Advanced Networking & Security
Advanced Networking & Security
1. Introduction
2. Literature Review
2.1 - Ad Hoc Security overview
Recent literature suggests that security is not typically examined when building an ad hoc
network. Consequently it has become a key concern to provide protected communication between
nodes. Different mechanisms can be employed to provide the necessary security requirements,
commonly authentication, access control and digital signatures (Mlandenovic and Jovanovic,
2012). Alternatively, preventative methods such as encryption, symmetric and asymmetric, can
improve the integrity of data during its transmission on an ad hoc network. Threshold encryption
can hide data by dividing it in to smaller parts (Wu, Chen, Wu and Cardei, 2006). With this in
mind, understanding the types of attacks that can be performed and what security measures can be
implemented will be key in building an ad hoc network that ensures confidentiality, reliability and
integrity of user data.
The threat model for ad hoc networks is not characteristic to ad hoc, as they can also be
performed on wired networks. They can include routing, internal and external threats (Derveloy,
2012). This helps to further understand the requirements of ad hoc security, as known preventative
measures can be applied.
Research has suggested that despite the aforementioned mechanisms, ad hoc ease of
establishment and use is also its biggest disadvantage regarding security. There are many attacks
available, including routing protocols and nodes in routing process (Mlandenovic and Jovanovic,
2012).
Evidence suggests that ad hoc networks are reliant on the resources available in each node.
As mobile devices, energy is often stored in batteries which can be drained on the maintenance of
the network, excess routing and the transfer of information. Knowing this, any attack on the
network is an attack on its resources (Djenouri, Khelladi and Badache, 2005).
‘Active attacks’ are attacks that cause energy expenditure to remove the threat of attacks,
prevent anomalies in standard network (external attack) operation or requires the a node that’s
disturbing work which endangers the network to use energy to attack the rest of the network
(internal attack). Active attacks can change, destroy or generate data that’s transferred through the
network, disturbing normal node operation. External attacks can be protected through typical
mechanisms such as firewalls, application security and encryption. Internal attacks start through
authorised nodes that have been compromised (Mlandenovic and Jovanovic).
Similarly, ‘passive attacks’ are attacks that do not require the expenditure of energy of nodes
on a network. Passive external and internal attacks do not disturb the network, rather unauthorized
monitoring of data without changing it by targeting the data link and physical layers. These attacks
can be prevented through encryption and protective network protocols (Sanzgiri et al, 2002).
Understanding how passive and active attacks disturb ad hoc networks will assist in building
a simulation and how they can impact real-world operation. For example, if a vehicle is subject to
a passive attack, information such as common travel routes and confidential phonecalls can be
gathered which can be used to gather further information on a victim for more malicious attacks,
or in an attempt to gain a ransom.
When it comes to the confidentiality of data with regards to routing threats, the primary threat
is towards the “privacy of routing data itself”. Should routing data be compromised, further
information can be gathered such as the network topology or geographical location, leading to
additional threats.
Integrity of such data relies on the networks routing information accuracy. Potential attacks,
as noted in 2.1 can include altering existing routing data; or including new, yet incorrect routing
information.
Further to this, the availability of ad hoc networks refers to the nodes having on-demand
access to routing information at all times. Routing operations and security protocols should not
interrupt or interfere with nodes obtaining data.
P. W. Yau and C. J. Mitchell finally discuss the enforcement of accountability of network
nodes, should the security protocols be unable to prevent an attack, it should be able to detect it.
With this in mind, actions should be logged so allow appropriate reactionary action to be taken.
With this in mind, when creating the simulation, it should provide information on the origin
of the infection and how it has spreading. Whilst the simulation will lack the capability to take
reactionary action, preventative actions can be prepared in advance for a real-world attack - such
as disconnecting devices that are not yet under attack to continue operating.
These are active attacks that change, inserts or deletes data in an unauthorized fashion,
represented to a node as legitimate. Research shows that most ad hoc routing protocols use a ‘hop
counter’ parameter to determine the shortest route to a target, allowing malicious code to set false
hop counts or false route sequence. By redirecting network traffic, a Denial of Service attack can
be performed through communication delay or energy waste.
The above screenshot (Sanzgiri et al, 2002) shows a malicious node [1] that can send
messages to other nodes on the network. By claiming the shortest route between [c] and [d] is
fastest by passing through [1] rather than [b], [1] is able to take over the session and create
communication delay and energy expenditure.
3. NetLogo Implementation
The NetLogo design is intended to simulate a virus spreading across the network. This should
include nodes that can become immune from infection, infected, not infected and offline. The
simulation should demonstrate a denial of service attack, as it infects each node and provides a
time until recovery as well as immunity from an attack.
It has been implemented to display a small-medium sized ad-hoc network, with multiple
devices linked to each other. Using a spatially clustered network, the simulation is capable of
linking nodes that the infection can spread across as shown in the below screenshot.
The design displays nodes, which nodes are not infected, infected and immune. The infection
spreads to connected devices and are on a timer before they become immune. Further iterations of
the design will display data travelling across the network, which can provide a simulation of a
modification attack - which this simulation is loosely based on.