• Aucun résultat trouvé

Security in wireless ad hoc networks

N/A
N/A
Protected

Academic year: 2022

Partager "Security in wireless ad hoc networks"

Copied!
33
0
0

Texte intégral

(1)

Security in Wireless Ad hoc Networks

CMS’03

October 2, 2003

Refik Molva

Institut EURECOM molva@eurecom.fr

(2)

Mobile Ad Hoc Networks (MANET)

• Collection of wireless mobile hosts forming a temporary network

• No fixed network infrastructure

• No (or limited) organization

• Military and Emergency

• Sensor Networks

• Civilian applications, ubiquitous computing

(3)

Trust in MANET

• Managed environment

A-priori trust

Entity authentication correct operation But:

requirement for authentication infrastructure

• Open environment

No a-priori trust

authentication does not guarantee correct operation

New security paradigm

(4)

Node Misbehavior

Selfish Nodes

Do not cooperate

Priority: battery saving

No intentional damage to other nodes.

Exposure:

passive denial of service

black hole

idle status

Malicious Nodes

Goal: damage to other nodes

Battery saving is not a priority

Exposure:

active attacks

denial of service

traffic subversion

attacks exploiting the security

mechanism

(5)

MANET Requirements

Wireless & Mobile

Limited Energy

Lack of physical security

Ad Hoc

No(or limited) infrastructure

(Lack of organization)

• Cooperation Enforcement

• Secure Routing

• Key management

(6)

Cooperation Enforcement in MANET

• Routing and Packet Forwarding cost energy.

• Selfish node saves energy for itself

• Without any incentive for cooperation network performance can be severely degraded.

[Michiardi, Molva EW’02]

(7)

Cooperation enforcement mechanisms

Token-based [Yang,Meng,Lu]

Nuglets [Buttyan,Hubaux]

SPRITE [Zhong, Chen, Yang]

CONFIDANT[Buchegger,Le Boudec]

CORE [Michiardi,Molva]

Beta-Reputation [Josang,Ismail]

Reputation-based

Threshold cryptography

Micro-payment

(8)

CORE

a

b

c d

E f

g h

Packet forwarding Source Node: g

Destination Node: f

Route: <g,b,d,E,f> Reputation(b)

!

Reputation(d)

!

Reputation(E)

"

Packet forwarding Source Node: a

Destination Node: f Route: <a,E,f>

Reputation(E)

"

(9)

Cooperation Enforcement Evaluation with Game Theory

Cooperative GT

Study the size (k) of a coalition of cooperating nodes

Nash Equilibrium → lower bound on k

Non-cooperative GT

Utility function with pricing

Pricing used to guide the operating point (i.e. maximum of utility function) to a fair position

ri : dynamic reputation of node ni evaluated by her neighbors

=

+

=

j y j yi i

r i i yi

i u k

U σ

σ β

α :

share relative

: function

utility ( ) ( ) ( )

) , , , ,

, (

) ,

(bi bj f Eself ER EPF bi bj ri

ui =

[Michiardi,Molva,CMS’02, WiOpt’03] [Srinivasan,et al.,INFOCOM’03]

(10)

Non-cooperative GT

with pricing

(11)

Secure Routing - Vulnerabilities

• Modification

• Impersonation

• Fabrication

• Wormhole attack

• Lack of cooperation

(12)

Secure Routing - Objectives

• Authentication (Integrity) of routing information

• Entity authentication

Source

Destination

Intermediate node

• Correct behavior (of algorithm, if any)

• Asymmetric vs. Symmetric Crypto

• Pro-active vs. Reactive routing protocols

(13)

Routing in MANET

• Reactive (on-demand)

Dynamic Source Routing (DSR)

Ad Hoc On-demand Distance Vector (AODV)

• Pro-active

Destination Sequenced Distance Vector (DSDV) Optimized Link State Routing (OLSR)

• Hybrid

Zone Routing Protocol (ZRP)

Distributed Dynamic Routing (DDR)

• Location-based

Location-Aided Routing (LAR)

(14)

ARIADNE

[Hu, et al.]

On-demand Routing Protocol DSR

ksd: shared secret known by (src, dst)

ti=hn-i(secret): TESLA key of a node valid for time interval Ti disclosing ti+1 in Ti+1 authenticates the node

ti+1

MACti RREQ s, d, MACksd

RREQ s, d,.., a,

RREQ s, d, . . . .

src a dst

RREQ s, d, . . . .

RREP s, d,…,a,…MACksd

RREP s, d,…,a,…,

RREP s, d,…,a,… MACti,…., MACksd,…., ti+1

RREP s, d,..., a,...

Prerequisite: distribution of authenticated TESLA keys (hn(secret))

(15)

Other Secure Routing Proposals for MANET

• Secure Routing Protocol [Papadimitriou, Haas]

security associations between source end destination only

• ARAN [Dahill, et al.]

PK certificates for IP @

• SEAD [HU, et al.]

proactive routing authenticated hash chains

• TESLA with instant key disclosure (TIK)

can cope with wormhole attack

(16)

Secure Routing Summary

– No new requirement other than self- organized key management

– All solutions rely on some key set-up prior to secure routing operation

– Contradiction: long-lived security

associations in self-organized MANET

(17)

Key Management Requirements

• Secure routing

• Basic security services

Authentication Confidentiality Integrity

Non-repudiation

• Symmetric or Asymmetric Keys

(18)

Key Management Challenges

Lack of (or limited)

– Security infrastructure

Key servers (KDC, CA, RA)

– Organization (a priori trust)

p2p

Authentication is not sufficient to build trust

(19)

Key Management Objectives

• Bootstrapping from scratch

• Fully distributed

• Minimum dependency

(20)

Key Management Approaches

• Based on symmetric crypto

• (ID, PK) binding

– PK Certificate = (ID,PK)CA

Self-organized CA

Web of trust(PGP)

– No certificate

Crypto-based IDs: ID = h(PK)

ID-based Crypto: PK = f(ID)

• Context-dependent authentication

– location-limited channels – Shared passwords

(21)

Key Management Based on Symmetric Cryptography

Secure Pebblenets [Basagni et al.]

• cluster formation algorithm

Cluster Head Cluster Member

KH

KG= group key, well known

KH= hello key (derived from KG), used for cluster head selection

KB

KB= inter cluster key, used for traffic encryption key generation

KTEK KTEK KTEK

KTEK= used for traffic confidentiality

Assumption: no malicious nodes

(22)

(ID, PK) binding

Self-organized CA

[Zhou, Haas] [Kong, et al.] [Yi, Kravets] [Lehane, et al.]

Based on threshold cryptography

PROs: distributed, self-organized

CONs: share distribution during bootstrap phase, network density, Sybil attack

[cert(PKi)]SK1

[cert(PKi)]SKi

[cert(PKi)]SK2

CERT(PKi)SK

[cert(PKi)]SK1 [cert(PKi)]SK2

[cert(PKi)]Ski

Verification of CERT(PKi)SK by any node using well known PK

PKi

(23)

(ID, PK) binding

Web of Trust (PGP)

[Hubaux, Buttyan, Capkun]

No CA

Alice → Bob and Bob → Eve ⇒ Alice → Eve

Merging of certificate repositories

PROs: no centralized TTP

CONs: initialization, storage, transitivity of trust

(24)

(ID, PK) binding

Crypto-based ID

• SPKI [Rivest]

• Statistically Unique Cryptographically Verifiable IDs [O’Shea, Roe] [Montenegro, Castellucia]

IPv6 @ = NW Prefix | h(PK)

• DSR using SUCV-based IP addresses

[Bobba, et al]

PROs: no certificates, no CA

CONs: generation of bogus IDs

(25)

(ID, PK) binding

ID-based Crypto

[Halili, Katz, Arbaugh]

ID-based

PK = h(ID)

SK computed by TTP

Threshold Crypto to distribute TTP

PROs: no certificates, no centralized server CONs: distribution of initial shares

[Boneh, Franklin, CRYPTO 2001]

(26)

Context-dependent Authentication

Password Authenticated Key Exchange

[Asokan, Ginzborg]

HyperCube Protocol (Diffie-Hellman)

PROs: self-organized, fully distributed CONs: shared password

1: K12=gX1 X2 mod p

1: K34=gX3X4 mod p

2: K1234=gK12 K34 mod p 2: K1234=gK12 K34 mod p

1 2

3 4

(27)

Context-dependent Authentication

Secure channel

• [Balfanz, et al.] establish pairwise security association based on vicinity of devices

• [Capkun, et al.] secure channel + web of trust

• PROs: self-organized, fully distributed

• CONs: reliance on secure side channel

(28)

Layer 2 vs MANET Security

• IEEE 802.11 and Bluetooth

– weaknesses

– secure extensions to wireline networks

• Layer 2 mechanisms in MANET

– managed environments: L2 sufficient if node integrity is guaranteed (tamper- proof HW)

– open environments (no a priori trust): L2 cannot cover higher layer (3,4, ..)

security

(29)

State of the art - Summary

• Specific requirements

– Cooperation enforcement

– Bootstrapping security associations

• Solutions yet to come . . .

• Interesting applications of cryptography

• Some untruths and non-sense

(30)

Main Flaw

• Security requirements in MANET are stronger than in “classical” networks.

• MANET networking still is a research topic

• Security retrofitted as add-on mechanisms as if network technology was established.

(31)

Right Approach

Address security at early stages of protocol design: i.e. Routing Protocol dealing with

Routing+Cooperation+Key Management

Old model based on verification of credentials and authentication not suitable, identities are

meaningless

Further develop & integrate new concepts

A posteriori trust (based on observation, reputation, imprinting)

Partial assurance

Substitute infrastructure with context information (location, physical distance, history)

. . . . Others to be invented

(32)

Conclusion

• Wireless Ad Hoc Security still in its infancy

– Lack of integrated approach

– Looking for suitable new paradigms – Partial coverage (privacy, intrusion

detection, physical attacks, etc.)

⇒ Room for creativity

(33)

THANK YOU

Références

Documents relatifs

In a network running a link state routing protocol, the number of hops between any random source and destination increases when the neighborhood size decreases, this way augmenting

In our solution, the admission control of QoS flows having bandwidth requirements takes into account the interferences i.e. a flow will be accepted only if the

Second, the parent node sends all the received data and MACs to the grandparent node and also a Parent-MAC for the calculated aggregation value over the received data

In the basic DCF scheme in IEEE 802.11 for ad hoc networks, the contention window CW is reset to its min- imum value CWmin after each successful transmission and doubled when

Each one checks periodically its radio link used to communicate with all mobile routers that are in its range, using the rule (2) defined in section II, if

Para ello se propone la distribución a través de esta entidad, que en nuestro entorno podría ser el Ayuntamiento o la cámara de Comercio e In- dustria, de una lista de los

For the interaction between the Ana4 system in the Linux kernel and the MagAntA routing daemon in user space, we make use of a new version of Ana4 [233], developed at DTL, in which

The previous paragraphs show that because of partition merging, several clusterheads may be located in the same partition. As already stated, KCMBC does not implement the detection