Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Similar documents
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Subject: Adhoc Networks

On Demand secure routing protocol resilient to Byzantine failures

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

MANET ROUTING ATTACKS

Sleep/Wake Aware Local Monitoring (SLAM)

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Secure Routing and Transmission Protocols for Ad Hoc Networks

Robust Cooperative Trust Establishment for MANETs

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Chapter 7. Denial of Service Attacks

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Wireless Network Security Spring 2011

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Hacking MANET. Building and Breaking Wireless Peering Networks. Riley Caezar Eller

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Dynamic Profile Based Technique to Detect Flooding Attack in MANET

Configuring attack detection and prevention 1

Mobile ad hoc networks Various problems and some solutions

Mobile Communications. Ad-hoc and Mesh Networks

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Wireless Network Security Spring 2016

Packet Estimation with CBDS Approach to secure MANET

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets. Xiaowei Yang Duke Unversity

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

Enhanced Routing in Mobile Adhoc Network against Denial of Service Attack

Lecture 9. Quality of Service in ad hoc wireless networks

Wireless Network Security Spring 2016

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Denial of Service and Distributed Denial of Service Attacks

Configuring attack detection and prevention 1

Authors: Mark Handley, Vern Paxson, Christian Kreibich

Basic Concepts in Intrusion Detection

Defenses against Wormhole Attack

SUMMERY, CONCLUSIONS AND FUTURE WORK

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Privacy Protection over Network Communication in Manet

Chapter 7 CONCLUSION

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

SENSOR-MAC CASE STUDY

Security Issues In Mobile Ad hoc Network Routing Protocols

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Implementation: Detection of Blackhole Mechanism on MANET

Wireless Network Security Spring 2015

Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF)

Detection of Wormhole Attacks in Wireless Sensor Networks

Secure routing in ad hoc and sensor networks

Detecting Covert Timing Channels Using Normalizing Weights

Wireless Network Security Spring 2015

Computation of Multiple Node Disjoint Paths

Networking interview questions

Detection of Vampire Attack in Wireless Adhoc

DDoS PREVENTION TECHNIQUE

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Introduction to Mobile Ad hoc Networks (MANETs)

DENIAL OF SERVICE ATTACKS

Routing protocols in WSN

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

3. Evaluation of Selected Tree and Mesh based Routing Protocols

A Technique for Improving Security in Mobile Ad-hoc Networks

Attacks on WLAN Alessandro Redondi

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

set active-probe (PfR)

Configuring ARP attack protection 1

Wireless Networking & Mobile Computing

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

TCP Congestion Control With a Misbehaving Receiver

Denial of Service. Eduardo Cardoso Abreu - Federico Matteo Bencic - Pavel Alexeenko -

Mobile Ad-hoc Networks

Overlapping Ring Monitoring Algorithm in TIPC

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

Gurleen Kaur Walia 1, Charanjit Singh 2

Counter and Network Density Based Detection and Prevention Scheme of DOS Attack in MANET

Ad Hoc Networks: Issues and Routing

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

NETWORK SECURITY. Ch. 3: Network Attacks

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon

Transcription:

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE Dept., George Mason University, U.S.A. 2 SPARTA, Inc., USA 1 24/05/2005

Agenda 1. Introduction 2. Vulnerabilities in QoS Signaling for MANETs 3. Analysis of Attacks and Defense Mechanisms for QoS Signaling 4. Conclusion 2

Background: The SEQUOIA Project: Security and Quality Of Service In Mobile Ad hoc Networks Mobility Management Routing Security attributes SEQUOIA Quality-ofservice metrics How do we integrate security and QoS requirements into routing protocols for MANETS? 3

Introduction Work on MANET security has focused on (1) key management, (2) secure routing do not address the issues of QoS attacks and DoS Cryptographic techniques can/should also be applied to QoS signaling but they can address a subset of the security problems For Example: an attacker being part of a secure route may comply with a secure routing protocol but attack and exploit the signaling protocol Securing QoS signaling is challenging attacks are difficult to distinguish from network congestion or connectivity loss Goal: analyze a representative class of attacks targeted at QoS signaling in MANETs and identify the key elements required in a secure QoS signaling scheme 4

Background - QoS Signaling in MANETs 2 types of signaling protocols: reservation-based (INSIGNIA) reservation-less QoS signaling (SWAN) When needed, the attacks will be illustrated by applying them to INSIGNIA and SWAN for simplicity INSIGNIA basics: control information is exchanged between S-D to reserve, renegotiate, and release resources per flow SWAN basics: S probes for available resources along a route 5

Vulnerabilities in QoS Signaling for MANETs Open network topology Overlaps in radio transmission/reception ranges Node mobility Address, node identity are independent of a node s location Intermittent connectivity control messages may be lost protocol timing dependencies may be modulated Limited node capabilities energy, memory, and CPU cycles 6

Analysis of Attacks and Defense Mechanisms for QoS Signaling Assumption: secure routing protocol is in place! Attack analysis follows a 3-component template: Vulnerability: the network state or property that the attacker exploits Attack Step: Effect: the method by which the attacker carries out the attack, the position of the attacker in the network, the amount of effort used by the attacker, etc. the observable effects and side-effects of the attack 7

Attacks on reservation-based QoS signaling, 1/2 Over-reservation: Attack analysis: Vulnerability: 1. protocol cannot verify usage of reservations, 2. naive refreshment of reservations (e.g., INSIGNIA) Step: attacker 1. acts as the source node, 2. requests more bandwidth than it uses, 3. sends one data packet in the specified refresh-time interval to refresh the reservation Effect: 1. bandwidth under-utilization, 2. legitimate sessions are denied service Issues specific to MANETs: 1. the wireless channel provides small capacities, 2. straightforward techniques for rate monitoring is node overwhelming Countermeasure: data rate monitoring and rate adjustment performed by each node traffic flows through a node are aggregated and managed on an in-hop/out-hop basis (DRQoS) 8

Attacks on reservation-based QoS signaling, 2/2 State Table Starvation: Attack analysis: Vulnerability: 1. node has limited memory and computational power, 2. reservations are made on a per flow basis, 3. protocol cannot verify usage of reservations Step: attacker 1. acts as the source of the data packets, 2. requests bandwidth for an illegitimate RT flow Effect: 1. state table is exhausted, 2. legitimate sessions are denied service Issues specific to MANETs: Mobile devices have significant memory constraints Countermeasure: state table of node to grow as a function of the number of neighbor nodes N neighbors: max number of in-out flows per node = N(N-1) (DRQoS) 9

General attacks on QoS signaling, 1/5 Over/under reporting of available bandwidth: (example: SWAN) 10 Attack analysis: Vulnerability: 1. bandwidth availability is perceived uniquely by each nodes, 2. link capacities are not fixed, 3. protocol is unable to validate the available bandwidth reported Step: attacker 1. acts as an intermediate node, 2. falsely represents the available bandwidth Effect: S sends at a rate that does not match the available bandwidth on the path Issues specific to MANETs: link capacities frequently change Countermeasure: over-reporting: 1. detected at the application layer by D, 2. isolating the misbehaving node by triggering a new route search, 3. information provided to an IDS to isolate the attacking node Under-reporting: 1. signaling protocol triggers a new route search extra overhead, 2. IDS logs information on resources reported by nodes on different routes and detects inconsistencies

General attacks on QoS signaling, 2/5 QoS Degradation: new class of attacks in QoS signaling Attack analysis: Vulnerability: protocol does not verify QoS performance Step: attacker 1. acts as an intermediate node, 2. increases the delay or jitter of the data packets to unacceptable levels Effect: 1. QoS for a particular service is degraded, 2. real-time session needs to be reinitiated Issues specific to MANETs: QoS degradation attacks are difficult to distinguish from impairments caused by node mobility or intermittent connectivity Countermeasure: Conventional DoS mitigation techniques cannot recognize the increase on delay or jitter 1. detected at the application layer by D. 2. trigger a search for a new route, 3. report to an IDS 11

General attacks on QoS signaling, 3/5 Timing Attack: (example: SWAN) Attack analysis: Vulnerability: 1. protocol has timing dependencies, 2. compliance to protocol is not checked Step: attacker 1. acts as the source or destination node, 2. exploits the timing dependencies Effect: attacker gains access to the channel at the expense of legitimate flows 12 Issues specific to MANETs: intermittent connectivity & dynamic topology cannot guarantee that a message will arrive at the D (on time) timing attacks might not be recognized Countermeasure: a QoS signaling scheme that does not present time dependencies & does not employ timers to control the protocol s behavior (like DRQoS, INSIGNIA)

General attacks on QoS signaling, 4/5 Flooding: send traffic above the negotiated rate Attack analysis: Vulnerability: protocol 1. does not verify resource usage, 2. does not identify the source of flooding, 3. does not take measures against flooding Step: attacker 1. acts as the source node, 2. floods the network with traffic Effect: 1. network is flooded, 2. legitimate sessions are denied service Issues specific to MANETs: challenging to trace back an attacker in MANET Countermeasure: aggregate traffic streams policed on an in-hop/out-hop basis a flooding flow experiences traffic policing by at least one of the intermediate nodes on the path (DRQoS) 13

General attacks on QoS signaling, 5/5 Replay Attack: Attack analysis: Vulnerability: 1. protocol does not protect the integrity of signaling information, 2. protocol cannot distinguish a replay from an authentic message, 3. open topology Step: attacker 1. duplicates/modifies signaling information, 2. forwards modified packet to the next hop Effect: 1. resources are wasted by illegitimate packets, 2. legitimate packets are denied service Issues specific to MANETs: broadcast medium each node hears the transmission of every node in its radio transmission range Countermeasure: 14 limited number of replayed packets processed over a time interval

DRQoS: DoS Resistant QoS Signaling Protocol Hejmo, M., Mark, B.L., Zouridaki, C., Thomas, R.K.: Denial-of-Service Resistant Quality of Service Signaling Protocol for Mobile Ad hoc Networks. In: Proc. ACM SASN Workshop. (2004) 23-28 reservations on in-hop/out-hop basis distributed traffic policing distributed rate monitoring and adjustments DRQoS addresses the following attacks: Over-reservations State Table Starvation Timing Flooding DRQoS does not address the following attacks: Over/under-reporting QoS Degradation Replay 15

Conclusion A complete solution to secure QoS signaling solution for MANETs should incorporate the following elements 1. intelligent traffic management (DRQoS) 2. lightweight intrusion detection (distributed trust establishment schemes, Buchegger) 3. efficient cryptographic primitives (symmetric cryptosystems, ECC PKI, key chains) Ongoing work we are further developing the DRQoS scheme investigating computationally lightweight schemes to establish trust measures for MANETs 16

Thank you! Questions? 17