a lightweight hop-by-hop authentication protocol for ad-hoc networks

25
A Lightweight Hop-by- Hop Authentication Protocol For Ad-Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/01/20

Upload: molimo

Post on 12-Jan-2016

61 views

Category:

Documents


1 download

DESCRIPTION

A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks. Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20. Outline. Introduction LHAP Security Analysis Performance Analysis Conclusion. Securing Ad hoc Networks. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

Speaker: Hsien-Pang Tsai

Teacher: Kai-Wei Ke

Date: 2005/01/20

Page 2: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 2

Outline

Introduction LHAP Security Analysis Performance Analysis Conclusion

Page 3: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 3

Securing Ad hoc Networks

Most ad hoc networks do not have any provisions for restricting or regulating the traffic.

Recently researchers have proposed security extensions for authenticating routing control packets.

A simple solution is to use a network-wide key shared by all nodes.

Page 4: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 4

Public Key Algorithm

Two problems with shared-key: Key management Digital signatures (Authentication)

Key feature of public key cryptosystem Two keys: Public Key & Private Key Computational infeasible to determine decryption

key.

Page 5: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 5

Public Key Algorithm (cont.)

Public Key Encryption

Page 6: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 6

Public Key Algorithm (cont.)

Public Key authentication

Page 7: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 7

Outline

Introduction LHAP Security Analysis Performance Analysis Conclusion

Page 8: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 8

LHAP

Lightweight hop-by-hop authentication. A node joining an ad hoc network only needs

to perform some inexpensive authentication with its neighbors.

Residing in between the data link layer and the network layer.

Page 9: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 9

Notation

Page 10: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 10

Trust Management

Trust Bootstrapping

Page 11: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 11

Trust Management (1)

Trust Maintenance Each node broadcasts an KEYUPDATE message

(with TTL=1) to its neighbors. The KEYUPDATE message is authenticated with

the next TESLA key in its key chain. Preventing malicious nodes from forging traffic

using the TRAFFIC keys node A has already released.

Page 12: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 12

Trust Management (2)

Trust Termination When a compromised node is detected, all the

node will terminate their trust relationship with that node permanently.

When a node doesn’t receive a valid KEYUPDATE message from a neighbor within a TESLA interval, it will terminate it trust of this neighbor temporarily.

Page 13: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 13

Lightweight Traffic Authentication Each node generates a one-way key chain

used for traffic authentication. Node A want to broadcast a packet M:

Benefit: Enable instant verification of traffic packets. It is not necessary to disclose TRAFFIC keys

periodically.

Page 14: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 14

Outline

Introduction LHAP Security Analysis Performance Analysis Conclusion

Page 15: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 15

Security Analysis

Outside attacks Single outside attack Collaborative outside attack Hidden terminal attack

Inside attacks Single inside attack Insider clone attack

Page 16: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 16

Outside Attacks

Single outside attack

Page 17: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 17

Outside Attacks (1)

Collaborative outside attack Attacker P1 and P2 have a private channel. P1 forwards every message it eavesdropped from

node A, including KEYUPDATE messages and traffic packets.

Solution: Allow a receiving node to determine if they should be

able to hear each other.

Page 18: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 18

Outside Attacks (2)

Hidden terminal attack IEEE 802.11 solves the problem using CSMA/CA

with ACKs and optional RTS/CTS control packet.

Page 19: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 19

Insider Attacks

Single insider attack A compromised node might attempt to flood the

network with many traffic packets. Insider clone attack

When a compromised nod shares its private key with its outside conspirators.

Solution Instruction Detection System (IDS).

Page 20: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 20

Outline

Introduction LHAP Security Analysis Performance Analysis Conclusion

Page 21: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 21

Performance Analysis

Computational Overhead RSA digital signature verifications. Hash computation

Latency A node verifies a traffic packet it receives by

computing one or more hashes. Traffic Byte Overhead

A node adds a traffic key to every traffic packet it sends,…

Page 22: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 22

Performance Analysis (cont.)

JOIN message, a public key certificate and the size of a digital signature.

A node sends an ACK packet to every new neighbor…

KEYUPDATE message.

Page 23: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 23

Outline

Introduction LHAP Security Analysis Performance Analysis Conclusion

Page 24: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 24

Conclusion

Presented a lightweight hop-by-hop authentication protocol for network access control in ad hoc networks.

Transparent to and independent of the routing protocol.

Page 25: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

2005/1/20 25

Reference

1. Sencun Zhu, and Shouhuai Xu, “LHAP:A lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks”, ICDCSW’03, IEEE 2003.

2. Adrian Perrig, and Ran Canetti, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE 2000.