An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Similar documents
An On-demand Secure Routing Protocol Resilient to Byzantine Failures

On Demand secure routing protocol resilient to Byzantine failures

CERIAS Tech Report

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

An On-Demand Secure Routing Protocol Resilient to Byzantine Failures

Enhanced Secure Routing Model for MANET

Secure Multi-Hop Infrastructure Access

Wormhole Attack in Wireless Ad-Hoc Networks

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

Wireless Network Security Spring 2013

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

Wireless Network Security Spring 2015

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET

Security in Ad Hoc Networks Attacks

DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK

International Journal of Advance Research in Computer Science and Management Studies

BISS: Building secure routing out of an Incomplete Set of Security associations

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

Defenses against Wormhole Attack

Channel Aware Detection based Network Layer Security in Wireless Mesh Networks

An On-Demand Byzantine-Resilient Secure Routing Protocol for Wireless Adhoc Networks

Secure Data Forwarding in Wireless Ad Hoc Networks

hash chains to provide efficient secure solutions for DSDV [7].

CERIAS Tech Report

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

An Improvement to Mobile Network using Data Mining Approach

Toward Intrusion Tolerant Clouds

Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks

Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Security in Ad Hoc Networks *

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks

An Attacker Model for MANET Routing Security

Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Learning

Wireless Network Security Spring 2016

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

SRPS: Secure Routing Protocol for Static Sensor Networks

Performance Investigation and Analysis of Secured MANET Routing Protocols

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

Defense Against Packet Injection in Ad Hoc Networks

PerformanceEvaluation of AODV based on black hole attack in ad hoc network

Security Issues In Mobile Ad hoc Network Routing Protocols

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Secure routing in ad hoc and sensor networks

Secure Cooperative Mobile Ad Hoc Networks Against Injecting Traffic Attacks

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness

Detecting Misbehaving Node In Ad-Hoc Network By Audit Mechanism

Secure On Demand Multicast Routing Protocol for Mobile Ad-Hoc Networks

Detection of Malicious Nodes in Mobile Adhoc Network

ABSTRACT: INTRODUCTION:

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

An Optimized Inter-Router Authentication Scheme for Ad hoc Networks

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

the Presence of Adversaries Sharon Goldberg David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

Secure Routing for Mobile Ad-hoc Networks

Configuring attack detection and prevention 1

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

International Journal of Advance Engineering and Research Development

Packet Estimation with CBDS Approach to secure MANET

A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

CERIAS Tech Report

Management Science Letters

Distributed Deadlock

Secure Routing Techniques to Mitigate Insider Attacks in Wireless Ad Hoc Networks

Configuring Anomaly Detection

Peer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University

Enhance the Throughput of Wireless Network Using Multicast Routing

International Journal of Advanced Research in Computer Science and Software Engineering

Comparing the Impact of Black Hole and Gray Hole Attacks in Mobile Adhoc Networks

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

CIS 5373 Systems Security

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Scaling Byzantine Fault-tolerant Replication to Wide Area Networks

Configuring Anomaly Detection

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Wireless Network Security Spring 2016

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

Transcription:

An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University On-Demand vs. Proactive Routing Security Concerns On-Demand Source Authentication Caching presents adversarial opportunity Pro-active Harder to secure since pieces of information can not be traced back to a single source. Joint work with David Holmer, Cristina Nita-Rotaru, and Herbert Rubens Based on paper at WiSe2002 Communication Vulnerabilities Routing: objective s Eavesdropping & Impersonation Denial of Service (DOS) Routing: (Hard Problem) Encrypt Data Authenticate Users Monitor traffic Localize damage Sweep under rug This talk s focus r If there is a fault- free path from source to receiver: - communication should proceed undisturbed - consumes minimal resources in the reliable component

Problem Description Worm Holes Source Shortest Path Destination Fault Free Path Two attackers establish a path and tunnel packets from one to the other The worm hole turns many adversarial hops into one virtual hop creating shortcuts in the network This allows a group of adversaries to easily draw packets into a black hole Trusted Node Correct Node Adversarial Node Source Destination Black hole attack Packets are simply dropped Adversaries can move thru the network Aggravated by wormhole attack Source Destination Related Work Terminodes [Hubaux, Buttyan, Capkun 2001] Cornell [Zhou, Haas 1999] [Papadimitratos,, Haas 2002] Watchdog [Marti, Giuli,, Lai, Baker 2000] Wormhole Detection, SEAD, Ariadne [Hu, Perrig, Johnson 2002] University of Massachusetts [Dahill,, Levine, Shields, Royer 2002]

This talk: Unlimited # faults model Trust model Source and Destination are trusted Intermediate nodes are authenticated but not trusted Adversarial model Majority of colluding byzantine adversaries Focus on containment (not defeating) adversaries Black Hole Attack Problem: Adversary may delete a packet How do we detect and avoid black holes? Reliable node may be blamed Detecting failing node: Consensus? a b X c a b c X Impossibility of detection This Talk: link reputation system Can t tell who is the adversary a b c a b X c X Link Weight : reflection of performance statistics (doubled for each fault) Shortest paths w.r.t.. link weights avoid faulty area This talk: avoid both endpoints of contentious link a c b d

Protocol Overview Phase with Fault Avoidance Discovered Path Byzantine Fault Detection with Fault Avoidance Discovered Path Byzantine Fault Detection Weight List Link Weight Management Faulty Link Weight List Link Weight Management Faulty Link On-demand protocol Finds a least weight path Request flood Request includes weight list and signature Signature verified at every hop Prevents un-authorized route requests Flood Blocking Flood Blocking Attack Adversary propagates a false short path Intermediate nodes do not forward inferior valid path information Source ignores the false path No path is established Path must be verified at intermediate nodes Request Response

(cont.) Fault Detection Phase Response flood Prevents response block attack Path and weight accumulated hop by hop Appends signature to response Only lower cost updates are re-broadcast Every hops verifies the entire path Prevents flood blocking attack Path is not guaranteed to be fault free Some path is always established with Fault Avoidance Weight List Discovered Path Link Weight Management Byzantine Fault Detection Faulty Link Fault Detection Strategy Probing technique using authenticated acknowledgements Naïve probing technique Success Fault 1 Fault 2 Fault 3 Secure Adaptive Probing Source Destination Too much overhead per data packet! Fault 4 Binary search = identified in log n faults Trusted Node Successful Probe Successful Interval Intermediate Node Failed Probe Faulty Interval

Probes Probe & Ack Properties Inseparable from data - listed on all packets Integrity checked at each probe - HMAC Enforces path order - onion encrypted list Acks Authenticated - HMAC Single combined ack packet - individual acks added at each probe point & onion encrypted Adversary can t drop selective acks Staggered timeouts - restarts ack packet A A node can t incriminate any link but its own Probe & Ack Specification Probes List of probes attached to every packet Each probe is specified by an HMAC Probes listed in path order Remainder of probe list is onion encrypted Ack Authentication via HMAC Collected and onion encrypted at each probe point Fault Identification Link Weight Management Phase Fault Definition Packet loss rate violates a fixed threshold Excessive delay also causes packet loss Identifies faulty links regardless of reason Malicious behavior Adverse network behavior Congestion Intermittent connectivity with Fault Avoidance Weight List Discovered Path Link Weight Management Byzantine Fault Detection Faulty Link

Link Weight Management Maintains a weight list of identified links Faulty links have their weight doubled Resets link weights Timed by successful transmissions Bounds average loss rate Network is never partitioned Analysis Network of n nodes of which k are adversaries Assume a fault free path exists + 2 q ρ q b kn log Protocol bounds the number of packets lost communicating with the destination n Conclusion On-demand routing protocol resilient to colluding byzantine attackers Adaptive probing identifies a faulty link in log n faults Bounded long term loss rate Bounded total losses beyond long term rate Future Work Investigate more sophisticated fault detection Adaptive threshold Probabilistic scheme Route caching Simulation and implementation

Funding by Questions? Johns Hopkins Information Security Institute DARPA www.cnds.jhu.edu/archipelago/