1 / 37

A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007. A Security protocol for Mobile Ad-hoc networks. Outline Background Problem Statement Objective Methods Used Research Methodology

ibtesam
Télécharger la présentation

A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

  2. A Security protocol for Mobile Ad-hoc networks Outline • Background • Problem Statement • Objective • Methods Used • Research Methodology • Root causes of key Attacks against ad hoc network • Defining Security Requirements • Secure AODV (SAODV) Design • Secure AODV (SAODV) Operation • Performance Analysis of Secure AODV • Effect of Malicious Node Behavior

  3. A Security protocol for Mobile Ad-hoc networks Background Features of Ad hoc networks: • no fixed network infrastructure • deployed as multi hop packet networks rapidly • with relatively low expense Such networks can be very useful in scenarios where natural conditions or time constraints make it impossible to pre-deploy infrastructure. Meanwhile, secure routing has become an excellent topic of open research because of the extraordinary gap between the nature of ad hoc network and the security required by its applications.

  4. A Security protocol for Mobile Ad-hoc networks Problem Statement • Most current ad hoc network research has focused on providing routing services without considering security. Many ad hoc routing protocols have been proposed, such as DSR,AODV,TORA, DSDV and WRP, but none of the proposals have defined security requirements. Therefore, normal ad hoc networks are easily attacked by malicious actions. We classify following three malicious behaviors against ad hoc routing protocols: • Modification Attacks • Malicious modification of fields in protocol control messages can cause traffic redirection, and denial of service. • Impersonation Attacks • Masquerading as another node (identity spoofing) • Fabrication Attacks • Generation of false routing messages

  5. A Security Protocol for Mobile Ad-hoc Networks Objective • Identify the main issues for the attack action in ad hoc protocols, especially for AODV. • Gain fundamental understanding of the effects on malicious actions. • Find a robust solution to prevent attack actions in ad hoc network.

  6. A Security Protocol for Mobile Ad-hoc Networks Approaches Used • Study the basic principal of ad hoc network • Review of the existing routing protocols. • Understand effects of key attacks against ad hoc network (External Attacks, Internal Attacks). • Design security metrics/Design a set of related security components. • Extend the existing protocol using those components. • Security and network performance analysis. • Research Methodology • Thecase study approachwas used as a research methodology to accomplish our thesis. • Firstly, most of the relevant researches have been extensively studied. • Secondly, we assume 4 cases in our simulations, and use OPNET Modeler 12.0 simulator to compare and evaluate the performance efficiency for AODV with and without security conditions based on following metrics. • Fiveperformancemetrics are computed for each simulation: • 1) Packet Delivery Fraction, 2) Packet/Byte Overhead, 3) Average Route Latency, 4) Average Path Length, and 5) Average End-to-End Delay of Data Packets:

  7. Overview AODV • Definition • Ad hoc On-Demand Distance Vector (AODV) routing protocol is a reactive routing protocol for MANET that maintains routes only between nodes that need to communicate. • Features of AODV • Routing messages have small packets size. • Build routes with the shortest path. • Use source/destination sequence number (SN) to specify how fresh a route is • AODV Operation • Route Discovery • Route Setup • Route maintenance AODV Route Establishment Process

  8. Main Issues of Key Attacks against Ad Hoc Network (1) 1. Attacks using Modification: • Malicious modification of protocol messages • Examples : • Redirection with modified sequence numbers • Redirection with modified hop counts • Tunneling attacks (Wormhole attack ) • Main issues of AODV for the modification attack action : • In AODV protocol the main design issue is to achieve efficiency in ad hoc network environment, but no way to verify the routing metrics included in protocol packets, no message integrity. Therefore, an attacker can easily modify them and cause different security problems in routing.

  9. Main Issues of key Attacks against ad hoc network (2) 2. Attacks using Impersonation : • Masquerading as another node or Misrepresentation of identity by altering MAC or IP address in outgoing packets • Examples : • Forming routing loops by spoofing (a) (b) (c) • Main issues of AODV for the impersonation attack action : • In AODV protocol, there is no message authentication. Therefore, an attacker can • easily capture normal nodes, and then cause degradation in network • communications, unreachable nodes, and possible routing loops .

  10. Main Issues of key Attacks against ad hoc network (3) 3. Attacks using Fabrication : • Generation of false routing messages • Examples : • Falsifying route error messages • Main issues of AODV for the fabrication attack action : • In AODV protocol, there is no verification of message contents, and no non-repudiation. Therefore, the malicious node may insulate any node quite easily.

  11. Defining Security Requirements • Common Security Requirements: • No spoofing • No fabricated messages • No malicious alteration of routing messages • No routing loops • No route redirection • unauthorized nodes should be excluded from routing • Secure Ad Hoc Routing – Properties and Techniques used to guarantee these properties:

  12. Secure AODV (SAODV) Design (1) • Our Secure AODV Protocol Metrics: • Timeliness: Routing updates need to be sent in a timely fashion. Timestamps and timeout mechanisms can guarantee the freshness of the routes they provide. • Authentication: ensures the identity of the party with which communications are exchanged, before granting it access to the network. • Non-repudiation: the originator of a message cannot deny having sent the message. If non-repudiation is guaranteed, the receiver of a wrong message can prove that the originator sent it, and that therefore the originator misbehaved. • Preliminary • There is a key management subsystem to make it possible for each node to obtain public keys from the other nodes, called the trust third part. • SAODV is an extension of the AODV routing protocol

  13. Secure AODV (SAODV) Design (2) • AODV Vs SAODV for Message Format (AODV) (SAODV)

  14. Secure AODV (SAODV) Operation (1) • Timestamp • The timestamp is used to clear possible wraparound of the Message Sequence Number. • SAODV Digital Signatures • Certification Setup • Before entering the network, each node obtains a public key certificate from a trusted certificate server (the trust third part, T) C[S]= [ IPS ||PKS|| T || te ]PVT • Route Discovery • End-to-end authentication between source and destination • Hop-to-hop authentication between intermediate nodes • Source only trusts destination to choose return path an example of secure ad hoc network

  15. Secure AODV (SAODV) Operation (2) • SAODV Digital Signatures (Continue) 2. Route Discovery(continue) • Source broadcasts signed RDM (Route Discovery Message) along with its own certificate. • RDM contains the source IP address, along with a source-specific nonce (to detect duplicates) S broadcasts RDM:=[RDM || IPD|| C[S] || NS|| t]PVS • First hop adds its own signature and certificate A rebroadcasts RDM:=[[RDM || IPD|| C[S] || NS|| t]PVS]PVA || C[A] • Each hop verifies signature of previous hop and replaces it with its own – also adds a reverse route to source B rebroadcasts RDM:=[[RDM || IPD|| C[S] || NS|| t]PVS]PVB || C[B] • Destination also verifies the source signature

  16. Secure AODV (SAODV) Operation (3) • SAODV Digital Signatures (Continue) 3. Route Reply (Route Setup) • Destination sends back a signed reply (RRM) to the first RDM received D to C RRM: = [RRM || IPS || C[D] || NS || t] PVD • Again, RRM is signed by intermediate nodes, just like RDM – forward path setup C to BRRM: = [[RRM || IPS || C[D] || NS || t] PVD] PVC|| C[C] B to ARRM: = [[RRM || IPS || C[D] || NS || t] PVD] PVB|| C[B] • Route discovered may not be the shortest, but is the “quickest” - likely to be the least loaded / congested at the time

  17. Secure AODV (SAODV) Operation (4) • SAODV Digital Signatures (Continue) 4. Route Maintenance • Nodes send signed error messages (RERR) to indicate link breaks, and packets arriving on deactivated paths • ERR message contains IP address of originating node, along with its signature – enables non-repudiation AbroadcastsB REER: =[RERR || IPS || IPD || C[A]|| NA || t]PVA • Nonce included preventing replay attacks • Summary for AODV Vs SAODV

  18. Summary for AODV Vs SAODV • AODV Vs SAODV for Diagram (AODV) (SAODV)

  19. Performance Analysis of Secure AODV (SAODV) (1) • Network Performance Parameters • Performance of SAODV compared with AODV • Simulations using OPNET Modeler 12.0 (Educational Version) simulator • MAC layer is the IEEE 802.11 MAC protocol with Distributed Coordination Function (DCF) • Traffic sources are CBR (constant bit-rate) • Route packet processing delay: 2ms • Obtained through field testing of AODV • Digital signature generation delay: 8.5ms • Verification delay: 0.5ms • Measured running times of RSA digital signature and verification algorithms • Performance metrics • Packet Delivery Fraction • the Average Routing Traffic Received • the Average Route Discovery Time • Packet/Byte Overhead • Average Route Latency • Average Path Length • Average End-to-End Delay of Data Packets

  20. Performance Analysis of Secure AODV (SAODV) (2) Four Cases are simulated: • Case 1: Distribution of nodes within IEEE 802.11 b physical layer: • Scenario 1: Node Equalized Distribution • Scenario 2:Node Un-equalized Distribution • Case 2: Effect of node mobility within IEEE 802.11 b physical layer • Scenario 3:Uniform Mobility • Scenario 4:Random Mobility • Case 3: Effect of node moving speed within IEEE 802.11 b physical layer • Scenario 5:Based on Scenario 4 condition, with 3 different uniform node velocities: 1m/s, 10m/s, and 20m/s to simulate Case 1 Case 2 Case 3

  21. Performance Analysis of Secure AODV (SAODV) (2) The topology of Case 1

  22. Simulation Results the Average Routing Traffic Received (bits/sec)

  23. Simulation Results the Average Route Discovery Time

  24. Simulation Results the Average Packet/Byte Overhead

  25. Simulation Results the Average Route Latency

  26. Simulation Results the Average Path Length

  27. Simulation Results the Average End-to-End Delay of Data Packets

  28. Case 4 Performance Analysis (1) • Key Results • Case 4: Effect of different standard of physical layer: • Scenario 6:repeatthe process of Scenario 1 ~ Scenario 5 with different standard of physical layer and compare what the different results with IEEE 802.11.b, IEEE 802.11.g and IEEE 802.11.a. An example of the Average Routing Traffic Received (bits/sec) of Case 4 based on case 2 condition • The efficiency of both AODV and SAODV with five metrics in IEEE 802.11a is • much lower than that in IEEE 802.11b and g . • The efficiency in 802.11g is the same as that in 802.11b

  29. Case 4 Performance Analysis (2) • Analysis • The relationship with the signal transmitted and received power, frequency, and distance: PR = PT / (2 * π * D * f / c)² C is speed of light D is the transmitted distance F is transmission frequency • If power is the same, transmission frequency is higher, and then transmitted distance should be lower. The frequency in 802.11a is 5GHz, and in 802.11b is 2.4 GHz. This means the transmitted distance in 802.11a is about a half of that in 802.11b, in other word, that decreases the communication range. If using the same topology as 802.11b, most nodes with 802.11a are out of transmission range, and then the network connectivity decreases, thus, the average routing received traffic, routing load and average throughput should be low. • Conclusion • IEEE802.11a is not profitable in ad hoc network/multi-hop networks to use exclusively the high coding schemes (OFDM)

  30. Case 4 Performance Analysis(3) • Case 4 Effect of transmitted distance in ad hoc network

  31. Case 4 Performance Analysis(4) • Case 4 Effect of transmitted distance in ad hoc network(Continue) • Conclusion The transmitted distance can affect route topology, throughput, and efficiency of the network

  32. Effect of Malicious Node Behavior Performance metrics _ simulations with 10 % malicious nodes for each protocol _Average Path Length _Routing Overhead an example of SAODV with 20% malicious nodes (red and yellow circled nodes)

  33. Simulation Results Average Path Length • One of advantages of AODV is to get the shortest path in ad hoc network. But if this network contained malicious nodes, then non-shortest paths would be selected. • The average path length increases 12.5% for AODV in the 10% of malicious node, but there is no change in SAODV • This means malicious node behavior can not affect SAODV

  34. Simulation Results Routing Overhead • Longer routes can cause greater routing overhead and longer data packet delay. • Routing overhead with 10% of malicious nodes AODV is larger than normal AODV, and SAODV.

  35. Conclusion and Future Works Conclusion • Our SAODV is based on authentication, message integrity and timeliness for an ad hoc environment as a part of a minimal security policy to detect and protect against malicious actions by third parties and peers in one particular ad hoc environment. • Our evaluations show SAODV has minimal performance costs for the increased security in terms of processing and networking overhead. • Our simulations based on five metrics proofed our SAOD is an efficient protocol. Future Works • Study what effects for AODV and SAODV with standards of physical layer: IEEE 802.11family • Study the key management of ad hoc network

  36. References • [1] C. E. Perkins and E. Royer, “Ad-hoc on-demand distance vector routing,” in Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90–100. • [2] E. Royer and C. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks,”IEEE Personal Communications, April 1999. • [3] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,”Mobile Computing, vol. 353, pp. 153–181, 1996. • [4] Z. J. Haas, “A new routing protocol for the reconfigurable wireless network,” in Proceeding of 1997 IEEE 6th International Conference on Universal Personal Communications Record: Bridging the Way to • the 21st Century (ICUPC’97), October 1997, pp. 562–566. • [5] V. Park and M. Corson, “A highly adaptive distributed routing algorithm for mobile wireless networks,” in Proc. of INFOCOM’97, 1997. • [6] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” in Proceedings of the ACM SIGCOMM’94. ACM Press, 1994, pp. 234–244. • [7] R. Ogier, F. Templin, and M. Lewis, “Topology Dissemination Based on Reverse-path Forwarding (TBRPF),”Request for Comments RFC 3684, February, 2004, February 2004. • [8] L. Zhou and Z. J. Haas, “Securing ad hoc networks,”IEEE Network Magazine, vol. 13, no. 6, November/December 1999. • [9] S. Wu, F. Wang, and B. Vetter, “Secure routing protocols: Theory and practice,” NC State Univ., Tech. Rep., April 1998. • [10] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons, Inc., 1996. • [11] B. Schneier, Secrets and Lies: Digital Security in a Networked World. • 1st Edition. John Wiley & Sons, Inc., 2000. • [12] R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, and K. Thurber, “Techniques for intrusion-resistant ad hoc routing algorithms (TIARA),” in IEEE Military Communications Conference, October 2000. • [13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of MOBICOM 2000, August 2000. • [14] J.-P. Hubaux, L. Buttyan, and S. Capkun, “The quest for security in mobile ad hoc networks,” in MobiHoc ’01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, New York, NY, USA, 2001, pp. 146–155. • [15] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in IEEE International Conference on Network Protocols (ICNP), November 2001. • [16] N. Asokan and P. Ginzboorg, “Key agreement in ad-hoc networks,”Computer Communications, vol. 23, no. 17, November 2000. • [17] K. Fall and K. Varadhan, “ns notes and documentation,”available from http://www.isi.edu/nsnam/ns/, 2003. • [18] “IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,”IEEE Std. 802.11-1997, 1997.

  37. References • [19] B. Tuch, “Development of waveLAN, an ISM band wireless LAN,”AT&T Technical Journal, vol. 72, no. 4, pp. 27–37, July-Aug. 1993. • [20] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. G. Jetcheva, “A performance comparison of multihop wireless ad hoc network routing protocols,” in Proc. IEEE/ACM MOBICOM’98, October 1998, pp. 85– • 97. • [21] Y. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in 4th IEEE Workshop on Mobile Computing Systems and Applications, June 2002. • [22] Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” in 8th ACM International Conference on Mobile Computing and Networking (MobiCom 2002), September 2002. • [23] F. Stajano and R. J. Anderson, “The resurrecting duckling: Security issues for ad hoc wireless networks,” in 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, 1999, pp. 172–194,. • [24] F. Stajano, “The resurrecting duckling - what next?” in Security Protocols - 8th International Workshop, April 2001. • [25] D. Balfanz, D. Smetters, P. Stewart, and H. C. Wong, “Talking to strangers: Authentication in ad-hoc wireless networks,” in Network and Distributed System Security Symposium Conference Proceedings, • February 2002. • [26] M. Steiner, G. Tsudik, and M. Waidner, “Key agreement in dynamic peer groups,”IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769–780, 2000. • [27] S. Yi, P. Naldurg, and R. Kravets, “Security-aware ad hoc routing for wireless networks, Tech. Rep. UIUCDCS-R-2001-2241, August 2001. • [28] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002. • [29] L. Venkatraman and D. P. Agrawal, “Security scheme for routing in adhoc networks,” in Proceedings of the 13th International Conference on Wireless Communications, July 2001, pp. 129–146. • [30] B. Dahill, B. Levine, C. Shields, and E. Royer, “Secure routing protocol for ad hoc networks,” U Mass, Tech. Rep. UM-CS-2001-037, 2001. • [31] B. Smith and J. Garcia-Luna-Aceves, “Securing the border gateway routing protocol,” in Proceedings of Global Internet, November 1996. • [32] B. Smith, S. Murthy, and J. Garcia-Luna-Aceves, “Securing distancevector routing protocols,” in Proceedings of the Symposium on Network and Distributed System Security (SNDSS’97), February 1997, pp. 85–92. • [33] S. Murphy and M. Badger, “Digital signature protection of the OSPF routing protocol,” in Proceedings of the Symposium on Network and Distributed System Security (SNDSS’96), February 1996, pp. 93–102. • [34] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Advances in Cryptology-CRYPTO’87, August 1987. • [35] S. Cheung, “An efficient message authentication scheme for link state routing,” in 13th Annual Computer Security Applications Conference, 1997. • [36] R. Hauser, T. Przygienda, and G. Tsudik, “Reducing the cost of security in link-state routing,” in Symposium on Network and Distributed System Security (SNDSS’97), February 1997, pp. 93–99. • [37] L. Reyzin and N. Reyzin, “Better than BiBa: Short one-time signatures with fast signing and verifying,” in Information Security and Privacy-7th Australasian Conference ACSIP, 2002. • [38] K. Zhang, “Efficient protocols for signing routing messages,” in Proceedings of the 1998 Internet Society (ISOC) Symposium on Network and Distributed System Security, March 1998.

More Related