by ajith u kamath 60-564 project survey on areas of standardization for securing ad hoc networks
TRANSCRIPT
![Page 1: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/1.jpg)
ByAjith U Kamath60-564 Project
Survey onAreas of standardization
ForSecuring Ad hoc networks
![Page 2: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/2.jpg)
Based on
Standardization Areas for securing Ad hoc networksBy Rajesh Talpade and Anthony McAuley
Data Security in Ad hoc networks using Multipath routingBy Souheila Bouam and Jalel Ben-Othman
![Page 3: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/3.jpg)
AGENDA
Introduction Attacks in Ad hoc networks and Areas of
standardization Node configuration Key Management Routing protocol security
Data security based on multipath routing Intrusion Detection Conclusion
![Page 4: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/4.jpg)
Introduction
What are Mobile Ad hoc networks ?
Characteristics
Problems encountered
![Page 5: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/5.jpg)
Attacks in Ad hoc networks
Passive attacks
Active attacks
Black hole attack
Worm hole attack
Routing tables overflow attacks
![Page 6: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/6.jpg)
Attacks in Ad hoc networks Active attacks
Sleep deprivation attacks
Location disclosure attacks
Denial of service attacks
Impersonation attacks
"Problems worthy of attack
prove their worth by hitting back.“ – By Piet Hein
![Page 7: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/7.jpg)
Areas of Standardization
It is expected in future, multi vendor ad hoc devices would inter-operate securely on a large scale.
Standardization Areas, Node configuration Key management Routing protocol security Intrusion detection
![Page 8: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/8.jpg)
Node ConfigurationIn realistic deployment scenarios nodes of ad hoc network should support auto-configuration.
Link Local IP address assignmentPrivate address spaces (e.g. 169.254/16 prefix)
IPv6 address generation based on hardware interface
Problems: different designs for different link-layers, non-unique interface addresses in some link-layers or vendors, and changeable interface addresses.
![Page 9: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/9.jpg)
Node Configuration Distributed dynamic host configuration
protocol MANET Initialization New node joining the MANET Graceful departure of the node Migration of Requester
tolerate message losses, network partitioning and mergers
does not account for the possibility of nodes behaving maliciously
![Page 10: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/10.jpg)
Key Management
For enforcing confidentiality, integrity, authentication and non-repudiation of messages in ad hoc networks.
Key management Service through CA
A centralized CA-based approach is not applicable to ad hoc networks.
Replicating the CA, introduces the problem of maintaining the synchronization across the multiple CA’s
![Page 11: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/11.jpg)
Key Management Threshold cryptography
An (n; t + 1) threshold cryptography scheme allows ‘n’ parties to share the ability to perform a cryptographic operation, so that any ‘t + 1’ parties can perform this operation jointly, whereas it is infeasible for at most ‘t’ parties to do so, even by collusion.
![Page 12: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/12.jpg)
Key Management
But places unreasonable requirement of forcing some nodes to “volunteer” for specific roles.
Ref: Parallel reliable threshold multisignature by Yair Frankel and Yvo G
![Page 13: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/13.jpg)
Key Management Self organized public key infrastructure
Public key certificates are issued by the users. When user u wants to obtain the authentic public
key of user v, it acquires a chain of public key certificates such that the first certificate of the chain can directly be verified by u using a public key that u holds and trusts.
Similar to PGP but self organized. The approach is probabilistic.
![Page 14: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/14.jpg)
Key Management
Ref: The Quest for Security in Mobile Ad Hoc Networks by Jean-Pierre Hubaux, Levente Butty´an and Srdan Capkun
![Page 15: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/15.jpg)
Routing Protocol Security
An attacker can inject incorrect routing information, replay old information, or cause excessive load to prevent proper routing protocol functioning.
Data security based on multipath routing.Exploit the feature of existence of multiple paths
between nodes in an Ad hoc network.
![Page 16: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/16.jpg)
Routing Protocol Security Assumptions made by the protocol
The sender ‘A’ and the receiver ‘B’ are authenticated.
WEP (Wireless Equivalent Privacy) is used for the encryption/decryption of all the frames at MAC layer and the authentication of the terminals.
A mechanism of discovering the topology of the network is available.
The used routing protocol supports multi-routes.
![Page 17: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/17.jpg)
Routing Protocol Security Description
It uses n routes (n ≥ 3) among N available.
There exist two types of channels
The original message m is divided into (n-1) parts.
The protocol generates, then, a random number x (1< x ≤ (n-1), x integer).
Algorithm can be run with both reactive and proactive routing protocols.
![Page 18: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/18.jpg)
Routing Protocol Security
Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN
![Page 19: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/19.jpg)
Routing Protocol Security Position of SDMP
The SDMP header
![Page 20: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/20.jpg)
Routing Protocol Security Improvements
(Accepted in the 2004 International Workshop onMobile Ad Hoc Networks and Interoperability Issues.)
Error and Retransmit management
Ref: Securing Data Transmissions and Retransmissions Management in Ad hoc Networks By Souheila BOUAM and Jalel BEN-OTHMAN
![Page 21: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/21.jpg)
Routing Protocol Security Experimental results
Sending data using the algorithm (n=8 and n=4) and using classical method with one channel are compared. The transmitted file is 4.48 MB length and length of each block is 64 Kbytes.
Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN
![Page 22: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/22.jpg)
Routing Protocol Security In the second test, different block sizes at each
data transmission were used. A base file of 19200 Bytes was used.
Ref: Data Security in Ad hoc Networks Using MultiPath Routing By Souheila BOUAM and Jalel BEN-OTHMAN
![Page 23: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/23.jpg)
Routing Protocol Security Drawbacks of the protocol
Diversity coding provides single line failure with only one extra line instantaneously without communicating with the transmitter. But this feature is not made use of in the protocol.
A particular sequence has to be followed to get each message parts. If a message part is lost, all the remaining parts cannot be obtained until receiver receives the lost message part.
More bandwidth is consumed for transmitting the message.
![Page 24: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/24.jpg)
Routing Protocol Security Protocols based on multi path routing
SPREAD (Security Protocol for Reliable data delivery) – uses threshold secret sharing system. Provides maximum security along with reliability of some extent.
Split multi path routing - uses the source routing. The message parts are sent on maximum routes with maximally disjoint paths. The protocol builds multiple routes using request/reply cycles.
M-TCP – Multipath TCP
![Page 25: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/25.jpg)
Routing Protocol Security Dynamic Source Routing
Source routing is a routing technique in which the sender of a packet determines the complete sequence of nodes through which to forward the packet.
Assumes that all hosts wishing to communicate with other hosts within the ad hoc network are willing to participate fully in the protocols of the network.
Route Discovery protocol
![Page 26: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/26.jpg)
Routing Protocol Security Grudging Nodes in DSR
Once non-cooperative behavior has been detected and exceeds threshold values, an ALARM message is sent.
![Page 27: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/27.jpg)
Intrusion Detection
In an ad hoc network, there does not exists natural traffic concentrators such as firewalls/gateways and localized communication pattern.
Intrusion Detection in Ad hoc networks Every node in the ad-hoc network participates
in intrusion detection and response. Each node is responsible for detecting signs of
intrusion locally and independently. Neighboring nodes can collaboratively investigate in
a broader range.
![Page 28: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/28.jpg)
Intrusion DetectionThe conceptual IDS model at every system in the ad hoc network.
Ref: Intrusion Detection in Wireless Ad Hoc Networks By Yongguang Zhang and Wenke Lee
![Page 29: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/29.jpg)
Intrusion Detection
Standardization of the intrusion detection mechanisms and processes enables nodes from multiple vendors to share information and collectively determine the intruding node(s).
![Page 30: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/30.jpg)
Conclusion
Even though significant research work exists in the above areas of ad hoc networks, little or no attempt has been made to standardize mechanisms that would enable multi vendor nodes to inter-operate on a large scale and permit commercial deployments of ad hoc networks. Based on the requirements for each of the identified areas, candidate proposals will need to be evaluated.
![Page 31: By Ajith U Kamath 60-564 Project Survey on Areas of standardization For Securing Ad hoc networks](https://reader035.vdocuments.net/reader035/viewer/2022062805/5697bfa91a28abf838c99e87/html5/thumbnails/31.jpg)
Thank You
Questions ? Comments ?