* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Security Issues in Mobile Ad
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Zero-configuration networking wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer security wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
Airborne Networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
SECURITY ISSUES IN MOBILE AD-HOC NETWORK Mukul A. Khairatkar AGENDA  Introduction to MANET  Various Security Model  Operations  Introduction to IPSec  IPSec Operation  Simulation Details  Conclusion MOBILE AD-HOC NETWORK No Infrastructure No Server  Nothing  Everybody acts like a Router  Security Problem  Network Resources  Source Spoofing  Eavesdropping  Data Transformation  SECURITY Key Pre-Distribution Scheme  Web of Trust  Public Key Certification  IPSec  SOME SECURITY TERMS  Public Key  Private Key  Digital Signature  Certificate   Digital Signature Certificate Of Authority  Certificates  Public Key Infrastructure  X.509 KEY PRE-DISTRIBUTION SCHEME Node 2 Key Node 1 Key Node 3 Key Node 4 WEB OF TRUST PGP Public Key Node 1 Public Key Node 3 PGP Node 2 PGP PUBLIC KEY INFRASTRUCTURE  X.509  Certificate Authority CA  CA  CA Root Certificate  Root certificate  Distributed with Web Browser ..etc  SSL/TLS web pages IPSEC  Why IPSec?  Open Standard Freely Available  Modular  Integrates in Existing IP structure  Transparent to application layer entities  For IPv6 SECURITY ARCHITECTURE MODES  Transport Mode Payload Encrypted  IP header is Intact  Routing is Intact   Tunnel Mode New IP packet  New Routing  NW-NW Communication (tunnel)  IPSEC PACKET NETWORK MODEL IP TUNNEL PERFORMANCE FOR AD-HOC NETWORK IPSEC FOR AD-HOC IP Cloud Subnet 1 Subnet 2 SECURITY PROBLEMS  Latency Increases  Overhead Increases  Throughput Decreases  Complexity Increases CONCLUSION  Ad-hoc Network uses various security methods  Do not violate existing protocol  IPSec is a new approach to secure IPv4 and IPv6 packets  Better approach can be used than IPSec REFERENCES  [1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE 2004.  [2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic Institute and State University, IEEE 2006.  [3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMAN Laboratoirc CNRS-PRiSM. University of Versailles.  [4]Securing Ad-Hoc Networks by IPSEC, Abhrajit Ghosh, Telcordia Technologies Applied Research Piscataway, NJ, IEEE paper 2004.  [5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999.  [6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC 2510, Mar 1999  [7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003.  [8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.