Security for Ubiquitous and Adhoc Networks



Similar documents
How To Write A Transport Layer Protocol For Wireless Networks

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Security Sensor Network. Biswajit panja

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography and Network Security

Security in Ad Hoc Network

Chap. 1: Introduction

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services


Cryptography and Network Security Chapter 1

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

COSC 472 Network Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Authentication in WLAN

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

A Framework for Secure and Verifiable Logging in Public Communication Networks

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

CRYPTOGRAPHY IN NETWORK SECURITY

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

IT Networks & Security CERT Luncheon Series: Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security Protocols

Information System Security

TELECOMMUNICATION NETWORKS

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Introduction to Wireless Sensor Network Security

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Single Sign-On Secure Authentication Password Mechanism

Client Server Registration Protocol

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Key Management and Distribution

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

IT Networking and Security

Securing MANET Using Diffie Hellman Digital Signature Scheme

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Compter Networks Chapter 9: Network Security

Enterprise SSO Manager (E-SSO-M)

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CS 203 / NetSys 240. Network Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Module 7 Security CS655! 7-1!

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

SPINS: Security Protocols for Sensor Networks

Chapter 6 CDMA/802.11i

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Security for Ad Hoc Networks. Hang Zhao

Intrusion Detection for Mobile Ad Hoc Networks

CPSC 467b: Cryptography and Computer Security

PrivyLink Cryptographic Key Server *

Strong Encryption for Public Key Management through SSL

Full Drive Encryption Security Problem Definition - Encryption Engine

Current and Future Research into Network Security Prof. Madjid Merabti

CS 356 Lecture 28 Internet Authentication. Spring 2013

Introduction to Security

SANE: A Protection Architecture For Enterprise Networks

Overview. SSL Cryptography Overview CHAPTER 1

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CSCI 4541/6541: NETWORK SECURITY

Content Teaching Academy at James Madison University

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Symmetric Mechanisms for Authentication in IDRP

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CHAPTER 1 INTRODUCTION

Security Design.

Case Study for Layer 3 Authentication and Encryption

Problems of Security in Ad Hoc Sensor Network

LIST OF FIGURES. Figure No. Caption Page No.

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

Firewalls, Tunnels, and Network Intrusion Detection

Information Security

About the Authors Preface Acknowledgements List of Acronyms

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Computer and Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Transcription:

Security for Ubiquitous and Adhoc Networks

Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate networks Not necessarily but often mobile There may exist static and wired nodes

Examples Computer science classroom adhoc network between student PDAs and workstation of the instructor Large IT campus Employees of a company moving within a large campus with PDAs, laptops, and cellphones Moving soldiers with wearable computers Eavesdropping, denial-of-service and impersonation attacks can be launched Shopping mall, restaurant, coffee shops Customers spend part of the day in a networked mall of specialty shops, coffee shops, and restaurants

Examples Group A 1 2 4 Group B 3 5 7 6 Group C A trust relationship among 3 different adhoc groups

Networking Infrastructure Networking topologies Flat infrastructure (zero-tier) All nodes have equivalent routing roles No hierarchy Hierarchical infrastructure (N-tier) Cluster nodes have different routing roles Control the traffic between cluster and other clusters

Routing Protocols Proactive: table-driven and distance vector protocols Nodes periodically refresh the existing routing info, every node can operate with consistent and up-to-date tables Reactive (on-demand): updates the routing information only when necessary Most routing protocols are reactive Hybrid: uses both reactive and proactive protocols For example, proactive protocol between networks, reactive protocol inside of networks

Networking Constraints Mobility Due to mobility, topology of network can change frequently Nodes can be temporarily off-line or unreachable Resource constraints Energy constraints Memory and CPU constraints Bandwidth constraints Prior trust relationship Availability of Internet connection Central trust authority, base station Pre-distributed symmetric keys Pre-defined certificates and certificate revocation lists

Trust Management Trust model Node-to-node trust Node-to-central authority trust Cryptosystems Public-key cryptosystem More convenience Digital signature possibility Secret-key cryptosystem Less functionality Key distribution problem

Trust Models Web of Trust Model Hierarchical Model

Key Management Key creation Central key creation Distributed key creation Key storage Centralized Replicated storage for fault tolerance Distributed, on each node Partial key storage (shared secrets) Full key storage Key distribution Symmetric and private keys: Confidentiality, authenticity and integrity should not be violated Public keys: Integrity and authenticity should be preserved

Availability Network services should operate properly Network services should tolerate failures even when DoS attack threats Several availability attacks: Network layer: the attacker can modify the routing protocol (divert the traffic to invalid addresses) Network layer: adversary can shut down the network Session layer: adversary can remove encryption in the session-level secure channel Application layer: availability of essential services may be threatened

Physical Security Nodes are assumed to have low physical security Nodes can easily be stolen or compromised by an adversary Fewer than 1/3 of the principals at the time of network formation are corrupted or malicious Single or distributed point of failure

Identification and Authentication Only authorized nodes (subjects) can have access to data (objects) Only authorized nodes may form, destroy, join or leave groups Identification can be satisfied by: User ID-Password based authentication systems Presented adequate credentials Delegate certificates

Network Operations Link layer protections Protects confidentiality Protects authenticity Network layer protections IPSec in case of IP-based routing Confidentiality of routing info Authenticity and integrity of routing info Against impersonation attacks Against destruction and manipulation of messages Against false traffic due to hardware or network failure

Network Operations Non-repudiation of routing info Routing traffic must leave traces Management of network Must be protected from disclosure Must be protected against tampering Must be protected against modified configuration tables by adversary (for reactive routing protocols)

Key Management Security Environment-specific and efficient key management system Nodes must have made a mutual agreement on a shared secret or exchanged public keys In more dynamic environments Exchange of encryption keys may be addressed on-demand In less dynamic environments Keys are mutually agreed proactively or configured manually

Key Management Security Private keys have to be stored in the nodes confidentially Encrypted with the system key With proper hardware protection (smart cards) By distributing the key in parts to several nodes Centralized approaches are vulnerable as single point of failures

Adhoc Keying Mechanisms ID-based cryptography Master public key/secret key is generated by private-key generation service (PKG) Master keys known to everyone Arbitrary identities are public keys Identity: A1 Public key: MasterPublicKey A1 Private keys should be delivered to nodes by PKG

Adhoc Keying Mechanisms ID-based encryption schemes Setup: input a security parameter, return master public/secret keys Extract: input master secret key and identity, return the personal secret key corresponding to identity Encrypt: input master public key, the identity of the recipient and message, return ciphertext Decrypt: input master public key, ciphertext and a personal secret key, return plaintext

Adhoc Keying Mechanisms Threshold cryptography Allows operations to be split among multiple users In t-out-of-n threshold scheme, any set of t users can compute function while any set of t-1 users cannot If adversary compromises even t-1 users, he cannot perform crypto operation Honest user who needs to perform crypto operation should contact t of users Secure against Byzantine adversaries exist for t < n/2, secure against passive adversaries can support t < n

Resurrecting Duckling Security Model Two state principle (duckling) Imprintable Imprinted Imprinting principle Transition from imprintable to imprinted Mother node sends imprinting key Imprintable imprinting death Imprinted (alive)

Resurrecting Duckling Security Policy New node identifies and authenticates itself to the nearest active node (mother) in the group: imprinting A shared secret key is established between mother and the new node: bootstrapping is generally accomplished by physical contact This key provides privacy of computations between the node and the mother A node may die, returning to its imprintable mode A new imprinting by another mother is possible: reverse metempsychosis

Resurrecting Duckling Principles Death principle Transition from imprinted to imprintable (death) Death by order of the mother Death by old age after predefined time interval Death on completion of a specific transaction/job Assassination principle Assassination by attacker may be uneconomical Some suitable level of tamper resistance should be provided Broken is different from death A node can be broken by an adversary, but it cannot be made imprintable (it can be smashed, but it will not die)

Resurrecting Duckling Principles If the shared secret key is lost and beyond recovery, we may want/need to regain control of the node The manufacturer may order the device to commit suicide (escrowed seppuku) Shogun role by the manufacturer; however, this will cause centralization If the mother keeps a copy of the imprinting key, localization can be achieved Multilevel souls The same node can serve to many mothers establishing different keys Each soul in the node will have imprinted and imprintable states, souls would be functioning in parallel

Research at Oregon State University Information Security Laboratory at Oregon State University is working towards developing a distributed Kerberos system for mobile adhoc network of devices Devices with different computing power, memory (code & RAM) space, and power consumption properties Initial group formation (authentication) is accomplished by physical contact, touching (imprinting) Symmetric cryptography based hierarchical trust model Key list & Trust list data structures Nodes may join and may gracefully leave the group Ungraceful (abrupt) leaving requires new touching

Group Formation a KL a KL c Id Relation MA C Key a Itself b c Id Relation MA C Key c Itself b Child K ab c Child K ac d a Parent K ac d Child K cd KL b Id Relation MA Id Relation MA C Key KL b Itself d a Parent K ab Key C d Itself c Parent K cd

Node-to-node Key Agreement 4 a 3 e f g b 5 h c 1 d i 2 Ancestor Sets AS b ={a} AS h ={b, a} AS d ={a} AS i ={d, a}

Graceful Leave Node j wants to leave the group b a c d e j f g h i Node f generates new branch key and sends to b, b forwards new branch key to root node a, node a changes the group key and begins the group re-keying with refreshed branch keys

Abrupt Leave Node d leaves the group abruptly a e b c d j f g h i Node a generates new branch key for this branch, but since node i lost its mother, i should touch contact to any node in the group in order to re-join and re-authenticate