22
Security in Wireless Ad- Hoc Networks by Raju Vemula

Ad hoc secuirty-vemula

Embed Size (px)

Citation preview

Page 1: Ad hoc secuirty-vemula

Security in Wireless Ad-Hoc Networks

byRaju Vemula

Page 2: Ad hoc secuirty-vemula

Outline

l Introductionl MANETl SSN

l Securityl Propertiesl Functions

l Classification of attacksl Solutionsl Conclusionl References

Page 3: Ad hoc secuirty-vemula

Introduction

lDifferent technologies have been developed for different situations and necessities.lWi-Fi technology for Wireless LAN and short range mobile access networks.lWireless USB is technology for Internet network on the go.lDifferent technologies like infrared, bluetooth are short range.

Page 4: Ad hoc secuirty-vemula

Introduction

lAd-Hoc network?l A network formed without any central administration

which consists of mobile nodes that uses a wireless interface to send packet data.

l Image from www.microsoft.com

Page 5: Ad hoc secuirty-vemula

IntroductionlThere are 2 types ad-hoc networks.

l MANET(Mobile ad-hoc network)l An autonomous system of mobile hosts connected by wireless links, often called MANET.

l Establishing survivable, efficient, dynamic communication for emergency/rescue operations.

l Disaster relief efforts.

Page 6: Ad hoc secuirty-vemula

MANET

http://www.comp.nus.edu.sg/~xuemingq/research.html

http://www.comp.nus.edu.sg/~xuemingq/research.html

Page 7: Ad hoc secuirty-vemula

Introduction

l WSN(Wireless Sensor Network)l A smart sensor network consists of a number of

sensors spread across a geographical area. l Each sensor has wireless communication capability

and sufficient intelligence for signal processing and networking.

l Military sensor networks to detect enemy movements.

l The presence of hazardous material.l Environmental sensor networks to detect and

monitor environmental changes.

Page 8: Ad hoc secuirty-vemula

Wireless Sensor Network

http://www.alicosystems.com/wireless%20sensor.htm

http://www.alicosystems.com/wireless%20sensor.htm

Page 9: Ad hoc secuirty-vemula

Properties

There is no fixed topology Wireless nodes are small they move freely in and out

of range.l E.g. Mobile phones, PDA, and wrist watches.

Limited energy

Most of the devices are operate on battery power which is limited.

Page 10: Ad hoc secuirty-vemula

Properties

Every node is a router Every node present in the network has limited amount of

communication range. All nodes out of this range can only be reached by packet forwarding.

Limited CPU/Resources In consume electronics price plays a big role. They are cheap and have limited CPU power.

Page 11: Ad hoc secuirty-vemula

Security Functions

Availability It makes sure that all the required network services are

available to the authorized users.

Authentication Authentication enables MANET to ensure the identity of

peer node that is communicating with.

Confidentiality Confidentiality ensures that some information discloses

only to the unauthorized users.

Page 12: Ad hoc secuirty-vemula

Security Functions

Data Integrity It guarantees for the information that is being

transferred.

Key and trust management Basic operations includes establishing key

exchange and update as well as secret connections.

Page 13: Ad hoc secuirty-vemula

Classification of attacks

l There are so many ways that a malicious user may attack a ad-hoc network.

l Internal attacksl Internal attacks are more difficult to protect against as the

internal nodes are trustworthy.

l External attacksl External attacks are produced by users which are not part

of network. For example one may issue an attack on company from the office next to that.

Page 14: Ad hoc secuirty-vemula

Classification of attacksl The other types of attacks are:

l Active attacksl Active attacks are caused by the users who are able to

inject the packets into the network. They are able to alter the data, interfere with the routing information and disrupt the service.

l Passive attacksl Passive attacks is mainly to steal information and to listen

on the communication in the network. These may monitor and analyze the traffic.

Page 15: Ad hoc secuirty-vemula

Classification of attacks

lAnother way to classify the attacks is by the layer at which they may occur.

l At the physical layer the malicious user may jam the communication, intercept the messages or they may just listen the messages.

l At the data link layer the attacks conducted are traffic analysis and monitoring and service disruption.

l At network layer many attacks are observed like wormhole, black hole, flooding, and resource consumption.

Page 16: Ad hoc secuirty-vemula

• Wormhole Attack:

In this attack network tunnel information to another network.At this time hacker may easily enter and do misuse inside the network.

• Black hole Attack:

It is a type of DOS(Denial of service) attack in which a router that is supposed to relay packets instead discard them.

Page 17: Ad hoc secuirty-vemula

Solutionsl“Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, Yih-Chun Hu, Adrian Perrig, David. B. Johnson

l Protection against warm-hole attacksl Packet leashes

l Temporall The packet has an upper bound on its lifetime which restricts

the maximum travel distance.l Transmission time and expiration time of the packet.

l Geographicall The recipient of the packet is within a certain distance from

the sender.

Page 18: Ad hoc secuirty-vemula

Solutions

l“Security-Aware Ad Hoc Routing for Wireless Networks”, Seung Yi, Prasad Naldurg, Robert Kravets

l Protection against black-hole attacksl User identity is bound with an associated trust level.l For each trust level, it is used a simple shared secret to

generate a symmetric encryption/decryption keyl Provides a suite of cryptographic techniques: digital

signature, and encryption

Page 19: Ad hoc secuirty-vemula

Key Management

lKey management system must be secure, cause most cryptographic system rely on it.

l 3 types of keys in the networkl Group Key

Key for all members in group to encrypt and decrypt the data.

l Symmetric key Shared between team leader and member node of

the same group. l Shared key

Shared only by all group leaders in the network.

Page 20: Ad hoc secuirty-vemula

Conclusion

lSituations are unpredictable with the wireless networks, even with the infrastructural support.

lPresent solutions to address these attacks are not strong enough.

lKey management solutions may help, but not every time.lStill a lot of research has to be done.

Page 21: Ad hoc secuirty-vemula

References

lH Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, “Security in mobile ad hoc networks: Challenges and solutions” (2004). IEEE Wireless Communications. 11 (1), pp. 38-47.lYih-Chun Hu , Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, v.2 n.3, p.28-39, May 2004.lThe Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Frank Stajano, Ross Anderson.lAdam Burg, “Ad hoc network specific attacks”, Seminar on Ad hoc networking: concepts, applications, and security, Technische Universitat Munchen, 2003.lCharles E. Perkins (Hrsg.). Ad Hoc Networking, Addison-Wesley 2000.

Page 22: Ad hoc secuirty-vemula

Thank you