Top Banner
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim Parker Anupam Joshi Michaela Iorga Tom Karygiannis National Institu for Standards and Technology March 10, 2005 March 10, 2005 Kauai Island, Hawaii Kauai Island, Hawaii
16

Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks

Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks

Anand PatwardhanJim ParkerAnupam Joshi

Michaela IorgaTom Karygiannis

National Institutefor Standards

and Technology

National Institutefor Standards

and Technology

March 10, 2005March 10, 2005Kauai Island, HawaiiKauai Island, Hawaii

March 10, 2005March 10, 2005Kauai Island, HawaiiKauai Island, Hawaii

Page 2: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

ChallengesChallenges• Wireless communication

• Short range (802.11, Bluetooth etc.)• Open medium

• Identification and Authentication• PKI based solutions infeasible• No prior trust relationships

• Routing• Based on dynamic cooperative peer relations• Key to survival of MANET

• Device constraints• Power Conservation• Finite Storage• Computation power

Page 3: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

AODVAODV

• Ad hoc On-demand Distance Vector routing protocol

• All up to date routes are not maintained at every node

• Minimizes number of broadcasts by creating routes on-demand

• Routes are created as and when required

• Route remains valid until destination is unreachable or the route is no longer needed

• Adaptation to dynamic link conditions

• Low processing and Memory Overhead

• Low Network Utilization

Page 4: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

AODV MessagingAODV Messaging

• Source Node – node originating routing request

• Destination Node – sends route reply

• Sequence Numbers – used to avoid loops/replay

• Route Request – route discovery message

• Route Reply – destination to source message

• Route Error – destination node unreachable

• Intermediate Node Path List – list of nodes traversed along message path

Page 5: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

AttacksAttacks

• Attacks can be broadly classified into• Routing disruption attacks• Resource consumption attacks• Attacks on data traffic

• Objective: Isolate and deny resources to intrusive and/or chronically faulty nodes

Page 6: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Routing disruptionsRouting disruptions

• Malicious nodes may:• convince nodes that it is routing packets to

the correct destination when it is not,• fabricate route-maintenance messages,• refuse to forward or simply drop packets,• spoof routing addresses,• and/or modify messages.

Page 7: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Secure Routing in MANETsSecure Routing in MANETs

• Each node is a Router• Identification and Authentication

• Statistically Unique and Cryptographically Verifiable (SUCV) identifiers

• No prior trust relationships required• Large address space of IPv6 suitable for

SUCVs• Secure binding between IPv6 address and

Public key

Page 8: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Secure Routing in MANETsSecure Routing in MANETs

• Routing state• Additional fields in control messages to protect data

• SUCV: IPv6 address and Public Key• Secure binding, computationally infeasible to compute

private key in order to spoof• Routing messages protected against mangling and

masquerading

Page 9: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Binding IP Address and RSA Public Key

2003:13:0:0:16ba:ae7f:8aea:dab3 2003:33:0:0:31ba:af0f:82ea:a0bIP: IP:64-bit Network Specific ID 64-bit Hash of Public

Key

64-bit Hash of Public Key

64-bit Network Specific ID

RSA Public Key RSA Public Key

Signature Signature

MESSAGE: MESSAGE:

Securing the IPv6 AODVSecuring the IPv6 AODV

Page 10: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

• Wired Networks– Traffic monitoring at routers, gateways,

firewalls– Static routes– Physical security

• MANETs– Mobile nodes– Other radio interference– Reliance on cooperative mechanisms for

routing– Intrusion detection limited to devices within

radio-range

Intrusion DetectionIntrusion Detection

Page 11: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

• Identity– Use SUCVs

• Mobility– False positives

• Scalability– Large radio-ranges or dense networks

• Aggregation of data– Communicate intrusions data to warn others

Intrusion Detection ChallengesIntrusion Detection Challenges

Page 12: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Packet ForwardingPacket Forwarding

A

C

B

Datagram dgram_in has:Source IPv6 address, x U – {B,C}Destination IPv6 address, y U – {B,C} MAC source, mac(u), u U – {B,C}MAC destination, mac(B)

Corresponding dgram_out must have:Source IPv6 address, xDestination IPv6 address, yMAC source, mac(B)MAC destination, mac(u), u ε U – {B,C}

dgram_in dgram_out

Page 13: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Stateful Packet MonitoringStateful Packet Monitoring

AODV TCP

IPv6

Ethernet Frame

{ RREQ, RREP, RERR }{ TCP Sequence no., TCP checksum }

Updatein-memoryHash table

Build andMaintainNeighbor table(mac, ipv6) pairsAnd route status

From the packet capture library (pcap)

Packets that should be forwarded

Page 14: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Example ScenarioExample Scenario

Page 15: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

• Active Response

• Nodes send out accusations on events that they directly observe

• Accusations are signed so accuser is accountable

• No Hearsay is propagated

• All nodes have same information on which to base decisions

• Combine cross layer evidence to evaluate trust between MANET nodes

• Design and develop a secure trust routing protocol

Future WorkFuture Work

Page 16: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.

Additional InformationAdditional Information

• UMBC• http://ebiquity.umbc.edu

• NIST• http://csrc.nist.gov/manet