Netsec00 Manet Sec
Netsec00 Manet Sec
Vesa Krpijoki
Helsinki University of Technology
Telecommunications Software and Multimedia Laboratory
[email protected]
Abstract
In ad hoc networks the communicating nodes do not necessarily rely on a fixed
infrastructure, which sets new challenges for the necessary security architecture they
apply. In addition, as ad hoc networks are often designed for specific environments
and may have to operate with full availability even in difficult conditions, security
solutions applied in more traditional networks may not directly be suitable for protecting them. A short literature study over papers on ad hoc networking shows that
many of the new generation ad hoc networking proposals are not yet able to address
the security problems and they face. Environment-specific implications on the required approaches in implementing security in such dynamically changing networks
have not yet fully realized.
1 Introduction
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Ad hoc networks can be formed, merged together
or partitioned into separate networks on the fly, without necessarily relying on a fixed infrastructure to manage the operation. Nodes of ad hoc networks are often mobile, which
also implicates that they apply wireless communication to maintain the connectivity, in
which case the networks are called as mobile ad hoc networks (MANET). Mobility is not,
however, a requirement for nodes in ad hoc networks, in ad hoc networks there may exist
static and wired nodes, which may make use of services offered by fixed infrastructure.
Ad hoc networks may be very different from each other, depending on the area of application: For instance in a computer science classroom an ad hoc network could be formed
between students PDAs and the workstation of the teacher. In another scenario a group
of soldiers is operating in a hostile environment, trying to keep their presence and mission
totally unknown from the viewpoint of the enemy. The soldiers in the group work carry
wearable communication devices that are able to eavesdrop the communication between
enemy units, shut down hostile devices, divert the hostile traffic arbitrarily or impersonate
themselves as the hostile parties. As can obviously be seen, these two scenarios of adhoc networking are very different from each other in many ways: In the first scenario the
mobile devices need to work only in a safe and friendly environment where the networking conditions is predictable. Thus no special security requirements are needed. On the
other hand, in the second and rather extreme scenario the devices operate in an extremely
1
hostile and demanding environment, in which the protection of the communication and
the mere availability and operation of the network are both very vulnerable without strong
protection.
As ad hoc networking somewhat varies from the more traditional approaches, the security
aspects that are valid in the networks of the past are not fully applicable in ad hoc networks.
While the basic security requirements such as confidentiality and authenticity remain, the
ad hoc networking approach somewhat restricts the set of feasible security mechanisms to
be used, as the level of security and on the other hand performance are always somewhat
related to each other. The performance of nodes in ad hoc networks is critical, since the
amount of available power for excessive calculation and radio transmission are constrained,
as discussed e.g. in [3]. In addition, the available bandwidth and radio frequencies may be
heavily restricted and may vary rapidly. Finally, as the amount of available memory and
CPU power is typically small, the implementation of strong protection for ad hoc networks
is non-trivial.
The main objective of this paper is to give an overview of how the area of application
affects the security requirements of ad hoc networks. The focus of the discussion is in
the security of routing. From the requirements criteria for evaluating existing ad hoc networking solutions are formed. The evaluated proposals include the contemporary MANET
drafts of the IETF. Mobile IP is not discussed.
The paper is structured into six sections as follows. Section 1 introduces the reader to the
background of the topic: ad hoc networks and their special characteristics. Section 2 concentrates on giving an overview of characteristics and areas of networking that are relevant
when designing security architecture for ad hoc networks. Section 3 discusses security aspects and requirements of ad hoc networks from the viewpoint of the categories presented
in section 2. Section 4 presents security problems encountered when the traditional networking approaches are applied in ad hoc networking. Section 5 gives an overview of the
contemporary solutions for the ad hoc networking and discusses the applicability of their
security architecture. Finally, section 6 proposes future work possibilities for securing ad
hoc networks.
2 Networking
2.1 Networking Infrastructure
Networking infrastructure forms the basis for the networks on top of which the higher-level
services can be built. The core of the networking infrastructure is formed by the physical
topology and the logical structure of the network, of which the latter is implemented and
maintained with routing. As discussed in [5], there are two approaches in networking:
flat or "zero-tier" infrastructure
hierarchical, multiple- or N-tier infrastructure.
In flat networks there are no hierarchies of nodes; all nodes have equivalent roles from the
viewpoint of routing. In contrary, in hierarchical networks there are nodes that have differ2
ent roles than the others. These cluster nodes are responsible for serving one cluster of the
actual low-tier nodes by controlling the traffic between the cluster and other clusters. Finally, the logical and physical topology of the network need not directly correspond to each
other; for instance a logically hierarchical routing fabric can be formed with physically flat
network topology and vice versa.
distributed so that confidentiality, authenticity and integrity are not violated. For instance whenever symmetric keys are applied, both or all of the parties involved must
receive the key securely. In public-key cryptography the key distribution mechanism must guarantee that private keys are delivered only to authorized parties. The
distribution of public keys need not preserve confidentiality, but the integrity and
authenticity of the keys must still be ensured.
2.5 Availability
In [19], availability is defined as one of the key attributes related to the security of networks. Availability guarantees that network services operate properly and tolerate failures,
even when denial of service attacks threat the system. Availability can be broken in several layers: in the network layer the attacker can modify the routing protocol e.g. to be
able to divert the traffic to invalid addresses or shut down networks. In session security
management level the adversary may be able to unnoticeably remove encryption in the
session-level secure channel. Finally, in application level the availability of the essential
services such as key management service may be threatened.
in the higher layers, the services must be able to rely on that the lower layers maintain the
packet-forwarding services at any time. Finally, many ad hoc networking protocols are
applied in conditions where the topology must scale up and down efficiently, e.g. due to
network partitions or merges. The scalability requirements also directly affect the scalability requirements targeted to various security services such as key management. In networks
where the area of application restricts the possible size of the network, assumptions can be
made about the scalability requirements of the security services as well.
Access control is often related to the identification and authentication. The main issue in
the identification and authentication is that the parties can be confirmed to be authorized
to gain the access. In some systems, however, identification or authentication of nodes
is not required: nodes may be given e.g. delegate certificates with which the nodes can
gain access to services. In this case actual authentication mechanisms are not needed, if
the nodes are able to present adequate credentials to the access control system. In some
ad hoc networks services may be centralized, while in other networks they are applied in
a distributed manner, which may require the use of different access control mechanisms.
Moreover, the required security level in access control also affects the way the access control must be implemented. If a centralized ad hoc networking approach with low security
requirements is applied - as in the classroom example - the access control can be managed
by the server party with simple means such as user id - password scheme. In ad hoc networks that operate in more difficult conditions without any centralized resources as in the
battlefield scenario, the implementation of access control is much more difficult. Either
the access to the network, its groups and resources must be defined when the network is
formed, which is very inflexible. The other possibility is to define and use a very complex, scalable and dynamic access control protocol, which brings flexibility but is prone to
various kinds of attacks and it may even be impossible to apply properly and efficiently.
the ad hoc network their devices have formed. If the enemy can shut down the network,
the group may be separated into vulnerable units that cannot communicate with each other
or to the headquarters.
The denial of service attack has many forms: the classical way is to flood any centralized
resource so that it no longer operates correctly or crashes, but in ad hoc networks this may
not be an applicable approach due to the distribution of responsibility. Distributed denial of
service attack is a more severe threat: if the attackers have enough computing power and
bandwidth to operate with, smaller ad hoc networks can be crashed or congested rather
easily. There are however more serious threats to ad hoc networks: As discussed in e.g.
[9], compromised nodes may be able to reconfigure the routing protocol or any part of it so
that they send routing information very frequently, thus causing congestion or very rarely,
thus preventing nodes to gain new information about the changed topology of the network.
In the worst case the adversary is able to change routing protocol to operate arbitrarily or
perhaps even in the (invalid) way the attacker wants. If the compromised nodes and the
changes to the routing protocol are not detected, the consequences are severe, as from the
viewpoint of the nodes the network may seem to operate normally. This kind of invalid
operation of the network initiated by malicious nodes is called a byzantine failure.
4.3 Impersonation
Impersonation attacks form a serious security risk in all levels of ad hoc networking. If
proper authentication of parties is not supported, compromised nodes may in network layer
be able to e.g. join the network undetectably or send false routing information masqueraded as some other, trusted node. Within network management the attacker could gain
access to the configuration system as a superuser. In service level, a malicious party could
have its public key certified even without proper credentials. Thus impersonation attacks
concern all critical operations in ad hoc networks. In the classroom example, however, the
impersonation attack is not probable or even feasible. If a malicious student impersonates
himself as the teachers device, he may be able to access or destroy data that is stored in
students or teachers devices or exchanged between them. The benefit of the attack is
small: it will most likely be noticed very quickly and the information he can manipulate
or have access to is not that crucial to make the attack worthwhile. In the other example
the implications of successful impersonation is much more severe (again): a hostile node
controlled by the enemy may be able to join the ad hoc network undetectably and cause
permanent damage to other nodes or services. A malicious party may be able to masquerade itself as any of the friendly nodes and give false orders or status information to other
nodes.
Impersonation threats are mitigated by applying strong authentication mechanisms in contexts where a party has to be able to trust the origin of data it has received or stored. Most
often this means in every layer the application of digital signature or keyed fingerprints
over routing messages, configuration or status information or exchanged payload data of
the services in use. Digital signatures implemented with public-key cryptography are as
such a problematic issue within ad hoc networks, as they require an efficient and secure key
management service and relatively much computation power. Thus in many cases lighter
solutions like the use of keyed hash functions or a priori negotiated and certified keys and
session identifiers are needed. They do not, however, remove the demand for secure key
10
4.4 Disclosure
Any communication must be protected from eavesdropping, whenever confidential information is exchanged. Also critical data the nodes store must be protected from unauthorized access. In ad hoc networks such information can include almost anything e.g.
specific status details of a node, the location of nodes, private or secret keys, passwords
and -phrases and so on. Sometimes the control data is more critical information in respect
of the security than the actual exchanged data. For instance the routing directives in packet
headers such as the identity or location of the nodes can sometimes be more valuable than
the application-level messages. This applies especially in critical military applications. For
instance in the battlefield scenario the data of a "hello" packet exchanged between nodes
may not be as interesting from the viewpoint of the enemy. Instead the identities of the observed nodes - compared to the previous traffic patterns of the same nodes - or the detected
radio transmissions the nodes generate may be the information just the enemy needs to
launch a well-targeted attack. On the contrary, in the classroom example the disclosure of
exchanged or stored information is critical "only" from the viewpoint of a persons privacy.
5.2 OLSR
Optimized Link State Routing protocol (OLSR), as defined in [7], is a proactive and tabledriven protocol that applies a multi-tiered approach with multi-point relays (MPR). MPRs
allow the network to apply scoped flooding, instead of full node-to-node flooding, with
which the amount of exchanged control data can substantially be minimized. This is
achieved by propagating the link state information about only the chosen MPR nodes.
Since the MPR approach is most suitable for large and dense ad hoc networks, in which
the traffic is random and sporadic, also the OLSR protocol as such works best in these
kind of environments. The MPRs are chosen so that only nodes with one-hop symmetric (bi-directional) link to another node can provide the services. Thus in very dynamic
networks where there exists constantly a substantial amount of uni-directional links this
approach may not work properly. OLSR works in a totally distributed manner, e.g. the
MPR approach does not require the use of centralized resources. The OLSR protocol
specification does not include any actual suggestions for the preferred security architecture to be applied with the protocol. The protocol is, however, adaptable to protocols such
as the Internet MANET Encapsulation Protocol (IMEP), as it has been designed to work
totally independently of other protocols.
5.3 ODMRP
On-Demand Multicast Routing Protocol (ODMRP) is a mesh-based multicast routing protocol for ad hoc networks, specified in [10]. It applies the scoped flooding approach, in
which a subset of nodes - a forwarding group - may forward packets. The membership in
the forwarding groups are built and maintained dynamically on-demand. The protocol does
not apply source routing. ODMRP is best suited for MANETs where the topology of the
network changes rapidly and resources are constrained. ODMRP assumes bi-directional
links, which somewhat restricts the potential area of application for this proposal; ODMRP
may not be suitable for use in dynamic networks in which nodes may move rapidly and
unpredictably and have varying radio transmission power. Currently ODMRP does not define or apply any security means as such, "the work is in progress". The forwarding group
membership is controlled with the protocol itself, though.
12
The security aspects currently noted in the design of MAODV are similar to the AODV
protocol.
5.5 TBRPF
Topology Broadcast based on Reverse-Path Forwarding (TBRPF), as defined in [2], is a
pure proactive, link-state routing protocol for the ad hoc networks that can also be applied
as the proactive part in hybrid solutions. Each of the nodes of the network in TBRPF carry
state information of each link of the network, but the information propagation is optimized
by applying reverse-path forwarding instead of the costly full flooding or broadcast techniques. TBRPF operates over IPv4 in ad hoc networks and can also be applied within
hierarchical network architecture. The authors of the proposal, however, do not suggest
any specific mechanisms for securing the protocol. Finally, the protocol, just as every
other ad hoc network routing protocol, can be protected with IPSec, but this approach is
not currently officially in use within TBRPF.
6 Discussion
According to Zhou and Haas [19], the MANET routing protocols can seemingly tolerate
the rapid changes to the topology and conditions of the networks. None of these protocols, however, seems to currently note all of the necessary security aspects adequately.
Partially this is most likely due to their ongoing development. Still some drafts currently
ignore the security issues by stating that the required security means are to be determined
later. In this case one can get the impression that the security mechanisms will later be
retrofitted to the routing protocol after the protocol itself has been tested to be robust
enough. The retrofitting of the security mechanisms might, however, leave unpredictable
and undetectable vulnerabilities in the system, if the protection mechanisms are not designed concurrently with the basic protocol. Moreover, some of the discussed MANET
protocols have ignored the security issues completely.
The common concerns in ad hoc networks include the access control: there needs to exist
a method for restricting the access of foreign nodes to the network, which requires the use
of a proper authentication mechanism. Moreover, the communication between the insider
nodes in the network must be protected from attacks on confidentiality. This is especially
important in military applications, as was discussed. If the link-layer does not support a
valid encryption scheme, such mechanism must be involved in the network layer also. The
group membership is noted in all of the mentioned multicast protocols, but they do not
suggest any specific access control or authorization policy protocols.
In ad hoc networks the possibility of denial of service attacks must also be mitigated, to
ensure full availability in the network. In ad hoc networks malicious nodes may offer a
non-existing multi-hop service to redirect traffic incorrectly and cause congestion if the
node is allowed to access the network. As discussed e.g. in [6], denial of service attacks
basically threaten the operation in all types of networks and they are typically impossible to
prevent as such. With the use of redundancies, as described in [19], the advantages of such
attacks can be significantly decreased. In addition, the distribution of responsibility and
13
trust from the viewpoint of the service provisioning significantly reduces the vulnerabilities
that would exist in the network if centralized approaches were in use. In commercial
solutions the availability of services are an especially important issue, as the network may
need to scale rapidly and the credibility of the service provider is highly dependent on the
operability of the network and its services.
All security mechanisms applied in networking more or less require the use of cryptography, which on the other hand implicates a strong demand for secure and efficient key management mechanism. In ad hoc networks the role of a dependable key management service
is especially emphasized, given the constrained resources and possibly rapidly varying
conditions in which the nodes operate. Traditional and centralized approaches cannot often be applied in the environments in which ad hoc networks operate, which forces the use
of distributed services that do not rely on single resources with respect to other nodes or
communication paths. This kind of approach is defined e.g. in [19].
In all the discussed MANET proposals IP forms the basis for the protocols. Thus in a few
protocol proposals such as TBRPF IPSec is assumed to be able to provide a good enough
privacy and authentication protection mechanism so that these issues would not need to
be handled by the protocol itself. This approach has been criticized, since it produces
additional (possibly manual) configuration overhead and is more or less another form of
retrofitting security implementations to existing architectures.
Considering all the discussed aspects, they give a clarified picture of how important the protection of the ad hoc networking is. In addition, it is clear that the security aspects related to
ad hoc networks form a very complex problem fields, given the dynamic and unpredictable
nature of most ad hoc networks. On the other hand, ad hoc networks vary from each other
greatly from the viewpoint of the area of application. Some ad hoc networks may not
need security solutions other than simple encryption and username-password authentication scheme, as in the classroom example, while networks operating in highly dynamic and
hostile environment such as in the battlefield scenario demand for extremely efficient and
strong mechanisms. As the security requirements and their implications vary, a general
security architecture for ad hoc network can not be constructed. The development of secure ad hoc networking framework seems to be just starting, as all the most severe security
problems are not even fully solved in ad hoc networking proposals.
7 Acknowledgements
For comments and advice the author wishes to thank his tutor Catharina Candolin, Dr.
Helger Lipmaa and administrative assistant Heidi Pehu-Lehtonen.
References
[1] Anon. An Introduction to Role-Based Access Control. NIST ITL Bulletins, National Institute of Standards and Technology, December 1995. [referred 7.11.2000]
<http://csrc.ncsl.nist.gov/nistbul/csl95-12.txt> [in ASCII format]
14
[14] Perkins, C.
Mobile networking in the Internet.
Mobile Networks and Applications 3, 1998, p. 319-334. [referred 25.9.2000]
<http://www.baltzer.nl/monet/articlesfree/1998/3-4/mnt071.pdf> [in PDF format]
[15] Perkins, C. et al. Ad Hoc On-Demand Distance-Vector Routing (AODV). IETF
draft, 14 July 2000. [referred 25.9.2000] <http://www.ietf.org/internet-drafts/draftietf-manet-aodv-06.txt> [in ASCII format]
[16] Perkins, C. and Royer, E.
Multicast Ad Hoc On-Demand DistanceVector Routing (MAODV).
IETF draft, 11 July 2000. [referred 25.9.2000]
<http://www.ietf.org/internet-drafts/draft-ietf-manet-maodv-00.txt> [in ASCII format]
[17] Royer, E. and Toh, C.-K.
A Review of Current Routing Protocols
for Ad Hoc Mobile Wireless Networks.
1999. [referred 25.9.2000]
<http://www.ee.surrey.ac.uk/Personal/G.Aggelou/PAPERS/Adhoc_Review.ps.gz>
[in PostScript format]
[18] Wang et al.
Secure Routing Protocols:
Theory and Practice.
North Carolina State University, 2000. [referred 25.9.2000]
<http://www.cis.udel.edu/cshen/859_spring00/paper/CCR-SecureRP2.ps.gz>
[in
PostScript format]
[19] Zhou, L. and Haas, Z. Securing Ad Hoc Networks. 1999. [referred 25.9.2000]
<http://www.ee.cornell.edu/haas/Publications/network99.ps>
[in PostScript format]
16