Wireless Network Security Spring 2011

Similar documents
Wireless Network Security Spring 2015

Wireless Network Security Spring 2013

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016

Wireless Network Security Spring 2014

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015

Wireless Network Security Spring 2013

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Mobile Security Fall 2011

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Security of Mobile Ad Hoc and Wireless Sensor Networks

Wireless Network Security Spring 2013

Wireless Network Security Spring 2012

Wireless Network Security Spring 2015

Security Issues In Mobile Ad hoc Network Routing Protocols

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Wireless Network Security Spring 2016

Wireless Network Security Spring 2015

Secure Routing and Transmission Protocols for Ad Hoc Networks

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Sybil Attack Detection and Prevention Using AODV in VANET

Wireless Network Security Spring 2011

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Control Plane Security Overview

Sleep/Wake Aware Local Monitoring (SLAM)

Mobile ad hoc networks Various problems and some solutions

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

Wireless Network Security Spring 2014

Mobile Security Fall 2013

Packet Estimation with CBDS Approach to secure MANET

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Switching & ARP Week 3

A Feedback Reputation Mechanism to Secure the Optimized Link State Routing Protocol

Secure routing in ad hoc and sensor networks

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

On Demand secure routing protocol resilient to Byzantine failures

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture

A Review on Black Hole Attack in MANET

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

Network Security. Thierry Sans

Security in inter-domain routing

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Secure Multi-Hop Infrastructure Access

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.

DHCP Configuration. Page 1 of 14

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

Configuring ARP attack protection 1

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

SRPS: Secure Routing Protocol for Static Sensor Networks

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Wireless Sensor Networks: Security Issues, Challenges and Solutions

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Chapter 8 roadmap. Network Security

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Ruijie Anti-ARP Spoofing

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

Wireless Network Security Spring 2011

Performance Analysis of Aodv Protocol under Black Hole Attack

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Webpage: Volume 4, Issue VI, June 2016 ISSN

Configuring Dynamic ARP Inspection

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material.

LECTURE 8. Mobile IP

CIS 551 / TCOM 401 Computer and Network Security

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

ELEC5616 COMPUTER & NETWORK SECURITY

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

A Framework for Optimizing IP over Ethernet Naming System

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

Mobile Security Fall 2012

ARP Inspection and the MAC Address Table

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

Routing in a network

Routing protocols in WSN

Transcription:

Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 17, 2011 Class #12 Network layer security

Announcements No more scheduled office hours after today Email or call me to make an appointment Mid-semester project team meetings I want to meet with each project team to check on progress, roadblocks, changes, etc.

Network layer security Agenda Functionality of the network layer Vulnerabilities and threats A few attacks

Network Layer Services The network layer is responsible for packet delivery including: Addressing Routing Forwarding Hop-by-hop forwarding Re-direction in mobile domains (e.g. Mobile IP) Interactions with Transport layer and Link/MAC layer

Addressing Before routing can be performed, nodes need some sort of ID or address Address/ID types range from local to global, just like in the postal system (streets up to ZIP codes) In very large-scale systems (e.g. Internet), addresses must have some sort of structure IP addresses follow a specific hierarchy and are reused within each domain Within a domain and in small-scale systems (e.g. MANET/WSN), addresses are typically unstructured or random Address management needed within a domain to prevent duplication and other failure scenarios

Threats to Addressing Addresses can be changed arbitrarily Allows for address spoofing Masquerading as other node(s) Potential for a large number of attacks Changing identity to prevent detection/punishment Attackers can infiltrate address management protocols (ARP, DHCP) to cause problems Inducing address duplication Forcing frequent address changes Manipulating forwarding schemes

Routing Routing = path management Routing does not involve actual sending of packets from source to destination(s), only sets up the path Lives in the control plane Involves path setup/discovery, maintenance, and tear-down Challenges in MANET/WSN environments Route using multiple untrusted relay nodes Resource and capability limitations No centralized authority or monitor Secure routing often relies on existing key mgmt.

Routing Misbehavior Just as with other types of misbehavior, routers can be greedy, non-cooperative, or malicious Greedy routers can refuse route discovery requests in order to save their own resources Non-cooperative routers can choose to selectively accept route requests to specific sources/dests Malicious routers can persuade route discovery protocols so paths pass through them, avoid them, or take unnecessary detours

Black-hole attack: Path Attraction A malicious router broadcasts false claims of being close to the destination in order to attract all traffic and drop it Gray-hole attack: Similar to black-hole attack, except it only drops some packets selectively Ex: forward all routing control packets but drop all data Worm-hole attack: Colluding routers create a low-latency long-distance out-of-band channel to attract routing paths and control data flow

Detours: Path Manipulation A malicious router can modify/inject control packets to force selection of sub-optimal routes Gratuitous detours : Greedy routers can avoid being on a selected route by advertising long delays or creating virtual nodes Could be considered a form of Sybil attack, where all personalities are on the routing path

Route Subversion Targeted blacklisting: In any routing protocols using reputation or blacklisting, attackers can falsely accuse or frame benign nodes, subverting the blacklisting process Rushing attacks: Attackers can quickly disseminate forged requests, causing later valid requests to be dropped

Secure Routing How to guarantee that an established path can be efficient (e.g., short) and/or reliable? How to prevent attackers from manipulating path discovery/construction? What metrics can be used to quantify the value of a path? Length? Latency? Trust?

Forwarding Forwarding = point-to-point data management Forwarding involves actual sending of packets from source to destination(s) on given routing paths Lives in the data plane Correct forwarding involves Sending the correct packets Maintaining packet order Respecting headers and rules Relaying in a timely manner Respecting rate control mechanisms

Forwarding Misbehavior Misbehavior in the forwarding mechanism (often called Byzantine forwarding) includes various ways of going against forwarding rules Dropping packets Modifying packet contents or header information Injecting bogus packets on source's behalf Forwarding to the wrong next hop Disrespecting rate control (flooding or throttling)

Secure Forwarding How to efficiently enforce forwarding rules in a distributed environment? How to detect forwarding misbehavior? How do routing and forwarding interact? Are they independent?

Route Information Disclosure Routing protocols inherently reveal information to curious/malicious eavesdroppers An attacker can listen to route discovery interactions and learn (1) locations of source and destination nodes, (2) type of interactions between nodes, (3) commonly used paths, (4) network events, or (5) data These are all issues of location privacy, network privacy, and data privacy due solely to the routing process

Routing Privacy How to prevent disclosure of information that is potentially useful to attackers? How to establish routes without revealing that a route is being established? How to forward data without revealing where it's being forwarded to/from (source, destination, and relay nodes)? How to mask the events that trigger route discovery and forwarding (esp. in sensor networks)? How to do all of this efficiently?

Next time... Feb 22: Survey on routing/forwarding security Feb 24: Survey on location privacy/anonymity Trust