Wireless Network Security Spring 2015

Similar documents
Wireless Network Security Spring 2016

ShortMAC: Efficient Data-plane Fault Localization. Xin Zhang, Zongwei Zhou, Hsu- Chun Hsiao, Tiffany Hyun- Jin Kim Adrian Perrig and Patrick Tague

ShortMAC: Efficient Data-Plane Fault Localization

Network Fault Localization Adrian Perrig. Overview

Wireless Network Security Spring 2015

Wireless Network Security Spring 2011

Wireless Network Security Spring 2016

Wireless Network Security Spring 2011

ShortMAC: Efficient Data-Plane Fault Localization

Wireless Network Security Spring 2015

Packet Estimation with CBDS Approach to secure MANET

Wireless Network Security Spring 2011

Wireless Network Security Spring 2013

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

the Presence of Adversaries Sharon Goldberg David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford

Secure routing in ad hoc and sensor networks

Sleep/Wake Aware Local Monitoring (SLAM)

Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

A Secure Cooperative Bait Detection Approach for Detecting and Preventing Black Hole Attacks In MANETS Using CBDS Shireen Sultana 1, Swati Patil 2

Secure and Efficient Network Fault Localization

CSC 774 Advanced Network Security

Wireless Network Security Spring 2015

Wireless Network Security Spring 2014

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Wireless Network Security Spring 2012

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Wireless Network Security Spring 2013

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets. Xiaowei Yang Duke Unversity

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Concrete cryptographic security in F*

Wireless Network Security Spring 2014

Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks

Wireless Network Security Spring 2015

XORs in the Air: Practical Wireless Network Coding

Secure Routing and Transmission Protocols for Ad Hoc Networks

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

Security Issues In Mobile Ad hoc Network Routing Protocols

Reliable Broadcast Message Authentication in Wireless Sensor Networks

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Sybil Attack Detection in Mobile Adhoc Network

ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Improved Trust based Cooperative Bait detection system form MANET

SRPS: Secure Routing Protocol for Static Sensor Networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

AN AD HOC NETWORK is a group of nodes without requiring

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

On Demand secure routing protocol resilient to Byzantine failures

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace.

Robust Decentralized Authentication for Public Keys and Geographic Location

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER

Wireless Network Security Spring 2016

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

Defenses against Wormhole Attack

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Mobile Communications. Ad-hoc and Mesh Networks

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

Defense Against Packet Injection in Ad Hoc Networks

Wireless Network Security Spring 2011

Implementation: Detection of Blackhole Mechanism on MANET

Prevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD

Homework 2: IP Due: 11:59 PM, Oct 19, 2017

Packet-dropping Adversary Identification for Data Plane Security

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Delay Tolerant Networking with OLSRv2

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Analysis and Enhancement of RPL under Packet Drop Attacks

On Inter-layer Assumptions

A Novel approach to prevent collaborative attacks in MANETS using Cooperative Bait detection Scheme (CBDS)

TVA: A DoS-limiting Network Architecture L

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture

Self-Organized Network-Layer Security in Mobile Ad Hoc Networks

An Improvement to Mobile Network using Data Mining Approach

Toward Collusion-Robust Link-State Routing in Open Networks

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Robust Cooperative Trust Establishment for MANETs

CS408 Cryptography & Internet Security

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

RESOURCE-EFFICIENT MISBEHAVIOR IDENTIFICATION IN WIRELESS AD HOC NETWORKS

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Wireless Network Security Spring 2013

ABSTRACT: INTRODUCTION:

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Detection Of Malicious Packet Dropping Attack In Wireless AD HOC Networks

Lecture 16: Wireless Networks

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Routing Protocol Framework Information Model. Operation Model Routing Information Exchange

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs

CSC 6575: Internet Security Fall 2017

Remote E-Voting System

Transcription:

Wireless Network Security Spring 2015 Patrick Tague Class #12 Forwarding Security 2015 Patrick Tague 1

SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5-8 minutes Written SoW Due Thursday Use IEEE 2-column format Questions? 2015 Patrick Tague 2

Class #12 Data-plane attacks and defenses 2015 Patrick Tague 3

What about forwarding security at the data plane? 2015 Patrick Tague 4

Data Plane Security Injecting and modifying packets are issues of packet/data integrity, can be solved using cryptographic techniques Though not efficiently solved...more in a moment Forwarding to the wrong next hop is an issue of protocol compliance, but can be checked and reported similar to packet/data integrity Packet dropping is an issue of compliance and availability 2015 Patrick Tague 5

Data Plane Availability Cryptographic primitives alone cannot solve availability problems at the data plane Cannot provide any sort of guarantee about delivering data through routers that misbehave In general, crypto alone cannot solve DoS problems Data plane availability is partially due to compliant behavior of routing nodes and partly due to natural nondeterministic faults, errors, and failures 2015 Patrick Tague 6

E2E Delivery Measures Suppose packet delivery is measured end-to-end using signatures or MACs Every message carries overhead for packet authentication, but message authentication is already desirable for many other reasons Packet drop induces end-to-end retransmission With high delay if the ACK is also dropped/modified Packet modification forces routers to carry bogus message all the way to the destination node 2015 Patrick Tague 7

Limitations Paths can only be changed after a large number of end-to-end transactions, i.e., after enough data is available to make a decision Path-based detection only identifies a bad path, not a bad node Good nodes may be excluded from networking May have to search a large number of paths to find one with good performance In fact, exponential in #attackers 2015 Patrick Tague 8

Per-Node Delivery Measures Suppose packet delivery is measured per node Verification at finer granularity may require more overhead (e.g., MAC per node) Quicker retransmission requests can be issued by intermediate routers, but malicious routers can also request retransmissions Routers are forced to do more computation and reporting Neighbors may be required to overhear behavior 2015 Patrick Tague 9

ShortMAC [Zhang et al., NDSS 2012] Instead of reacting to poor performance, highly efficient monitoring can enable continuous monitoring with minimal overhead A few key design insights allow for significant efficiency gains by making seemingly-significant tradeoffs with detectability 2015 Patrick Tague 10

Fault Localization ShortMAC Counters Packet authentication Fault localization monitor packet W/ pkt authentication, content count count, content Counters-only approach yields small state and low communication overhead Source A BDetectable! C 6 6 46 Detectable! 2015 Patrick Tague 11

Limiting the Attacker Limiting attacks instead of perfect detection Detect every misbehavior? Costly! Error-prone! Absorb low-impact attack: tolerance threshold Trap the attacker into a dilemma Enable probabilistic algorithms with provable bounds Attack more? Will get caught! Stay under the threshold? Damage is bounded! Source Dest. 2015 Patrick Tague 12

ShortMAC ShortMAC packet marking Limiting instead of perfectly detecting fake packets Source marks each packet with k bits (w/ keyed PRF) K 1 K d 1 0 K 2 1 Source K 1 K 2 K d k-bit MAC, e.g., k = 1 (, 1, 0, 1) K 1 K 2 1 2 = PRF Kd (, SN, TTL d ) Forge m? 50% chance of inconsistency. Detectable! = PRF K2 (, SN, TTL 2, ) Dest K d = PRF K1 (, SN, TTL 1,, ) 2015 Patrick Tague 13

Detection using Counters High-level steps Each node maintains two counters (counter only!) Secure reporting (details in paper) Threshold-based detection (details in paper) robust to natural errors sends 1000 pkts 0 0 250 1-bit MAC 1000 1000 750 Source 1 2 3 forges 500 pkt 125 625 Dest. 2015 Patrick Tague 14

Limitations ShortMAC was designed for the Internet and has some implicit assumptions that limit its use in wireless domains Detection is based on a threshold value much higher than a natural packet loss threshold in wireless, natural packet loss can be high Source must share pairwise symmetric key with every node along the path 2015 Patrick Tague 15

Random Audits in MANETs [Kozma & Lazos, WiSec 2009] Instead of constantly monitoring every node's forwarding behavior, only perform path audits when end-to-end performance degrades To audit a path, the source constructs a disjoint audit path to a node on the path and uses this path to carry audit request/response 2015 Patrick Tague 16

Efficient Auditing Upon request, a node generates a proof of which packets it has seen Reporting a list of all packets is inefficient, so compression is required Bloom Filter does lossy packet list compression: A 2 n -bit vector can be indexed by an n-bit hash function Each of k such hash functions maps a packet to a bit Any 0 : the corresponding packet was not received All k 1 s: corresponding packet was probably received 2015 Patrick Tague 17

Random Audits REAct = Resource Efficient ACcounTability Audits are triggered by performance degradation Source S audits a node N on the path If the returned Bloom filter from N is sufficiently close to that of S, then audit a node downstream Else, audit a node upstream of N Eventually, search will converge to the lossy link Source can change route around the lossy link to identify which node is misbehaving 2015 Patrick Tague 18

Limitations REAct assumes that attackers have a static attack strategy Dropping packets only when not being audited will work, but it will allow detection in other ways REAct assumes that multiple attackers do not collude Colluding attackers can trade duties when being audited, thereby throwing off the search process 2015 Patrick Tague 19

Feb 26: SoW Presentation; Network Privacy & Anonymity Mar 3: Trust and Reputation 2015 Patrick Tague 20