security issues in mobile ad-hoc network
DESCRIPTION
Security Issues in Mobile Ad-Hoc Network. Mukul A. Khairatkar. Agenda. Introduction to MANET Various Security Model Operations Introduction to IPSec IPSec Operation Simulation Details Conclusion. Mobile Ad-Hoc Network. No Infrastructure No Server Nothing - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/1.jpg)
SECURITY ISSUES IN MOBILE AD-HOC NETWORKMukul A. Khairatkar
![Page 2: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/2.jpg)
AGENDA
Introduction to MANET
Various Security Model
Operations
Introduction to IPSec
IPSec Operation
Simulation Details
Conclusion
![Page 3: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/3.jpg)
MOBILE AD-HOC NETWORK
No Infrastructure No Server Nothing Everybody acts like a Router Security Problem
Network Resources Source Spoofing Eavesdropping Data Transformation
![Page 4: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/4.jpg)
SECURITY
Key Pre-Distribution Scheme Web of Trust Public Key Certification IPSec
![Page 5: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/5.jpg)
SOME SECURITY TERMS
Public Key
Private Key
Digital Signature
Certificate
Digital Signature
Certificate Of Authority
Certificates
Public Key Infrastructure
X.509
![Page 6: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/6.jpg)
KEY PRE-DISTRIBUTION SCHEME
Node 1
Node 3
Node 4
Node 2
Key
Key
Key
Key
Key
Key
![Page 7: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/7.jpg)
WEB OF TRUST
Node 1
Node 2
Node 3
PGP
PGP
PGP
Public
Key
Public Key
![Page 8: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/8.jpg)
PUBLIC KEY INFRASTRUCTURE
X.509
Certificate Authority CA
CA CA Root Certificate
Root certificate
Distributed with Web Browser ..etc
SSL/TLS web pages
![Page 9: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/9.jpg)
IPSEC
Why IPSec?
Open Standard Freely Available
Modular
Integrates in Existing IP structure
Transparent to application layer entities
For IPv6
![Page 10: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/10.jpg)
SECURITY ARCHITECTURE
![Page 11: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/11.jpg)
MODES
Transport Mode Payload Encrypted IP header is Intact Routing is Intact
Tunnel Mode New IP packet New Routing NW-NW Communication (tunnel)
![Page 12: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/12.jpg)
IPSEC PACKET
![Page 13: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/13.jpg)
NETWORK MODEL
![Page 14: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/14.jpg)
IP TUNNEL
![Page 15: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/15.jpg)
PERFORMANCE
![Page 16: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/16.jpg)
FOR AD-HOC NETWORK
![Page 17: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/17.jpg)
IPSEC FOR AD-HOC
IP Cloud
Subnet 1 Subnet 2
![Page 18: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/18.jpg)
SECURITY
![Page 19: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/19.jpg)
PROBLEMS
Latency Increases
Overhead Increases
Throughput Decreases
Complexity Increases
![Page 20: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/20.jpg)
CONCLUSION
Ad-hoc Network uses various security
methods
Do not violate existing protocol
IPSec is a new approach to secure IPv4 and
IPv6 packets
Better approach can be used than IPSec
![Page 21: Security Issues in Mobile Ad-Hoc Network](https://reader035.vdocuments.net/reader035/viewer/2022062517/56813859550346895da003cc/html5/thumbnails/21.jpg)
REFERENCES
[1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and
Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE
2004.
[2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic Institute and State University,
IEEE 2006.
[3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMAN
Laboratoirc CNRS-PRiSM. University of Versailles.
[4]Securing Ad-Hoc Networks by IPSEC, Abhrajit Ghosh, Telcordia Technologies Applied Research Piscataway,
NJ, IEEE paper 2004.
[5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999.
[6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC
2510, Mar 1999
[7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003.
[8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32,
No. 3, pp. 586-615, 2003.