Securing Ad Hoc Networks

Published on May 2016 | Categories: Types, Creative Writing, Novels | Downloads: 101 | Comments: 0 | Views: 808
of 16
Download PDF   Embed   Report

Comments

Content

Secure Ad-Hoc Network
Eunjin Jung [email protected]

1

What is Ad-Hoc Network?
• Networks with no fixed infrastructure • Mobile nodes : communicate within radio-range directly or through routers • Node mobility implies frequent change in network topology. • Rapidly deployed networks • Relatively low cost
2

Challenges in Ad-Hoc Network
• Mobility
– Restricted computing resource – Restricted power resource – Unreliable communication

• Ad-Hoc
– Transient states – No trustworthy third party – Often security protocol integrated with others
3

Security in Ad-Hoc Network
• Availability
– Sleep Deprivation Torture
• Power consumption is worse than computing or network resource consumption, because the device cannot recover as soon as the attack finishes

– Jamming
• Spectrum Spread Frequency Hopping

4

Security in Ad-Hoc Network
• Confidentiality
– Easier to passively eavesdrop – Cannot rely on expensive cryptosystem – Symmetric key cryptography is used – Small key, frequent update vs. large key, intermittent update

5

Security in Ad-Hoc Network
• Authorization
– Network resource
• Inherently vulnerable to bandwidth stealing • Should reject routing unauthorized packet

– Transient states
• Security associations between principals are transient • Static authorization policy is unfeasible
6

Security in Ad-Hoc Network
• Authentication
– Cannot rely on central server – Neither on public key cryptography – Should be adaptive to transient authorization policy – Should be swift to renew symmetric key – Pre-computed certificate – Threshold cryptography
7

Security in Ad-Hoc Network
• Integrity
– Similar to any communication – Use traditional solution based on symmetric key

• Non-Repudiation
– Based on public/private key cryptography – Hard to achieve with limited computing resource – Content with certificates
8

Challenges
 Use of wireless links leads ad hoc networks susceptible to link attacks  Relatively poor protection, as in battlefields  So for high survivability, distributed architecture needed.  Dynamic network topology :
ROUTING

 Scalable security mechanisms
9

Secure Routing
• Basic Assumptions
– The underlying data link layer provides reliable transmission on a link basis – Links are bidirectional – A one-to-one mapping between Medium Access Control and IP address exists – each transmission is received by all neighbors, which are assumed to operate in promiscuous (random) mode. 10

Key Management Service
• Primary tier of servers • Service has one private/public key pair • Each server has its own private/public key pair • Each server giving one share of service private key • The private key can also be changed periodically
11

Public key distribution for Self-Organizing Systems
• Certificates stored and distributed by users
– If A believes that given public key is indeed B’s, A issues public key certificate to B

• Construction of Trust Graphs • Merging graphs to find path from C to D, if C wants certificate of D • Efficient Shortcut Hunter algorithm
12

Future scope
• Use of smart cards for tamperresistant information storage • Dynamic routing information storage still a problem • Only node contributing to the benefit of community allowed to use network

13

Conclusions
• Ad Hoc networks pose an interesting problem in networking with dynamic routing and highly insecure working environment • Need of Secure, Scalable, Reliable and Efficient algorithms for Key management and Routing
14

References
• Securing Ad Hoc Networks, Lidong Zhou (Department of Computer Science)Zygmunt J. Haas (School of Electrical Engineering), Cornell University Ithaca

15

16

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close