BISS: Building secure routing out of an Incomplete Set of Security associations

Size: px
Start display at page:

Download "BISS: Building secure routing out of an Incomplete Set of Security associations"

Transcription

1 BISS: Building secure routing out of an Incomplete Set of Security associations Srdjan Čapkun and Jean-Pierre Hubaux Secure routing in ad hoc networks - Common assumptions for secure routing: - a network controlled by a central authority - nodes or the authority generate keys - the authority controls network security settings and membership - legitimate nodes can authenticate each others messages - All pairs of nodes share secret keys, know each others public or TESLA keys or can authenticate each others messages. - Routes are established through nodes which can be authenticated (and trusted) by the sender and the receiver. i j 2

2 Secure routing and key management in ad hoc networks We study two related problems: - Devising a key management/key establishment scheme that enables an efficient and dependable node, message authentication and other security features. - Proposing a secure routing protocol that can efficiently work with the proposed key management/key establishment schemes. 3 Security associations - Two nodes have established a security association if - the nodes share a secret key - the nodes hold each others authentic public or TESLA keys - In a broader sense, we assume that two nodes have established a security association if the nodes can authenticate each others messages 4

3 Secure routing requirements and assumptions - Required: Security associations established between all pairs of nodes prior to routing protocol execution - The most stringent assumption: Routes are established through nodes with which a source and the destination have security associations i m j Secure routing proposals - Securing Ad Hoc Routing Protocols, Zappata, Asokan, WiSe, Ariadne, Hu, Perrig, Johnson, MobiCom Secure Routing for Ad Hoc Networks, Papadimitratos, Haas CNDS, A Secure Routing Protocol for Ad Hoc Networks, Sanzgiri et al. ICNP, SEAD, Hu, Perrig, Johnson, WMCSA Solutions for key management and key establishment proposed so far Providing. Robust and Ubiquitous Security Support for MANETs (threshold cryptography, cooperation) UCLA: Kong et al., ICNP 200, TON 2002 Key Agreement in Ad Hoc Networks (shared password) Asokan and Ginzboorg, Computer Communications 2000 Securing Ad Hoc Networks (999) (threshold cryptography, servers) Cornell: Zhou and Haas, IEEE Network 999 Ariadne (Key distribution with on-line servers) Hu et al., Mobicom 2002 Self-organized Public-Key Management for Mobile Ad Hoc Networks (certificate chains) EPFL: Capkun, Buttyan, Hubaux, TMC 2003 SUCV (Montenegro and Castelluccia) NDSS 2002 CAM (O'Shea and Roe) ACM Computer Communications Review 200 Mobility Helps Peer-to-Peer Security EPFL: Capkun, Hubaux, Buttyan MobiHoc 2003 (mobility based approach) A key management scheme for distributed sensor networks Eschenauer, Gligor, ACM CCS 2003 Random Key Predistribution Schemes for Sensor Networks Chan, Perrig, Song, IEEE Symposium on Security and Privacy 2003 (random key predistribution) 6

4 Routing security interdependence Routing can not work until security associations are set up. Security associations can not be set up via multi-hop routes because routing does not work i j Existing solutions: - Preloading keys into nodes (probabilistic or deterministic) - On-line authentication servers - The establishment of security associations by using mobility - CAM, SUCV 7 Incomplete set of security associations - Key management/key establishment schemes do not necessarily result in a complete set of security associations (every node does not establish security associations with all other nodes in the network, but only with a fraction) Solutions based on - Threshold cryptography - Mobility - User involvement - Probabilistic pre-distribution may result with an incomplete set of security associations U Additional causes of an incomplete set of security associations: Unavailability of servers Mobility Re-keying 8

5 Mobility helps security of routing - Each node holds a certificate that bind its id with its public key, signed by the CA A σ PuKCA { A, PuK A } σ PuKCA { B, PuK B } B Certificate that binds B s Public key with his id, issued and signed by the central authority Wireless channel - No integrity - No confidentiality 9 Routing in an incomplete set of security associations Direct route authentication (Ariadne) Authenticate U, V and T I RREQ RREPLY, MAC(V,I),MAC(U,I) U RREQ, MAC(U,T) V RREPLY, MAC(V,I) RREQ, MAC(U,T), MAC(V,T) RREPLY T Authenticate I, U and V Both the initiator and the target authenticate all the nodes on the route directly through previously established security associations. Here, the security associations are established through TESLA keys which are distributed via a key distribution protocol 0

6 Routing in an incomplete set of security associations Indirect route authentication (BISS) Authenticate U, V and T Establish security associations with U, V and T I RREQ RREPLY, CERT(T)(V)(U) U RREQ, MAC(U,T) V RREPLY, CERT(T)(V) RREQ, MAC(U,T), MAC(V,T) RREPLY, CERT(T) T Authenticate I, U and V The target authenticates the nodes directly through MACs, while the initiator authenticates the nodes indirectly through certificate exchange (CERTs). BISS security Due to its similarity with ARIADNE, BISS maintains the same security level as ARIADNE BISS protects from - External attacks (malicious nodes) - passive (strong encryption). - active (mutual authentication). - Single compromised node. But does not prevent all attacks from - Multiple Compromised nodes - Single compromised and multiple malicious nodes (controlled by the same attacker) 2

7 BISS performance analysis Secure routing capability c θ s c = θ Secure routing length ratio r Fraction of pairs of nodes between which there exists a secure route. Fraction of pairs of nodes between which there exists a route. r = U,V S d(u,v) s d(u,v) S Length of shortest secure route between U and V. Length of shortest route between U and V. Set of all pairs of nodes between which there exists a route and a secure route. 3 Simulation scenario Both capability c and length ratio r depend on: Deployment area dimensions dxd. Node density λ. Power range R. Percentage p of security associations. Simulation parameters: d = 000m. λ = (00, 50 and 200), uniformly distributed. R = 50m. We will observe: c and r as a function of p (randomly distributed) (confidence. Int. of 95%) 4

8 Direct route authentication vs. BISS secure routing capability secure routing capability c percentage of security associations p secure routing capability c percentage of security associations p n = 00 n = 50 n = 200 n = 00 n = 50 n = 200 Direct route authentication BISS 5 Direct route authentication vs. BISS secure routing length ratio secure routing length ratio r percentage of security associations p n = 00 n = 50 n = 200 secure routing length ratio r percentage of security associations p n = 00 n = 50 n = 200 Direct route authentication BISS 6

9 Critical density p= p= p= p= p=0.8 p= node density λ BISS secure routing capability as a function of λ 7 BISS performance discussion - BISS enables secure routing in networks where only 40% security associations are established. - The establishment of 40% of security associations with a Mobility based approach (Capkun, Hubaux, Buttyan, MobiHoc 2003), for 400 nodes/km 2 with an average speed of 2.5m/s, and the power range of 50 m and random waypoint takes around 7 min. - Furthermore, with BISS, the more the nodes are able to route, more security associations will be established (BISS helps to establish new security associations) - Jointly, BISS and Mobility based establishment of security associations turn security-routing dependency into a virtues circle of efficient routing and fast establishment of security associations. - BISS does not add to the communication overhead 8

10 Conclusion Conclusion and future work An incomplete set of security associations is a consequence of the dynamic nature of ad hoc networks Secure routing is possible even if only a fraction of pairs of nodes have security associations established between them Security of routing with an incomplete set of security associations is not reduced BISS protocol enables routing in networks with an incomplete set of security associations and helps with establishing new security associations BISS turns a routing security interdependence into a virtuous circle Current/future work Simulate the pace at which BISS helps to establish new security associations Proposing the implementation of BISS with only symmetric crypto (TESLA) Investigating other secure routing protocols in networks with an incomplete set of security associations 9

Mohammad Hossein Manshaei

Mohammad Hossein Manshaei Mohammad Hossein Manshaei manshaei@gmail.com Instructor: Mohammad Hossein Manshaei Course web page available at IUT Web Course (http://ivut.iut.ac.ir/bounce.php?course=765) Slides Ebook Miniprojects Any

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

Chapter 4: Naming and addressing

Chapter 4: Naming and addressing Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ attacks against naming and addressing: - address stealing - Sybil attack - node replication attack; protection mechanisms: - Cryptographically

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure

More information

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness Sonja Buchegger IBM Research, Zurich Research Laboratory CH-8803 Rüschlikon, Switzerland sob@zurich.ibm.com

More information

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University On-Demand vs. Proactive Routing Security Concerns On-Demand Source Authentication Caching presents

More information

The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks Patrick Traynor, Guohong Cao and Tom La Porta Penn State University

The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks Patrick Traynor, Guohong Cao and Tom La Porta Penn State University 1 The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks Patrick Traynor, Guohong Cao and Tom La Porta Penn State University Abstract Secure data dissemination is a necessary

More information

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

An On-demand Secure Routing Protocol Resilient to Byzantine Failures An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University Joint work with David Holmer, Cristina Nita-Rotaru, and Herbert Rubens Based on paper at WiSe2002

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging

More information

Performance Investigation and Analysis of Secured MANET Routing Protocols

Performance Investigation and Analysis of Secured MANET Routing Protocols Performance Investigation and Analysis of Secured MANET Routing Protocols A.Jayanand #, Prof.Dr.T.Jebarajan * # Principal, Maria Polytechnic College,Attoor, India (Research scholar, MSU) * Principal, Kings

More information

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting

More information

A Security Infrastructure for Trusted Devices

A Security Infrastructure for Trusted Devices Infrastructure () A Security Infrastructure for Trusted Devices Mahalingam Ramkumar Mississippi State University, MS Nasir Memon Polytechnic University, Brooklyn, NY January 31, 2005 Infrastructure ()

More information

Management Science Letters

Management Science Letters Management Science Letters 2 (2012) 2271 2280 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl A new method for improving security in MANETs AODV

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Key Distribution in Mobile Ad Hoc Networks based on Message Relaying

Key Distribution in Mobile Ad Hoc Networks based on Message Relaying Key Distribution in Mobile Ad Hoc Networks based on Message Relaying Johann van der Merwe, Dawoud Dawoud, and Stephen McDonald University of KwaZulu-Natal, School of Electrical, Electronic and Computer

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

AODV Routing Protocol in MANET based on Cryptographic Authentication Method IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College

More information

SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks

SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks Wenbo He Ying Huang Klara Nahrstedt Whay C. Lee wenbohe@uiuc.edu huang23@uiuc.edu klara@cs.uiuc.edu Whay.Lee@motorola.com

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Security in Ad Hoc Networks Attacks

Security in Ad Hoc Networks Attacks Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

PerformanceEvaluation of AODV based on black hole attack in ad hoc network

PerformanceEvaluation of AODV based on black hole attack in ad hoc network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 2 Version 1.0 February 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher:

More information

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar Embedded Systems Research Group, Tata Consultancy Services,

More information

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1 Shouhuai Xu 2 Sanjeev Setia 1 Sushil Jajodia 1,3 1 Center for Secure Information Systems, George Mason University,

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

Secure Routing for Mobile Ad-hoc Networks

Secure Routing for Mobile Ad-hoc Networks Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)

More information

Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks

Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks Defend Against Cache Consistency Attacks in Wireless Ad Hoc etworks Wensheng Zhang and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 680

More information

hash chains to provide efficient secure solutions for DSDV [7].

hash chains to provide efficient secure solutions for DSDV [7]. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University

More information

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks Jaydip Sen 1, Sripad Koilakonda 2, Arijit Ukil 3 Innovation Lab Tata Consultancy Services Ltd. Kolkata-700091, INDIA

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach Ning Song and Lijun Qian Department of Electrical Engineering Prairie View A&M University Prairie View, Texas 77446

More information

An overview of Trust, Naming and Addressing and Establishment of security associations

An overview of Trust, Naming and Addressing and Establishment of security associations Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;

More information

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks 1 Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks Tiranuch Anantvalee and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca

More information

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il

More information

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks 1 : Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park Email: weiyu,

More information

Re-examining Probabilistic Versus Deterministic Key Management

Re-examining Probabilistic Versus Deterministic Key Management Re-examining Probabilistic Versus Deterministic Key Management Dahai Xu Jianwei Huang Jeffrey Dwosin Mung Chiang Ruby Lee {dahaixu, jianweih, jdwosin, chiangm, rblee}@princeton.edu Department of Electrical

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 20, 2011 Class #4 Broadcast information security Agenda Broadcast information security Broadcast authentication and encryption Key management

More information

Key Management in Ad-Hoc Networks

Key Management in Ad-Hoc Networks Key Management in Ad-Hoc Networks Jukka Valkonen Helsinki University of Technology Laboratory for Theoretical Computes Science jukka.valkonen@tkk.fi Abstract. Key management is crucial part of security

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme A. JEGATHEESAN Assistant Professor, Department of Information Technology Cape Institute of Technology, Levengipuram, Tamilnadu

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Security in ADHOC Sensor Networks Dr. G. Murugaboopathi Head

More information

A Time-Based Key Management Protocol for Wireless Sensor Networks

A Time-Based Key Management Protocol for Wireless Sensor Networks A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.

More information

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography S. Rajeswari 1, Dr V. Anuratha 2 1 Assistant Professor, PG Department of Computer Application, Sree

More information

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1, Shouhuai Xu 2, Sanjeev Setia 1, and Sushil Jajodia 1 1 Center for Secure Information Systems, George Mason University,

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Pietro Michiardi and Refik Molva Piero.Michiardi@eurecom.fr Refik.Molva@eurecom.fr Institut Eurécom, 2229 Route des Crêtes BP 193

More information

Secure Adhoc Network

Secure Adhoc Network International Journal of Computational Engineering Research Vol, 03 Issue, 6 Secure Adhoc Network 1, Pawan Bhadana, 2, Ritu Khurana, 3, Chanchal, 4, Manisha 1, Associate Professor, Department of Computer

More information

Distributed Trust Establishment in MANET s: Swarm Intelligence

Distributed Trust Establishment in MANET s: Swarm Intelligence Distributed Trust Establishment in MANET s: Swarm Intelligence Laurent Eschenauer, John S. Baras, Virgil Gligor Center for Satellite and Hybrid Communication Networks Department of Electrical and Computer

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

Security in Ad Hoc Networks *

Security in Ad Hoc Networks * Security in Ad Hoc Networks * Refik Molva and Pietro Michiardi Institut Eurecom 2229 Route des Crêtes 06904 Sophia-Antipolis, France Abstract. In wirelesss ad hoc networks basic network operations are

More information

Models of Authentications in Ad Hoc Networks and Their Related Network Properties

Models of Authentications in Ad Hoc Networks and Their Related Network Properties Models of Authentications in Ad Hoc Networks and Their Related Network Properties Katrin Hoeper and Guang Gong {khoeper, ggong}@calliope.uwaterloo.ca Department of Electrical and Computer Engineering University

More information

Secured Routing with Authentication in Mobile Ad Hoc Networks

Secured Routing with Authentication in Mobile Ad Hoc Networks Journal of Computer Science, 9 (4): 439-448, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.439.448 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) Secured Routing with Authentication in

More information

Key Grids: A Protocol Family for Assigning Symmetric Keys

Key Grids: A Protocol Family for Assigning Symmetric Keys Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed

More information

Secure Cooperative Mobile Ad Hoc Networks Against Injecting Traffic Attacks

Secure Cooperative Mobile Ad Hoc Networks Against Injecting Traffic Attacks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE SECON 25 proceedings. Secure Cooperative Mobile Ad Hoc Networks

More information

Providing Transparent Security Services to Sensor Networks

Providing Transparent Security Services to Sensor Networks 1 Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou Athens Information Technology Email: {hsor,msal,tdim}@ait.edu.gr Abstract In this paper

More information

Scenario Based Performance Evaluation of Secure Routing in MANETs

Scenario Based Performance Evaluation of Secure Routing in MANETs Scenario Based Performance Evaluation of Secure Routing in MANETs Karthik Sadasivam Vishal Changrani T. Andrew Yang University of Houston-Clear Lake, Houston, TX, USA ABSTRACT Security in MANETs is critical

More information

Weiyi Zhang AT&T Labs - Research, Middletown, NJ

Weiyi Zhang AT&T Labs - Research, Middletown, NJ 596 JOURNAL OF COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 212 Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Yashaswi Singh Department of Computer

More information

A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks

A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks Sweta Jain #, Jyoti Singhai *, Meenu Chawla # # Department of Computer Science and Engineering MANIT, Bhopal (M.P.)

More information

An Efficient Key Management Scheme for Heterogeneous Sensor Networks

An Efficient Key Management Scheme for Heterogeneous Sensor Networks An Efficient Key Management Scheme for Heterogeneous Sensor Networks S.Gandhi,D.Indira Department of Computer Science and Engineering Gudlavalleru Engineering College Gudlavalleru 521356 Abstract Previous

More information

MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks

MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks Seung Yi, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 {seungyi,rhk}@cs.uiuc.edu

More information

Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach

Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach Journal of Network and Computer Applications ] (]]]]) ]]] ]]] www.elsevier.com/locate/jnca Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach Lijun

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

SCENARIO BASED PERFORMANCE EVALUATION OF SECURE ROUTING IN MANETs

SCENARIO BASED PERFORMANCE EVALUATION OF SECURE ROUTING IN MANETs SCENARIO BASED PERFORMANCE EVALUATION OF SECURE ROUTING IN MANETs Karthik Sadasivam Vishal Changrani T. Andrew Yang University of Houston-Clear Lake Houston, TX, USA ABSTRACT Security in MANETs is of prime

More information

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili W. Du, J. Deng, Y. S. Han, P. K. Varshney,

More information

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Ayeesha Siddiqha 1, Arshad Khan 2 1 Assistant Professor, Malnad College of Engineering, Hassan, India 2

More information

An Optimized Inter-Router Authentication Scheme for Ad hoc Networks

An Optimized Inter-Router Authentication Scheme for Ad hoc Networks An Optimized Inter-Router Authentication Scheme for Ad hoc Networks Lakshmi Venkatraman, Dharma P Agrawal Center For Distributed and Mobile Computing Department of Electrical and Computer Engineering and

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

Privacy Protection over Network Communication in Manet

Privacy Protection over Network Communication in Manet Privacy Protection over Network Communication in Manet 1 Dr.K.Rajangam., Head of EEE Department, SCAD Institute of Technology 2 Ms.L.Dhanam, Assistant Professor Department of Computer Science & Engineering,

More information

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,

More information

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.

More information

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John ixon and Kendall Nygard epartment of Computer Science, IACC 8 North akota

More information

Cluster based certificate revocation For mobile ad hoc networks

Cluster based certificate revocation For mobile ad hoc networks www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Cluster based certificate revocation For mobile ad hoc networks

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract Alvaro A. Cardenas, Vahid Ramezani, John S. Baras Department of Electrical and Computer Engineering and Institute for

More information

QoS-based Authentication Scheme for Ad Hoc Wireless Networks

QoS-based Authentication Scheme for Ad Hoc Wireless Networks QoS-based Authentication Scheme for Ad Hoc Wireless Networks P Muppala, Johnson Thomas Department of Computer Science Oklahoma State University, USA jpt@cs.okstate.edu Abstract In this paper we investigate

More information

Design & Evaluation of Path-based Reputation System for MANET Routing

Design & Evaluation of Path-based Reputation System for MANET Routing San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 28 Design & Evaluation of Path-based Reputation System for MANET Routing Ji Li San Jose State University

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

A DISTRIBUTED OCSP FRAMEWORK FOR AD-HOC NETWORKS

A DISTRIBUTED OCSP FRAMEWORK FOR AD-HOC NETWORKS IADIS International Conference on Applied Computing 2005 A DISTRIBUTED OCSP FRAMEWORK FOR AD-HOC NETWORKS Giannis F. Marias Dept. of Informatics and Telecommunications University of Athens, Greece, TK15784

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

An Online Threshold Key Distribution Scheme for Symmetric Key Management

An Online Threshold Key Distribution Scheme for Symmetric Key Management An Online Threshold Key Distribution Scheme for Symmetric Key Management Alireza T. Boloorchi, M. H. Samadzadeh, and T. Chen Computer Science Department, Oklahoma State University Stillwater, OK, USA Abstract

More information

A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS Abstract Nallamala Sri Hari et. al. / Indian Journal of Computer Science and Engineering A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS MR. NALLAMALA SRI HARI, M.TECH (CS) Assistant Professor, CSE Dept.,

More information

Providing Security and Energy Management in Location Based Routing of Manet s

Providing Security and Energy Management in Location Based Routing of Manet s Providing Security and Energy Management in Location Based Routing of Manet s Suprita Sambranikar 1, Prathima S D 2 1 Final Year M.Tech Dept. Of ECE, BTL Institute Of Technology And Management, Bangalore,

More information

Robust And Secured WEP Protocol For Wireless Adhoc Network

Robust And Secured WEP Protocol For Wireless Adhoc Network Robust And Secured WEP Protocol For Wireless Adhoc Network Mr. S.M.K.M. Abbas Ahmad 1, Dr. E.G. Rajan 2, Dr. A.Govardhan 3 1 Associate Professor, Dept. of E.C.E., Hi-Tech College of Engg & Tech, Hyderabad,

More information

Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions

Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions Ashish Patel Department of Computer Engineering SVM Institute of Technology Bharuch, INDIA adp_svmit@yahoo.co.in

More information

A Secure Architecture for Mobile Ad Hoc Networks

A Secure Architecture for Mobile Ad Hoc Networks Author manuscript, published in "MSN'2006, Hong Kong : China (2006)" DOI : 10.1007/11943952_36 A Secure Architecture for Mobile Ad Hoc Networks Abderrezak Rachedi 1 and Abderrahim Benslimane 2 1 LIA/CERI,

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK

DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK 1 N.Karthikeyan 2 Dr.M.Ravindran 1 Research Scholar, Bharathiar University, Coimbatore-641 046. 2 Associate Professor, Department of Computer

More information

arxiv:cs/ v2 [cs.ni] 6 Jul 2003

arxiv:cs/ v2 [cs.ni] 6 Jul 2003 Observation-based Cooperation Enforcement in Ad hoc Networks Sorav Bansal Mary Baker Stanford University Stanford, CA 9435, USA sbansal@stanford.edu, mgbaker@cs.stanford.edu arxiv:cs/3712v2 [cs.ni] 6 Jul

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks

A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks (MANET) Bhaskar Kumawat, Dev Kumar Computer Science & Information Communication, Suresh Gyan Vihar University, India Abstract In

More information

Forward-secure Key Evolution in Wireless Sensor Networks

Forward-secure Key Evolution in Wireless Sensor Networks Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski 1 Mirosław Kutyłowski 1 Michał Ren 2 Katarzyna Rybarczyk 2 1 Wrocław University of Technology Wrocław, Poland 2 Adam Mickiewicz

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information