H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Security of ad hoc networks
1. -A Presentation on-
Security of Ad-Hoc
Networks
-Presented By-
Jayesh Rane
R.C.Patel Institute of Technology,
Shirpur.
2. Traditional Wireless Network
high speed backbone
Infrastructure on-line
– base stations server
– high speed backbone
– on-line servers
Network operators
– operate and maintain the system
– determine policies
Single-hop wireless
communication
base
mobile
station
station
2
Security in Ad-Hoc Networks
3. Wireless Ad-Hoc Networks
No infrastructure
– no base stations
– no backbone
– no servers ( P2P)
No network operators
– self-organization
– self-configuration
– self-healing
Multi-hop wireless
communication
Security in Ad-Hoc Networks 3
4. Motivation
Security is the most often cited concern with wireless
networks
Wireless networks pose unique security problems
Power computation constraints are often higher in
wireless networks, making security requirements
different
Security in Ad-Hoc Networks 4
5. Attacks on Ad-Hoc Networks
• Place of disclosure:
Location disclosure Attacks that target Confidentiality requirements of the
ad hoc network.
• A black hole:
Attack malicious node and enters false answers route to route requests it
receives
• Wormholes:
It involves co-operation between the two malicious nodes that
participate in the network to appear one attacker.
• Denial of Service:
Specific instances of denial of service attacks include the routing table
overflow and the sleep deprivation torture.
Security in Ad-Hoc Networks 5
6. Why Security Required?
Data confidentiality: keep data secret
Data integrity: prevent data from being altered
Data freshness: data must be recent
Data availability: data should be available on request
Data authentication: confirmation that data or request
came from a specific, valid sender
Security in Ad-Hoc Networks 6
7. Security Challenges
Vulnerability of channels
Messages can be overheard and fake messages can be introduced into the
network
Vulnerability of nodes
Nodes do not usually reside in physically protected places
Lack of infrastructure
Special networks should operate independently of any fixed infrastructure.
Dynamic Topology
The permanent changes of topology require sophisticated routing protocols
Security in Ad-Hoc Networks 7
9. Solution against Attacks(cont…)
2. Secure Aware Protocol (For Blackhole Attack)
Improve the relevance of the routes
discovered by ad hoc routing protocols.
Embed security metric into the RREQ packet
Authenticated users belonging to same
trust level share a secret key
Security in Ad-Hoc Networks 9
10. Solution against Attacks
3. Packet Leashes (for Wormhole Attacks)
The recipient of the packet is within a certain distance from the
sender
Each node must know its own location; all nodes must have loosely
synchronized clocks
Security in Ad-Hoc Networks 10
11. Research Directions
• Decentralized public-key management schemes
– using threshold cryptography
– exploiting mobility and secure side channels
• Secure ad hoc routing
– various schemes for authenticating routing information that is distributed or
exchanged among the nodes
• Incentives for co-operation
– micro-payment based schemes
– reputation based schemes
• Low cost cryptographic primitives (algorithms and protocols)
Security in Ad-Hoc Networks 11
12. Conclusion
• Security in ad hoc networks is a very challenging issue
• Basic Mechanisms
– Difficult to force the nodes to collaborate
– No standard routing protocol yet
• Because of their characteristics, ad hoc networks, are open
especially to Denial of service attacks
• Classical security solutions are not suited for ad hoc networks
– Security services should be distributed
• Standard protocols?
– At the moment no universal solution
Security in Ad-Hoc Networks 12
13. Summary
Traditional Wireless Networks
Wireless Ad-Hoc Networks
Attacks on Ad-Hoc Networks
Why Security Required?
Security Challenges
Solutions for Challenges
» Model based on TTP
» Protection against Black Holes
» Protection against Wormholes
Research Directions
Conclusion
Security in Ad-Hoc Networks 13