1 protocols for the wireless paranoid nitin vaidya university of illinois slightly revised version...

30
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois http://www.crhc.uiuc.edu/wireless Slightly revised version of slides used for a 2005 INFOCOM (Miami) panel on Paranoid Protocol Design for Wireless Networks March 16, 2005 Other panelists: Jean-Pierre Hubaux (Moderator), Bill Arbaugh, Ed Knightly, Adrian Perrig

Upload: patience-evans

Post on 04-Jan-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

1

Protocols for the Wireless Paranoid

Nitin VaidyaUniversity of Illinois

http://www.crhc.uiuc.edu/wireless

Slightly revised version of slides used for a2005 INFOCOM (Miami) panel on

Paranoid Protocol Design for Wireless NetworksMarch 16, 2005

Other panelists: Jean-Pierre Hubaux (Moderator), Bill Arbaugh,Ed Knightly, Adrian Perrig

Page 2: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

2

Disclaimer

If you review my research proposals,

ignore everything I say here

Page 3: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

3

Panel’s Premise

Wireless networks need

more paranoid protocols

than wired networks

Page 4: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

4

Wireless Networks

Greater paranoia may be desirable in wireless networks

Easier to “tap” into

Limited resources Incentive to cheat

Programmable devices provide means to cheat

But …

Page 5: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

5

What are Paranoid ProtocolsAnyway?

Page 6: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

6

Department of NetLand Security(DNS)

Low

Severe

High

Elevated

Guarded

Paranoid

Threat Assessment

Characterized byextreme and irrationaldistrust

Page 7: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

7

Paranoid Design Principles

Everything that can go wrong, will

- Murphy’s Law

Protect against everything

Page 8: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

8

Research Community’s Response

Enumerate all possible ways things can go wrong

Separate solution for each of the ills

Not quite the right approach

Proof by Example

3 Mistakes often made

Page 9: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

9

Mistake 1:Assuming Extreme Scenario

as the Common Case

Ad hoc network are coming !

Ad hoc networks are coming !!

Page 10: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

10

“Extreme” Ad Hoc NetworkingLarge Isolated Networks

No infrastructure

AB

C

E

Page 11: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

11

Extreme Scenario

“Extreme” ad hoc networks: No infrastructure

No certification authority No DHCP server Long-lived partitions

Why build networks this way,if you don’t have to?

Not all networksare for the battlefield !!

Page 12: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

12

Extreme Ad Hoc Networks

Model acceptable when exploring design space for MAC and routing

Assuming same model for “security” can lead tounnecessary complexity

Page 13: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

13

More Likely Ad Hoc NetworksAccess to Infrastructure or Small

AB

C

E

internet

Page 14: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

14

More Likely Ad Hoc NetworksAccess to Infrastructure or Small

Page 15: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

15

More Realistic Multi-Hop WirelessMesh Networks

Wireless

channel

Wireless

channel

Mesh node

A

Wireless

channel

Wireless

channel

Mesh node

B

C

Wireless“backbone”

internet

Page 16: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

16

More Realistic Multi-Hop WirelessHybrid Networks

Wireless

channel

Wireless

channel

Access Point

A

Wireless

channel

Wireless

channel

Access Point

B

C

D

E

internet

Page 17: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

17

Even Vehicles Can Have Intermittent Infrastructure Access

Picture courtesy Prof. Jean-Pierre Hubaux(somewhat modified from Prof. Hubaux’s version)

Page 18: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

18

Multi-Hop Wireless is Here(Summary)

Multi-hop wireless,

but “infrastructure” can be accessed selectively

Not all enumerable scenarios are relevant

Design protocols for the likely scenarios

Page 19: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

19

Mistake 2:“In-Band” Solutions

“In-band” solutions

Solution tied closely to attack

Page 20: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

20

Mistake 2:“In-Band” Solutions

Example attack: Node refuses to forward packets

In-band solution:

Watch each other for the misbehavior

A B C

Discard

P

Page 21: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

21

Out-of-Band SolutionsOften More Practical

1. Disincentives for not forwarding packets

2. Misbehavior translates to poor performance Re-route around “bad” parts of the network

Single out-of-band solution can help withmany attacks

Page 22: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

22

Mistake 2: “In-Band” Solutions

Example Attack: MAC Layer selfish misbehavior for performance gains

In-band solution: Detect whether a node follows

protocol faithfully

Out-of-band solution: Determine whether a node

receives unfair share

Wireless

channel

Wireless

channel

Access Point

Page 23: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

23

Out-of-Band Solutions(Summary)

Out-of-band solutions often superior, and easier to implement

Page 24: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

24

Mistake 3Wireless = Wired Equivalent

Many protocols work correctly only when nodes seeidentical wireless channel status

Page 25: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

25

Mistake 3Wireless = Wired Equivalent

Many protocols work correctly only when nodes seeidentical wireless channel status

Protocols cannot perform as advertised

Wireless

channel

Wireless

channel

Access Point

AA BB

CC

When C transmits,When C transmits,A and BA and B

may see differentmay see differentchannel statuschannel status

Page 26: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

26

Mistake 3Wireless = Wired Equivalent

Under realistic channel conditions, some of the attacks also difficult to launch undetected

Example: Certain “wormhole” attacks

Ignore such attacks?

Page 27: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

27

Mistake 3(Summary)

Pay attention to the physical layer

Wired equivalent for wireless not always reasonable

Use solutions that do not rely on such assumptions

Out-of-band solutions, removed from the cause, may be less prone

Page 28: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

28

Conclusion

Not everything that can go wrong isworth the cost of protection

Develop small set of solutions for alarge problem space

Know the wireless channel

Need to protect wireless networks … but

Page 29: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

29

Conclusion

Wireless networks are complex

Focus on the real problems, ignore the imaginary

Page 30: 1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois  Slightly revised version of slides used for

30

Thanks !

[email protected]