1 / 21

SEAMAN: A Security-Enabled Anonymous MANET Protocol

SEAMAN: A Security-Enabled Anonymous MANET Protocol. Harald H.-J. Bongartz, Tobias Ginzler, Thomas Bachran {bongartz,ginzler,bachran}@fgan.de Pere Tuset tuspeipe@eupmt.upc.edu. Problem Statement (1/2) - Scenarios. Communication within group of vehicles. Tactical military operations

vlad
Télécharger la présentation

SEAMAN: A Security-Enabled Anonymous MANET Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEAMAN: A Security-EnabledAnonymous MANET Protocol Harald H.-J. Bongartz, Tobias Ginzler, Thomas Bachran {bongartz,ginzler,bachran}@fgan.de Pere Tuset tuspeipe@eupmt.upc.edu

  2. Problem Statement (1/2) - Scenarios Communicationwithin group ofvehicles • Tactical military operations • Police and emergency response operations • Multi-robot systems in military and civilian emergency scenarios Communicationof foot soldiers Data exchange in multi-robot system or sensor network Command postnetwork Source: DRDC Valcartier, Canada

  3. Problem Statement (2/2) • Requirements • Data transmission over wireless medium (radio) • No infrastructure available • Fast deployment • Self-configuring • ”Self-healing” • Assumptions • Mobile Ad hoc Network • Platoon size (approx. 50 participants) • Continuous operation during deployment (sufficient power supply)

  4. Security Requirements Our concern: External (non-authenticated) eavesdroppers/attackers! • High confidentiality • Secrecy of message contents • Anonymity of node identities • Message and Network integrity • of payload data • of network management data • Resilience against various attacks • General reconnaissance • Identification of conspicuous nodes • Replay attacks

  5. SEAMAN Concept Security Enabled Anonymous MANET Protocol = Full External Anonymity + Link Layer Encryption and Integrity + Efficient Multicast MANET Routing + Distributed Key Management

  6. Network Topology Operations • Node Join • Node Leave • Forced Node Eject Group Merge Group Split

  7. Group Merge / Node Join

  8. Authentication Sequence • Anonymous Authentication using • Perfect Pseudonyms and • Group-identifiable Pseudonyms • Result: • Temporary Bridge Key • Used until common MANET key established

  9. Group-identifiable Pseudonyms • Node identity hidden • Public keys signed by Certification Authority (CA) • Pseudonym revocation by publication of Sym(A)

  10. Generation of GiPs

  11. Key Management Consolidation

  12. Key Management Consolidation

  13. Key Management Consolidation

  14. Key Management Consolidation

  15. Key Management Consolidation

  16. Key Update Sequence

  17. Key Update Sequence

  18. Key Update Sequence

  19. Key Update Sequence

  20. Other Network Topology Operations • Group Split / Node Leave • Through automatic Key Update • Forced Node Eject • Goal: exclude compromised nodes • Revoke GiP Symmetric Key • Update MANET Key

  21. Conclusion and Future Work • Conclusion • SEAMAN Framework for mobile ad hoc network security • Against external attackers in mission-critical MANETs • Secrecy, Integrity, Anonymity • Future Work • Implementation • WNet for MANET Routing • MIKE for Key Management • MASK for Anonymous Authentication • Tests in simulation and testbed • Integration of Intrusion Detection System

More Related