Security of wireless ad-hoc networks - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Security of wireless ad-hoc networks

Description:

MANET topologies tend to have many more redundant links than traditional networks ... A MANET router typically has a single interface, while a traditional router has ... – PowerPoint PPT presentation

Number of Views:80
Avg rating:3.0/5.0
Slides: 24
Provided by: Yaki
Category:

less

Transcript and Presenter's Notes

Title: Security of wireless ad-hoc networks


1
Security of wireless ad-hoc networks
2
Outline
  • Properties of Ad-Hoc network
  • Security Challenges
  • MANET vs. Traditional Routing
  • Why traditional routing protocols not suitable
    for MANET networks?
  • Routing protocols for MANET
  • Nodes misbehave
  • Routing Security Schemes

3
Properties of Ad-Hoc network (1)
  • No fixed topology
  • Each node is a router
  • Limited energy
  • Limited CPU and other resources
  • Transient connectivity and availability
  • Shared physical medium
  • Identity different from address
  • Physical vulnerability
  • Lack of central administration

4
Properties of Ad-Hoc network (2)
  • Where Ad hoc network
  • Installing an infrastructure is not possible
  • The network is too transient
  • The infrastructure was destroyed
  • Throughput

5
Security Challenges
  • Confidentiality
  • Encryption and access control with
    authentication
  • Integrity
  • Also require cryptographic keys
  • Availability
  • Results in two fundamental problem
  • Trust establishment, key management and
    membership control
  • Network availability and routing security

6
MANET vs. Traditional Routing (1)
  • Every node is potentially a router in a MANET,
    while most nodes in traditional wired networks do
    not route packets
  • Topologies are dynamic in MANETs due to mobile
    nodes, but are relatively static in traditional
    networks
  • MANET topologies tend to have many more redundant
    links than traditional networks

7
MANET vs. Traditional Routing (2)
  • A MANET router typically has a single interface,
    while a traditional router has an interface for
    each network to which it connects
  • Power efficiency is an issue in MANETs, while it
    is normally not an issue in traditional networks
  • Low bandwidth links, high bit error rates,
    frequent changes in network topology,
    battery-powered devices with limited transmitter
    power

8
Why traditional routing protocols not suitable
for MANET networks?
  • MANETs are usually highly dynamic.
  • No pre-existing infrastructure.
  • No centralized administration.
  • Dynamic topologies.
  • Energy-constrained nodes.
  • Limited physical security.

9
Routing protocols for MANET
  • IETF MANET working group
  • Categories
  • ProactivePeriodic topology updates
  • ReactiveOn-demand driven protocol
  • Hierarchial
  • Protocols
  • DSR (draft), FSR, DSDV, TORA, ZRP, AODV (RFC
    3561), OLSR (RFC 3626), TBRPF (RFC 3684)

10
Nodes misbehave
  • Overloaded
  • Selfish
  • Malicious
  • broken

11
Solutions to misbehaving node
  • A priori trust relationship
  • Forsake or isolate these nodes form within the
    actual routing protocol for the network
  • Install extra facilities in the network to detect
    and mitigate routing misbehavior

12
Routing Security Schemes
  • Watchdog and Pathrater
  • SEAD
  • SRP

13
Watchdog and pathrater
  • Two extensions to the Dynamic Source Routing
    (DSR) to help mitigate routing failures and
    attacks in ad-hoc networks
  • Watchdog identifies misbehaving nodes
  • Pathrater avoids routing packets through these
    nodes

14
DSR
  • Route discovery

Source May receive many ROUTE REPLY
15
DSR (cont.)
  • Route maintenance
  • Handles link breaks

Link break occurred
A
B
S
D
  1. Try another path
  2. Do a route discovery

B moves out of transmission range of A
16
Watchdog
17
Pathrater
  • Run be each node in the network
  • Rating for every other node
  • Path metric
  • If multiple paths
  • Highest metric

18
Watchdogs weaknesses
  • Ambiguous collisions
  • Receiver collisions
  • False misbehavior
  • Partial dropping

19
Ambiguous/receiver collisions
  • Ambiguous
  • Prevents A from overhearing transmissions from B
  • If repeatedly fails to detect B forwarding on
    packets, then A assume B misbehaving
  • Receiver
  • B could be selfish or malicious (wastes resource)

20
False misbehavior
  • Nodes falsely report other nodes as misbehaving

1. S mark B as misbehaving
2. S wonder why received replied
P
P
P
A
B
S
D
F
A
A
A
1. If A drops Ack Packet
2. B detects this misbehavior and reports it to D
21
Partial dropping
  • A node can circumvent the watchdog by dropping
    packets at a lower rate than the watchdog's
    configured minimum misbehavior threshold.

22
SEAD
  • A routing protocol based on authenticating DSDV.

23
SRP
24
NIST BSAR
25
pros and cons
Write a Comment
User Comments (0)
About PowerShow.com