1 / 19

Security Issues in Mobile (Wireless) Ad Hoc Networking

Security Issues in Mobile (Wireless) Ad Hoc Networking. By Christopher Levari Student ID: 41264681. Agenda. What is Ad Hoc and Why Do We Need It? Ad Hoc Routing The Security Problems Bluetooth Bluetooth Security and It’s Issues Proposed Solutions Conclusion.

lara
Télécharger la présentation

Security Issues in Mobile (Wireless) Ad Hoc Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Issues in Mobile (Wireless) Ad Hoc Networking By Christopher Levari Student ID: 41264681

  2. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  3. What is Ad Hoc and Why Do We Need It? • Ad hoc devices can join/leave a network “on the fly”. • This allows devices to be truly mobile. • There are two main technologies: • 802.11x (WiFi) - used for normal networking applications. • Bluetooth - designed for short range, low power devices. Technology and society are headed towards small low power, portable devices for this reason Bluetooth is ideal for ad hoc, and the focus of this paper.

  4. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  5. Ad Hoc Routing • Three Main Types: • Proactive - Table based routing • Reactive – On demand routing • Flow Control – Traffic based routing Reactive is best!

  6. Reactive? How does it work? • Three phases to routing a packet: • Route Discovery • Route Reply • Route Error Examples: Ad Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Lightweight Mobile Routing (LMR)

  7. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  8. Ad Hoc Security Issues • Key Management – Who is responsible for key management? • Trust Management- How do we know that a device is allowed to join a network? • Secure Routing- Is the device allowed to relay confidential information?

  9. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  10. Bluetooth • Bluetooth allows up to 7 devices to connect together at one time. One device is called the primary master and the others are called slaves. Figure 1 obtained at: http://www.easycom.com.ua/data/netlan/712162057/img/piconets1.jpg

  11. Bluetooth Packet • The Bluetooth Packet

  12. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  13. Bluetooth Security • Bluetooth handles security with the use of keys, four “link keys” and one data encryption key. • Unit key - is created once. This key is often used when device has little memory. • Combination key- Each device combines the Unit keys of A and B with the two random numbers to create the key. This key is only used for communication between A and B. • Master key - is used when the master device wants to transmit to several devices at once. • Initialization key- is used in the initialization process. • Encryption key- Encryption key is derived from the current link key. Each time encryption is needed the encryption key will be automatically changed.

  14. Bluetooth Security Issues? • OK, so this all sounds fine, right? Wrong! • Small devices have limited storage, how do we handle all those keys? • The Unit key is created once, each time it is used there is a chance for a hacker to steal it. • Bluetooth says a device is “trusted” once authentication has happened. This only authenticates the device, what about the user? • No multi-level trust (i.e. Top Secret, Secret, etc.) • No secure routing built-in

  15. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  16. Proposed Solution • Simple and Effective! • Extend the header

  17. More Proposed Solution • Security Capabilities • 4 Bits = 4 Capabilities • 1 – 128 bits keys • 2- 256 bit keys • 3 – Auto –Generated PIN • 4 – Sequence Numbers

  18. Agenda • What is Ad Hoc and Why Do We Need It? • Ad Hoc Routing • The Security Problems • Bluetooth • Bluetooth Security and It’s Issues • Proposed Solutions • Conclusion

  19. References • Aggelou, George. Mobile Ad Hoc Networks: From Wireless LANs to 4G Networks. McGraw Hill: New York, 2005. • Biagioni, E. & Chen, S. A Reliability Layer For Ad Hoc Wireless Sensor Network Routing. University of Hawaii: Hawaii, 2004. • Davis, Carlton R. A Localized Trust Management Scheme for Ad hoc Networks. McGill University: Montreal, 2009. • IIyas, Mohammad. The Handbook of Ad Hoc Wireless Networks. CRC Press: New York, 2003. • Mishra, Amitabh. Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press: Cambridge, 2008. • Muller, Thomas. Bluetooth Security Architecture. Nokia: USA, 1999. • Papadimitratos, P. & Haas, Z. Secure Routing for Mobile Ad Hoc Networks. Cornell University: Ithaca, 2002. • Roche, E. & Dunne, K. & O'Loghlin, D. Bluetooth For Ad Hoc Networking. http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group3/index.html Retrieved on 23 March 2009. • Scarfone, K. & Padgette, J. NIST: Guide to Bluetooth Security. NIST Special Publication: Gaithersburg, 2008. • Standards Committee. IEEE Standard 802.15.1: Revision 2005. IEEE: New York, 14 June 2005. (pp. 437-459) • Toh, C. K. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall: New Jersey, 2002. • Traskback, Marjaana. Security of Bluetooth: An Overview of Bluetooth Security. Helsinki: 2009 • Varadharajan, V. & Shankaran, R. & Hitchens, M. Securing the Ad Hoc On-demand Distance Vector Protocol. Macquarie University: Australia, 2009.

More Related