Security and Misbehavior Handling in Wireless Ad Hoc Networks
Security and Misbehavior Handling in Wireless Ad Hoc Networks
Nitin H. Vaidya
University of Illinois at Urbana-Champaign
nhv@[Link]
[Link]
Some protocol specs have changed over time, and the slides may
not reflect the most current specifications
3
Mobile Ad Hoc Networks (MANET)
4
Mobile Ad Hoc Networks
5
Mobile Ad Hoc Networks
B
A
6
Mobile Ad Hoc Networks (MANET)
A
B
C
D
7
Why Ad Hoc Networks ?
Ease of deployment
Speed of deployment
8
Many Applications
9
Many Variations
Asymmetric Capabilities
transmission ranges and radios may differ
battery life at different nodes may differ
processing capacity may be different at different nodes
speed of movement
Asymmetric Responsibilities
only some nodes may route packets
some nodes may act as leaders of nearby nodes (e.g., cluster head)
10
Many Variations
11
Many Variations
Mobility characteristics
speed
predictability
• direction of movement
• pattern of movement
uniformity (or lack thereof) of mobility characteristics among
different nodes
12
Challenges
A B C
14
Research on Mobile Ad Hoc Networks
15
The Holy Grail
A one-size-fits-all solution
Perhaps using an adaptive/hybrid approach that can adapt
to situation at hand
Difficult problem
16
Outline
17
Unicast Routing
in
Mobile Ad Hoc Networks
18
Why is Routing in MANET different ?
Host mobility
link failure/repair due to mobility may have different
characteristics than those due to other causes
19
Unicast Routing Protocols
20
Routing Protocols
Proactive protocols
Determine routes independent of traffic pattern
Traditional link-state and distance-vector routing protocols
are proactive
Reactive protocols
Maintain routes only if needed
Hybrid protocols
21
Trade-Off
23
Routing Protocols
24
Flooding for Data Delivery
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
• Flooding completed
Z
S E
F
B
C M L
J
A G
H D
K
I N
Simplicity
34
Flooding for Data Delivery: Disadvantages
35
Flooding of Control Packets
37
Route Discovery in DSR
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
44
Route Reply in DSR
Y
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
46
Dynamic Source Routing (DSR)
47
Data Delivery in DSR
Y
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
49
Route Error (RERR)
Y
RERR [J-D] Z
S E
F
B
C M L
J
A G
H D
K
I N
Nodes hearing RERR update their route cache to remove link J-D 50
Unicast Routing Protocols
51
Outline
52
Medium Access Control Protocols
53
Medium Access Control
54
MAC: A Simple Classification
Wireless
MAC
Centralized Distributed
Guaranteed Random
or access
controlled IEEE 802.11
access
55
Hidden Terminal Problem
A B C
56
MACA Solution for Hidden Terminal Problem
[Karn90]
When node A wants to send a packet to node B,
node A first sends a Request-to-Send (RTS) to A
A B C
57
Reliability
58
A Simple Solution to Improve Reliability
A B C
59
IEEE 802.11 Wireless MAC
60
IEEE 802.11 DCF
62
IEEE 802.11
RTS = Request-to-Send
RTS
A B C D E F
RTS = Request-to-Send
RTS
A B C D E F
NAV = 10
CTS = Clear-to-Send
CTS
A B C D E F
65
IEEE 802.11
CTS = Clear-to-Send
CTS
A B C D E F
NAV = 8
66
IEEE 802.11
DATA
A B C D E F
67
IEEE 802.11
ACK
A B C D E F
68
IEEE 802.11
Reserved area
(not necessarily
circular in
practice)
ACK
A B C D E F
69
Backoff Interval
70
IEEE 802.11 DCF Example
B1 = 25 B1 = 5
wait data
data wait
B2 = 20 B2 = 15 B2 = 10
72
Since the number of nodes attempting to transmit
simultaneously may change with time, some
mechanism to manage contention is needed
73
Binary Exponential Backoff in DCF
74
Security and Misbehavior
75
Issues
76
Transport Layer
(End-to-End Communication)
77
Network Layer
78
MAC Layer
Denial-of-service attacks
79
Scope of this Tutorial
80
Outline
81
Key Management
82
Key Management
83
Certification Authority
86
Self-Organized Public Key Management
[Capkun03]
Does not rely on availability of CA
(w,Kw)PrKu
Ku Kw
87
Self-Organized Public Key Management
[Capkun03]
88
Self-Organized Public Key Management
89
Self-Organized Public Key Management
90
Self-Organized Public Key Management
92
TESLA
95
TESLA
S 96
R
TESLA
97
Outline
98
Secure Communication
99
Secure Communication
100
Secure Communication
101
Traffic Analysis
102
Mix Nodes [Chaum]
C M3
M1 B M2 E
F
A
103
Mix Nodes
C M3
M1 B M2 E
F
A
104
Mix Nodes
Node A transmits to M1
message K1(R1, K2(R2, M))
where Ki() denotes encryption using public key Ki of
Mix i, and Ri is a random number
G
D
C M3
M1 B M2 E
F
A
105
Mix Nodes
G
D
C M3
M1 B M2 E
F
A
106
Mix Nodes
G
D
C M3
M1 B M2 E
F
A
107
Mix Nodes
108
Alternative Mix Nodes
Suppose A uses M2 and M3 (not M1 and M2)
Need to take fewer hops
C M3
M1 B M2 E
F
A
109
Mix Node Selection
110
Traffic Mode Detection
111
Traffic Mode Detection
A B C D
E
Max(R1,R2) 2 * Max(R1,R2) 112
Traffic Mode Detection
A B C D
114
Traffic Mode Detection
Mode 1: A-D rate R1 E-F rate R2
Mode 2: A-D rate R2 E-F rate R1
A B D
E 115
Traffic Mode Detection
Node-level dummy packet insertion cheaper, if we can
hide link-level receiver of the packets
A B D
E 116
Traffic Mode Detection
117
Outline
118
Misbehavior at the MAC Layer
119
MAC Layer Misbehavior
Access Point
Access Point
Wireles
Wireles
ss
Wireles
Wireles channel
channel
ss
channel
channel
C D
A B
121
Some Possible Misbehaviors
122
Possible Misbehaviors:
“Impatient” Transmitters
123
“Impatient” Transmitters
B1 = 1 B1 = 1
Misbehaving Transmit Transmit
node
124
Impatient Transmitters
125
Goals [Kyasanur03]
Discourage misbehavior
Punish misbehaving nodes
126
Potential Approaches
127
Passive Observation [Kyasanur03]
(Conceptually Simplest Solution)
802.11 dictates that each host must be idle for a
certain duration between transmissions
128
Passive Observation
129
Passive Observation
Access Point
Wireless
Wireless
channel
channel
A
130
Issues
AP 1 AP 2
Wireless Wireless
Wireless
Wireless
channel channel
channel
channel
A B
131
Issues
132
Issues
133
Potential Solution:
Use long-term statistics [Kyasanur]
134
An Alternative Approach
135
An Alternative Approach
136
Modifications to 802.11
B
Sende
r
ACK(B)
DAT
CTS
S
RT
A
S
RT
S
Receive
r
R
• R provides backoff B to S in ACK
B selected from [0,CWmin ]
138
Protocol steps
139
Detecting deviations
Backoff
Sender
ACK(B)
S
RTS
Receiver
R Bobsr
Receiver counts number of idle slots Bobsr
ACK(B+P
r
ACK(B)
CTS
RTS
DATA
S
Receiv
)
er
Bobsr
R
When Bobsr < α B, penalty P added
P proportional to α B– Bobsr
142
Diagnosing Misbehavior
143
Summary of Performance Results
144
Variations – Multiple Observers
145
Other Approaches
Game theory
Incentive-based mechanisms
146
MAC Selfishness: Game-Theoretic Approach
147
MAC: Selfishness
Others have also attempted game-theoretic solutions
[Konorski,Cagalj05]
148
Incentive-Based Mechanisms [Zhong02]
149
Outline
150
Network Layer Misbehavior
151
Network Layer Misbehavior
152
Drop/Corrupt/Misroute
153
Watchdog Approach [Marti]
B sends packet to C
A B C D E
154
Watchdog Approach [Marti]
C forwards packet to D
A B C D E
B overhears C
Forwarding the packet
155
Watchdog Approach:
Buffering & Failure Detection
Forwarding by C may not be immediate: B must
buffer packets for some time, and compare them with
overheard packets
• Buffered packet can be removed on a match
If packet stays in buffer at B too long, a “failure tally”
for node C is incremented
156
Impact of Collisions
C forwards packet to D
A B C D E
157
Reliability of Reception Not Known
C forwards packet to D
A B C D E
158
Channel Variations May Cause False Detection
A B C D E
159
Malicious Reporting
160
Collusion
A B C D E
A B C D E
F
162
Directional Transmissions
A B C D E
B cannot hear
C’s transmission to D
163
Watchdog + Pathrater [Marti]
165
Hosts Bearing Grudges:
CONFIDANT Protocol [Buchegger]
Motivated by “The Selfish Gene” by Dawkins (1976)
168
Hosts Bearing Grudges: Summary
Reputation-based scheme
169
Exploiting Path Redundancy [Xue04]
170
Exploiting Path Redundancy
E
F G
A B C D
171
Exploiting Path Redundancy
E
F G
A B C D
172
Best-Effort Fault Tolerant Routing (BFTR)
– Modified DSR [Xue04]
The target of a route discovery is required to send
multiple route replies (RREP)
(2) The source uses this route until its delivery ratio falls
below a threshold (making the route infeasible)
174
Information Dispersal [Rabin89]
S1 = (b1, …, bm)
S2 = (bm+1, …, b2m)
…
175
Information Dispersal
where cik = ai . Sk
176
Information Dispersal [Rabin89]
177
Information Dispersal to Tolerate Misbehavior
[Papadimitratos03]
Choose n node-disjoint paths to send the n pieces of
information
179
Node Insertion
Y
Z
[S,E]
S E
F [S,E,P,Q,F]
B
C M L
J
A G
H D
K
I N
180
Node Deletion
Y
Z
S E
F
B
C M L
J
A G
H D
[S,C,G] K
I [S,G,K] N
181
Route Tampering Attack
Solution:
182
Ariadne [Hu]: Detecting Route Tampering
183
Ariadne [Hu]: Detecting Route Tampering
Let RREQ’ denote the RREQ that would have been sent in
unmodified DSR
184
Ariadne
Node C forwards to the next node towards the source, but also
appends its key Kc to the message
One key used per route discovery (TESLA mechanism).
S can verify authenticity of this key
Alternate mechanisms: Use pair-wise shared secret keys, or
signatures using authentic public keys
Node S receives all the keys, and also the m-list in RREP
S can verify that all m values in the m-list are accurate, in addition
to the HMAC computed by D
188
Wormhole Attack [Hu]
E
F X
A B C D
190
Wormhole Attack [Hu]
E
F X
A B C D
191
Wormhole Attack [Hu]
E
F X
A B C D
192
Wormhole Attack [Hu]
E
F X
A B C D
193
Wormhole Attack: Issues
E
F X
A B C D
194
Wormhole Attack: Issues
E
F X
A B C D
195
Wormhole Attack: Issues
E
F X
A B C D
196
Wormhole Attack: Issues
E
F X
A B C D
197
Timing Issue
E
F X
A B C D
198
Detected Attack
200
Geographical Leashes [Hu]
201
Temporal Leashes
202
Wormhole Attack: Summary
203
Outline
204
Anomaly Detection
205
Anomaly Detection
206
Anomaly Detection in Ad Hoc Networks
[Zhang00]
Anomaly detection may also be useful at other layers,
particularly, network layer
208
Conclusions
209
Conclusion
211
Some Relevant Conferences/Workshops
212
Thanks!
[Link]/wireless
nhv@[Link]
213
References
[Bharghavan94] MACAW: A Media Access Protocol for Wireless LANs, Vaduvur
Bharghavan, Alan Demers, Scott Shenker, Lixia Zhang, SIGCOMM, 1994
[Buchegger] S. Buchegger and J. Le Boudec, Nodes Bearing Grudges: Towards
Routing, Security, Fairness, and Robustness in Mobile Ad Hoc Networks,' in
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and
Network-based Processing, IEEE Computer Society, January 2002.
[Cagalj05] M. Cagalj, S. Ganeriwal, I. Aad, and J. P. Hubaux : On Selfish
Behavior in CSMA/CA Ad Hoc Networks, to appear at Infocom 20
[Capkun93] S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public-
Key Management for Mobile Ad Hoc Networks“ IEEE Transactions on Mobile
Computing, Vol. 2, Nr. 1 (January - March 2003)
[Chandra00] A. Chandra, V. Gummalla, and J. O. Limb, "Wireless Medium
Access Control Protocols," IEEE Commun. Surveys [online], available at:
[Link] 2nd Quarter 2000.
[Chandra00] A. Chandra, V. Gummalla, and J. O. Limb, "Wireless Medium
Access Control Protocols," IEEE Commun. Surveys [online], available at:
[Link] 2nd Quarter 2000.
[Chaum] D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms", Communications of the ACM, 1981.
[IEEE 802.11] IEEE 802.11 Specification, IEEE
214
References
[Hu02] Y. Hu, A. Perrig, and D. Johnson, ``Ariadne: A secure on-demand routing
protocol for ad hoc networks,'' in The 8th ACM International Conference on
Mobile Computing and Networking, MobiCom 2002, pp.~12--23, September
2002.
[Hu03] Y.-C. Hu, A. Perrig, and D. B. Johnson, ``Packet leashes: A defense
against wormhole attacks in wireless networks,'' in Proceedings of IEEE
INFOCOM'03, (San Francisco, CA), April 2003.
[Jiang04] S. Jiang, N. H. Vaidya and W. Zhao, A Mix Route Algorithm for Mix-
Net in Wireless Ad Hoc Networks, IEEE International Conference on Mobile Ad-
hoc and Sensor Systems (MASS), October 2004.
[Jiang01] S. Jiang, N. H. Vaidya, W. Zhao, Preventing traffic analysis in packet
radio networks, DISCEX 2001.
[Jiang05] S. Jiang, N. H. Vaidya, W. Zhao, in preparation, 2005
[Johnson] David B. Johnson and David A. Maltz. Protocols for Adaptive Wireless
and Mobile Networking, IEEE Personal Communications, 3(1):34-42, February
1996.
[Karn90] MACA - A New Channel Access Method for Packet Radio. Appeared in
the proceedings of the 9th ARRL Computer Networking Conference, London,
Ontario, Canada, 1990
[Konorski] J. Konorski, Multiple access in ad-hoc wireless LANs with
noncooperative stations, NETWORKING 2002
215
References
216
References
217