Attacks on DSR and AODV ARAN Protocol (e.g. secure AODV) Questions References Ad Hoc Networks infrastructureless dynamic topologies (in mobile ad hoc nets) variable capacity, limited bandwidth links energy constrained operation unicast, multicast, broadcast traffic physical security considerations currently AODV & DSR routing under consideration for IETF MANET specification Ad Hoc On Demand Distance Vector (AODV) Review distance vector algorithm using sequence numbers for updates (based on DSDV) generates routes on-demand, reducing total number of broadcasts required classified as a pure on-demand scheme, since nodes not involved in routing do not maintain routing info or participate in table exchanges Dynamic Source Routing (DSR) Review on-demand protocol based upon source routing designed for scenarios where only a few source nodes flow to a few destination nodes source and destination nodes gather routing info into caches, through exchange of flooded query and reply packets with full routing information once discovered, routes are as needed until they fail due to lost message transmissions AODV and DSR Route Discovery RREQ RREQ No Route To D !! RREQ RREP RREP RREP S RREP RREQ RREP RREQ I Cache Hit !! D AODV Link Failure Mgmt infinite metric assigned to broken links if a node along a route moves, its upstream neighbor detects it and forwards a notification message (RREQ w/ infinite metric) link breakage triggers notification back to users of formerly active links until source is reached, which may then re-initiate route discovery. AODV versus DSR Both use a similar mechanism of RREP , RREQ and route caching AODV : maintains DV type next hop forwarding tables DSR : relies on source routing Specific Attacks on AODV & DSR modification impersonation fabrication sequence numbers hop counts source routes tunneling error messages source routes (cache poisoning) DoS trivial DoS* Modification of Sequence Numbers In AODV a malicious node may divert traffic through itself by advertising a route (via a RREP) with a much higher sequence number than actual RREP Modification of Hop Counts In AODV since routing decisions can involve hop count metric, a malicious node can request the hop count to zero so make itself more likely to be chosen along the path to the destination A selfish node could use a high hop count to ensure no one routes through it in case it wants to save power Modification of Source Routes In DSR as packets are delivered, a malicious node can simply remove necessary source route entries in the packet header malicious node can drop any error messages coming back along the path Tunneling Falsely tunneled path M2 M1 Encap S Decap D Impersonation to create loops A D M B C E X Impersonation to create loops A D M B C E X Impersonation to create loops A D M B C E X Impersonation to create loops A D B C E M X Fabrication Attacks False route error messages in AODV and DSR Route Cache poisoning Challenges No centrally administered secure routers No strict security policies Highly dynamic nature of mobile ad hoc networks Current ad hoc routing protocols trust all participating nodes Problem Secure ad hoc routing protocols are difficult to design: - Existing protocols are optimized to spread routing information quickly as the network changes - Security mechanisms consume resources and can delay or even prevent successful exchanges of routing information Specific attacks Location disclosure: reveals information regarding the location of nodes, or the structure of the network Black hole: an attacker advertises a zero metric for all destinations causing all nodes around it to route packets towards it Replay attack: an attacker sends old advertisements to a node causing it to update its routing table with stale routes Wormhole: an attacker records packets at one location in the network, and tunnels them to another location, routing can be disrupted when only routing control messages are tunneled Requirements for a secure ad hoc routing protocol Prevents the exploits discussed Route signaling cannot be spoofed Fabricated routing messages cannot be injected Routing messages cannot be altered in transit except in accordance with the functionality of the routing protocol Routing loops cannot be formed through malicious action Routes cannot be redirected from the shortest path Unauthorized nodes should be excluded from route computation and discovery Network topology should not be exposed neither to adversaries not to authorized nodes Authenticated Routing for Ad Hoc Networks (ARAN) Protocol Effectively basic AODV, except route discovery/setup/maintenance are authenticated Utilizes public-key cryptography to verify hop-by-hop all route request “RDP” & route reply “REP” packets Eliminates most routing security problems except for tunneling & trivial DoS attacks ARAN – Initial Setup Public Key A IP Address A Create Time Expiry Time Signature by T Certificate A Certificate B Certificate C A B C Certificate D Trusted certificate server T D ARAN – Route Discovery IP Address D Certificate A Initial RDP packet Nonce A Create Time Signature by A RDP: A -> D A B C D ARAN – Route Discovery Intermediate RDP Packet RDP: A -> D Signature by B Certificate B RDP: A -> D verified A B C D ARAN – Route Discovery RDP: A -> D Signature by C Certificate C verified A RDP: A -> D verified B C D ARAN – Route Setup Initial REP packet IP Address A Certificate D Nonce A Create Time Signature by D REP: A->D verified A verified verified B C D *Replies to first RDP packet* ARAN – Route Setup Intermediate REP Packet REP: A -> D Signature by C CertificateC REP: A->D verified A verified verified verified B C D ARAN – Route Setup REP: A -> D Signature by B CertificateB REP: A->D verified verified A verified verified verified B C D ARAN – Route Complete A verified verified verified verified B verified verified C D ARAN – Route Maintenance IP Address A IP Address D Certificate C Nonce C Create Time Signature by C ERR: A->D A B C D Link broken! Questions Conflict between small weight nodes, cryptography – is there any reason to implement ARAN? Any way to avoid centralized trust certificate server T? Key revocation issues… Sensor network security?