




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Security in Mobile Ad Hoc Networks,Security Protocols and Applications Seminar,2,Contents,Basic introduction to ad hoc networks Basic Mechanisms (F. Lyner) Routing Physical location Security Mechanism (R. Belotti) Public Key infrastructure Key establishment,3,Introduction,Definition of Mobile Ad Hoc
2、 Network Collection of mobile nodes that can dynamically form a network that does not rely on any infrastructure. Characteristics of the nodes Wireless Limited power and CPU resources,4,Characteristics and Constraints,Limited Range Due to limited power supplies Each node acts also as router to relay
3、 packets COLLABORATION Mobility Nodes can dynamically join and leave the network Routing information only valid for limited time. No (centralized) public key infrastructure,5,Security Goals,Availability Very challenging due to all characteristics Confidentiality, Integrity, Authentication Usually re
4、quire a public key infrastructure Security mechanisms must be distributed,6,Basic Mechanisms,Basic Mechanism Services and/or guarantees that would usually be provided by the infrastructure Major Security Goal: Availability Nearly all attacks are DoS attacks Even more difficult to handle than in “nor
5、mal” networks due to collaboration requirement, mobility and nature of communication channel,7,Physical,Threat of capture and compromise Most scenarios of ad hoc networks include nodes without surveillance Attacks Theft, demolition, changes in environment Manipulation of hard-/software Counter measu
6、res Tamper resistant devices, very difficult for sensors,8,“Over the Air”,Threats due to wireless communication Attacks Eavesdropping, jamming, spoofing, “message attacks” Sleep deprivation torture Counter measures First attacks are not specific to ad hoc networks, well researched in military contex
7、t:frequency hopping, spread spectrum,9,Collaboration,Every algorithm in ad hoc networking depends on some extents from the collaboration of the other nodes Main example: Routing Protocols Here: explaining the route discovery protocol,10,Route Discovery Protocol,Used by DSR (Dynamic Source Routing) S
8、implified,c,a,e,d,b,RREQ: Route Request RREP: Route Reply,abde,f,11,Route Discovery Protocol (2),Behavior in case of error,c,a,e,d,b,RERR: Route Error,f,12,Route Discovery Protocol (3),Great number of attacks possible by Not participating at all to save battery or partition the network Spamming the
9、network with RREQ Changing routing information in RREP messages Constantly or never replying with RERR ,13,Solutions,The CONFIDANT Protocol Idea: punish non collaborative/malicious nodes by non-forwarding their traffic Detection through “neighborhood watch” Building a distributed system of reputatio
10、n Enable “re-socialization” through timeouts in the black list.,Sonja Buchegger, Jean-Yves Le Boudec: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Process
11、ing, Canary Islands, Spain, January 2002,14,Solutions (2),Nuglets Idea: virtual currency to buy the collaboration Nuglets are attached to the message Each relaying node takes nuglets form the message which can use to buy the routing of its own message Nuglet module must be implemented in a tamper re
12、sistant hardware to avoid cheating,Jean-Pierre Hubaux, Levente Buttyan, Srdan Capkun: The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA, October 2001,15,Solutions (3),Securing Routing Informa
13、tion Idea: share the routing information through a secure channel Requires Key Management and Security Mechanisms,16,Security Mechanisms,Most critical and complex issue:Key Establishment Key agreement Key transport Asymmetric cryptography is appropriate for ad hoc networks to authenticate nodes,17,A
14、symmetric cryptography,Each node has a public/private key pair For efficiency reasons and to limit power consumption, use asymmetric cryptography to exchange symmetric keys, then use them to secure communication Threat: man-in-the-middle,C=E(KUCharlie,M),M=E-1(KRCharlie,C),C=E(KUBob,M),Alice,Charlie
15、,Bob,18,Asymmetric cryptography,How to authenticate the owner of a device? Classical solutions need a central trusted authority Not suited for ad hoc networks,19,Resurrecting Duckling,Ducklings emerging from their eggs Recognize their mother as the first moving object emitting sound they see Similar
16、 approach for electronic devices Recognize the owner as the first entity that sends a private key If the owner changes? It should be possible to reinitialize the device (resurrect it),Frank Stajano, Ross J. Anderson: The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks. In Proceed
17、ings of Security Protocols Workshop, 1999,20,Threshold cryptography,Emulate the central authentication authority by distributing it on several nodes acting as servers Private Key is divided into n shares s1, s2, . sn,L. Zhou and Z. Haas: Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no.
18、6, November/December 1999,21,Threshold cryptography (2),(n, t+1) threshold cryptography configuration n servers, if t are compromised,it is still possible to perform the service E.g. (3, 2) threshold cryptography scheme,L. Zhou and Z. Haas: Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, n
19、o. 6, November/December 1999,22,Threshold cryptography (3),Threshold cryptography seems to be a very robust solution However it needs some nodes to assume special behaviour For instance it is appropriate for military applications Inadequate for civilian networks Users behave in a completely selfish
20、way,23,Self-organized PKI,Similar to PGP Certificate issued by users Bind public key to an identity Each user maintains a local certificate repository Certificates issued by itself Other certificates selected using some algorithms (Shortcut Hunter) Size of certificate repository is small compared to
21、 the total number of users in the system,24,Self-organized PKI (2),How it works u wants to verify the public key of v u and v merge their local certificate repositories (subgraphs) u tries to find a certificate chain (path) from u to v in the merged repository,subgraph of u,subgraph of v,path from u
22、 to v,v,u,Jean-Pierre Hubaux, Levente Buttyan, Srdan Capkun: The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA, October 2001,25,Self-organized PKI (3),Only probabilistic guarantee to find an appropriate certificate Security s
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
评论
0/150
提交评论