Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen



Similar documents
Wireless Sensor Networks Chapter 14: Security in WSNs

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security in Ad Hoc Network

Securing MANET Using Diffie Hellman Digital Signature Scheme

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Security for Ad Hoc Networks. Hang Zhao

Security in Wireless Mesh Networks

Wireless Sensor Network: Challenges, Issues and Research


How To Write A Transport Layer Protocol For Wireless Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

International Journal of Advanced Research in Computer Science and Software Engineering

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Routing Protocols Security in Ah Hoc Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Introduction to Wireless Sensor Network Security

Secure Routing in Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

About the Authors Preface Acknowledgements List of Acronyms

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Cross-layer security and resilience in wireless mesh networks

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

An Overview of ZigBee Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Efficient Data Transmission For Wireless Sensor Networks

A Secure Key Management Scheme in Wireless Mesh Networks

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Intrusion Detection for Mobile Ad Hoc Networks

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Security Sensor Network. Biswajit panja

Wireless Sensor Networks: Security, Attacks and Challenges

COSC 472 Network Security

Security & Trust in Wireless Sensor Networks

Problems of Security in Ad Hoc Sensor Network

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Network Architecture and Topology

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chap. 1: Introduction

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Enhancing Base Station Security in Wireless Sensor Networks

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security for Ubiquitous and Adhoc Networks

SBSCET, Firozpur (Punjab), India

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Fast and Scalable Key Establishment in. Sensor Networks

TOPOLOGIES NETWORK SECURITY SERVICES

SPINS: Security Protocols for Sensor Networks

HANDBOOK 8 NETWORK SECURITY Version 1.0

ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Optimized Load Balancing Mechanism Using Carry Forward Distance

A Review on Zero Day Attack Safety Using Different Scenarios

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Applying Mesh Networking to Wireless Lighting Control

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

chap18.wireless Network Security

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

CS 356 Lecture 29 Wireless Security. Spring 2013

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Security Solutions for Wireless Sensor Networks

Definition. A Historical Example

Case Study for Layer 3 Authentication and Encryption

CHAPTER 1 INTRODUCTION

Energy Optimal Routing Protocol for a Wireless Data Network

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Wireless Network Security Spring 2014

LIST OF FIGURES. Figure No. Caption Page No.

Mobile Office Security Requirements for the Mobile Office

Transcription:

Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen

Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks Countermeasures Key Management Schemes SMOCK Conclusion 2

Wireless Ad-hoc Networks No infrastructure like access points Communication with other nodes only within their transmission range Nodes farther away only reachable through other nodes by multihop routing Every node forwards traffic for other nodes Self-healing due to automatic link-failover in case of sufficiently dense coverage 3

Wireless Mesh Networks Specialized Type of Ad-hoc Network (WMN) Mesh Routers Often connected to mains Moderate to high CPU power Provide router-, gateway- and other services Mostly static locations Mesh Clients Often battery powered Low CPU power and other resource constraints Mobile devices like Notebooks, PDAs, etc. 4

Backbone Configuration Consists of mesh routers only, which may provide gateway features or other services to client networks Internet Connect several conventional (infrastructure) networks WMNs are transparent to their client networks Wireless Mesh Network Conventional routing in client networks with one of the WMN routers as their next hop Corporate Network Cellphone Network 5

Client Configuration Mesh client devices only No gateways to other networks No dedicated routers One, probably very large, ad-hoc network Wireless Mesh Network 6

Hybrid Configuration Wireless Mesh Network Clients Hybrid configurations also possible Internet Combines benefits from both backbone and client configurations Wireless Mesh Network Mesh clients reachable from outside networks Corporate Network Cellphone Network 7

Security No infrastructure Nodes added, moved or removed at any time Frequent topology changes may conceal break-ins Shared medium Eavesdroping, injecting and modifying traffic easily possible Limited physical protection Mobile and small devices Devices scattered over large areas Physical compromise is more likely 8

Security No central management Routing and route discovery done by each node Cooperation and trust relationships often assumed Attackers may broadcast routing information Resource constraints Ideal targets for DoS attacks Makes countermeasures like strong cryptography difficult 9

Selective Forwarding Malicious node drops packets of specific other nodes Droping too many nodes may lead to discovery or route changes Attackers node has to be on the routing path of the nodes to be attacked May be achieved by jamming neighbouring nodes which would normaly forward the desired traffic Selective Forwarding 10

Sinkhole Attack Attract neighbouring nodes to send their data through the attackers node May be achieved by pretending, or actually serving fast and reliable links Attacker has to participate in routing Packet flow of a large area may be influenced Attackers have the opportunity to monitor or alter a large amount of traffic, disrupt services etc. Sinkhole Attack 11

Wormhole Attack Similar effects as sinkhole attack Two nodes required with great distance in between Out-of-band channel like fast, wired connection Tunnel Tunnel exploits routing race conditions to provide fast links No routing needed, only packet capturing and replaying Wormhole Attack 12

Countermeasures Prevention of many attacks by means of authentication, confidentiality and integrity, as well as non-repudiation Usage of cryptographic systems to en/decrypt and sign messages required WMN devices limited in processing power, affecting strength of deployed crypto methods Constraints of WMN devices on storage, therefore limiting amount and size of keys 13

Crypto Systems Symmetric Crypto Systems One shared key for en-/decryption Fast encryption and decryption Pairwise secure channels between n nodes require n (n 1) 2 keys One compromised node renders all keys invalid Key distribution system needed to frequently change the keys Public Key Crypto Systems Public key for encryption, private key for decryption Slower than using symmetric keys Pairwise secure channels between n nodes require n key pairs One compromised node does not affect the others If the keys are not preinstalled, certificate authorities are needed 14

SMOCK Scalable Method Of Cryptographic Key management scheme Reduce number O(n) of keys of traditional public key system to O(log n) Improves storage usage at the cost of processing power and resilience Each node uses set of b private keys out of key pool K, but no node has complete subset of another nodes keys Encryption has to be performed using all public keys corresponding to recipients key set No certificate authority, thus preinstalling keys required 15

SMOCK Design Memory Efficiency Minimize overall number of keys stored on each node priv min K + max K i V i s.t. K i K j, K i K j i j With K the number of (public) keys and K priv i at node i from the set V of deployed nodes Computational Complexity Use as few private keys within each key set as possible priv min max K i V i s.t. K i K j, K i K j i j and K M the number of private keys With M the number of memory slots available for key storage on each node Both memory efficiency and computational complexity perform best with isometric key sets 16

SMOCK Design Resilience Requirement In case of system compromises, on average C k c x, b = k c(x) with b a b x 1 k c x = a a b distinct key sets compromised a V x a, b = C(k c x,b) P C(a,b) V x a, b is the vulnerability metric, which is the percentage of compromised connections for x compromised nodes With P the upper bound of compromised connections for x compromised nodes, a = K the number of public keys and b = K priv i the number of private keys Key Allocation Several algorithms available to optimize above equations, though always trade-offs between storage and resilience exist Finally calculation of a and b for desired parameters possible 17

Secure Communication Each node calculates an ID from its distinct key set All keys are labeled with ascending numbers Let keyid i j the i-th key held by node j Concatenate the keyids keyid 1 j keyid b j Sending this ID to another node allows it for encrypting a packet using the public keys indicated by the ID destined for the corresponding node ID is sent in clear text A node intercepting an ID could not decrypt any traffic due to lack of the required private keys Changing ID leads to the original sender not being able to decrypt the message 18

Conclusion WMNs are a promising technologie due to scalability, large coverage areas and deployment without installing costly infrastructure Their ad-hoc network nature imposes high security risks Many vulnerabilities can be prevented by means of en/decryption and authentication SMOCK is a public key crypto system which allows for large networks while still providing reasonable secure channels 19

Questions Are there any questions? Thank you for your attention. 20

References I. F. Akyildiz, X.Wang, and W.Wang. Wireless mesh networks: a survey. Computer Networks, 47(4):445-487, 2005. A. El-Mousa and A. Suyyagh. Ad hoc networks security challenges. In Systems Signals and Devices (SSD), 2010 7th International Multi-Conference on, pages 1-6, 2010. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, pages 113-127, May 2003. S. Misra, I.Woungang, and S. C. Misra, editors. Guide to Wireless Ad Hoc Networks (Computer Communications and Networks) - Security in Wireless Ad Hoc Networks, pages 391-425. Springer, 2009. 21