1 / 18 fariba alamshahi secure routing and intrusion detection in ad hoc networks supervisor:...

19
1/18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

Upload: thomas-edwards

Post on 28-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

1/18Fariba alamshahi

Secure Routing and Intrusion Detection in Ad Hoc Networks

Supervisor: Mr.zaker

Translator: fariba alamshahi

Page 2: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

2/18Fariba alamshahi

OutlineIntroduction

Ad hoc networks

Secure Routing Protocols

Attacks

SecAodv

Intrusion Detection

Conclusion

Page 3: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

3/18Fariba alamshahi

IntroductionRecent years have witnessed a proliferation of

mobile devices.

Corporations and government agencies alike are increasingly using embedded and wireless technologies, and working towards mobilizing their workforce

Ad hoc networks, as the name suggests, have no supporting infrastructure

Page 4: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

4/18Fariba alamshahi

Ad hoc networksAd hoc networks are comprised of a dynamic set of

cooperating peers, which share their wireless capabilities

with other similar devices to enable communication with

devices not in direct radio-range of each other, effectively

relaying messages on behalf of others

Definitions

Page 5: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

5/18Fariba alamshahi

Secure Routing Protocols

a majority of the proposed routing protocols assume non-hostile environments

Definitions

Page 6: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

6/18Fariba alamshahi

SecAodv

SecAodv is a highly adaptive distributed algorithm

designed for MANETs that does not require:

prior trust relations between pairs of nodes

time synchronization between nodesprior

shared keys or any other form of secure

association

Definitions

Page 7: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

7/18Fariba alamshahi

The SecAodv implements two concepts which are:

Secure binding between IPv6 addresses and

the RSA key generated by the nodes

themselves

Signed evidence produced by the originator

of the message and signature verification by

the destination

Definitions

Page 8: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

8/18Fariba alamshahi

Working of SecAODV

S

D

S

Definitions

Page 9: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

9/18Fariba alamshahi

Although encryption and signed headers are intrusion prevention measures, vulnerabilities remain nonetheless.

An IDS further strengthens the defense of a MANET

Problem Statements

Troubleshooting

Page 10: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

10/18Fariba alamshahi

Security objectives in Ad Hoc Networks

Availability

Confidentiality

Integrity

Authentication

non-repudiation

Definitions

Page 11: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

11/18Fariba alamshahi

Classification of attacks

Types of attacksExternal attacks

Internal attacks

Types of attacksActive attacks

Passive attacks

Types of attacksRouting change

Attack sources

Problem Statements

Page 12: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

12/18Fariba alamshahi

Attack using the Modification

Hostile node can falsify header content

packages related to the routing of network

traffic to each other that wants to divert

Change the number of hop

Change the value of the hop counter

Problem Statements

Page 13: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

13/18Fariba alamshahi

Intrusion DetectionIn an ad hoc network, malicious nodes may enter

and leave the immediate radio transmission range

at random intervals

A MANET is most likely not under a single

administrative domain, making it difficult to

perform any kind of centralized management or

control

Definitions

Page 14: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

14/18Fariba alamshahi

IDS (Intrusion Detection System)

categorize host-based IDSs based on anomaly

detection and misuse detection

Each node monitors particular traffic activity

within its radio-range

Definitions

Page 15: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

15/18Fariba alamshahi

IDS

An audit log of all locally detected intrusions

is maintained as evidence of misbehavior

A node can thus monitor most of the packet

traffic of its neighbors in promiscuous mode,

while they are in radio-range

Definitions

Page 16: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

16/18Fariba alamshahi

Scalability issuesIt may be possible in certain situations to

have a list of suspects that can be watched

instead of all the nodes in the neighborhood.

Another possibility is to monitor a random

choice of neighbor nodes

Page 17: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

17/18Fariba alamshahi

Conclusion

In this paper we briefly described the inherent

vulnerabilities of mobile devices in MANETs and

several attacks possible on such devices

The IDS is routing protocol independent, though

in this case we have used SecAODV for routing

Page 18: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

18/18Fariba alamshahi

Refrence1) T. Aura. Internet Draft: Cryptographically Generated Addresses (CGA).

http://www.ietf.org/proceedings/04mar/I-D/draftietf send-cga-05.txt, February 2004

2) R. Hinden and S. Deering. RFC 3513: Internet Protocol Version6 (IPv6) Addressing Architecture, April 2003.

3) Y.-C. Hu, A. Perrig, and D. B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2003 ACM workshop on Wireless security, pages 30–40. ACM Press, 2003.

4) R. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks, May 2002.

5) B. Lu and U. Pooch. Cooperative security-enforcement routing in mobile ad hoc networks. In Mobile and Wireless Communications Network, 2002. 4th International Workshop on, Vol., Iss., pages 157–161, 2002.

6) P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference, pages 27–31, January 2002

Page 19: 1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi

19/18Fariba alamshahi

Thank you for your attention

؟