Top Banner
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan
26

A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Dec 30, 2015

Download

Documents

Tobias Richard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

A Security-Aware Routing Protocol for Wireless Ad Hoc Networks

Xia WuXingxiao Yuan

Page 2: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Introduction

• Ad hoc network ---- no wired infrastructure exists, cooperative by nature.

• Rely on implicit trust-your-neighbor relationships.

• allows malicious nodes to paralyze an ad hoc network by inserting erroneous routing updates, replaying old routing information, changing routing updates, or advertising incorrect routing information.

Page 3: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Introduction

• SAR: Security-Aware ad-hoc Routing. An approach to routing that incorporates security levels of nodes into traditional routing metrics.

• Goal: characterize and explicitly represent the trust values and trust relationships associated with ad hoc nodes and use these values to make routing decisions.

Page 4: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Motivation

Page 5: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR• The length of the routes is the only metric

used in these protocols.• Applications must be able to specify the

quality of protection or security attributes of their ad hoc route with respect to metrics that are relevant to them.

Page 6: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR -- Protocol

• Communicate => send RREQ packet to its neighbors.

• Intermediate nodes receive an RREQ packet with a particular security metric, SAR ensures that this node can only process the packet or forward it if the node itself can provide the required security or has the required authorization or trust level.

Page 7: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR -- Behavior

• The route discovered by SAR between two communicating entities may not be the shortest route in terms of hop-count.

• SAR is able to find a route with a quantifiable guarantee of security.

• If one or more routes that satisfy the required security attributes exist, SAR will find the shortest such route.

Page 8: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR – Protocol Metrics

• Trust Hierarchy• Internal hierarchy of privileges.• Mirror the organizational hierarchy, and

associate a number with each privilege level.• QoP(Quality of Protection) bit vector.• four different types of message protection,

use a four bit vector to represent these message types.

Page 9: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR – Protocol Metrics

• Trust Hierarchy• The trust level or protection should be

immutable. • Keys can be distributed a priori • Encrypt the portion of the RREQ that contain

the trust level.

Page 10: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR – Protocol Metrics• Secure Routing Metrics

Page 11: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

SAR – Protocol Metrics

• SAR uses security information to dynamically influence the choice of routes installed in the routing tables. Applications can choose to implement a subset of these protection guarantees, based on a cost-benefit analysis of various techniques available to SAR in this decision making phase.

Page 12: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection

• SAR provides protection against attacks on the trust hierarchy and attacks on the information in transit in the routing protocol messages.

Page 13: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Trust Level

• Attacks – outsider attacks and insider attacks.• SAR modifies the behavior of route discovery,

tying in protocol behavior with the trust level of a user.

• Binding between the identity of the user with the associated trust level.

• Cryptographic techniques – encryption, public key certificates, shared secrets.

Page 14: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Trust Level

• Outsider attacks prevention with traditional centralized authority is not available in ad hoc networks.

• SAR has open designs to incorporate many security mechanisms.

• Threshold cryptography, key sharing, key agreement, etc.

Page 15: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Trust Level

• Insider attacks are launched by compromised users within a protection domain or trust level.

• Insider attacks are hard to prevent at the protocol level.

• Techniques include secure transient associations, tamper proof or tamper resistant nodes.

Page 16: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Information in Transit

• Compromised of enemy nodes can utilize the information carried in the routing protocol packets to launch attacks.

• Attacks can lead to corruption of information, disclosure of sensitive information, theft of legitimate service from other protocol entities, or DoS to protocol entities.

Page 17: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Information in Transit

• Interruption• Attackers can selectively filter control messages and

updates, and force the routing protocol to behave incorrectly.

• In SAR, a malicious node that interrupts the flow of packets belonging to a higher or lower trust level cannot cause an attack, because it is supposed to drop these packets in any case.

• If a node filters packets that belong to the same trust level as itself, the broadcast nature of the communication channel can help in detection of interruption attacks by other listeners within transmission range.

Page 18: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Information in Transit

• Interception • Routing protocol traffic and control messages

can be deflected and rerouted.• In SAR, the messages are protected by the key

management infrastructure.

Page 19: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Information in Transit

• Modification• The integrity of the information in routing

protocol packets can be compromised by modifying the packets themselves.

• SAR provides a suit of cryptographic techniques that can be incorporated on a need-to-use basis to prevent modification.

• Include digital signatures and encryption

Page 20: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Protection – Information in Transit

• Fabrication• False route and metric information can be inserted

into legitimate protocol packets by malicious insider nodes. The sender of the RREQ may receive multiple RREPs.

• SAR picks the first RREP that arrives at the sender. The sender can be modified to verify that the RREP has credentials that guarantee the integrity of the metrics, and repudiate the ownership of attributes by challenging the intermediate nodes.

Page 21: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Implementation

• SAODV is an implementation of SAR.• SAODV is built as an augmentation to the AODV

protocol in the NS-2 network simulator.• RREQ has two additional fields: RQ-SEC-

REQUIREMENT and RQ-SEC-QUARANTEE• RQ-SEC-REQUIREMENT indicates that the required

security for the route the ender wishes to discover.• RQ-SEC-QUARENTEE indicates the maximum level

of security afforded by the paths discovered.

Page 22: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Implementation

• RREP has additional information indicates the maximum security available over the path.

• The value of the RQ-SEC-GUARANTEE field in the RREQ packet is copied to RP-SEC-QURANTEE filed in the RREP packet.

• Intermediate nodes that are allowed to participate, updates their routing tables as in AODV and record the new RP-SEC-GUARANTEE value.

Page 23: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Implementation

• SAODV also has support for digital signatures.• If the application requested integrity support,

a new field to store the computed digital signatures was added to the RREQ.

Page 24: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Performance Evaluation

• Compared to AODV, SAODV sends fewer routing protocol control messages for the same number of flows and the same amount of application data.

• As a result, though the overhead per control message is higher in SAODV, the performance impact is sustainable.

Page 25: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

Conclusion

• SAR enables the discovery of secure routes in a mobile ad hoc environment.

• It allows applications to enforce explicit cooperative trust relationships.

• It provides customizable security to the flow of routing protocol messages themselves.

• The processing overheads in SAR are offset by restricting the scope of the flooding for more relevant routes.

Page 26: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks Xia Wu Xingxiao Yuan.

References

• Seung Yi, Prasad Naldurg, Robin Kravets “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks ”