network access control for mobile ad hoc network pan wang north carolina state university

34
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

Post on 18-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

Network Access Control for Mobile Ad Hoc Network

Pan Wang

North Carolina State University

Page 2: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

2

Outline

• Background

• Problem statement

• Related work

• Proposed scheme– Key Synchronization– Packet Retransmission

• Analysis, simulation and field test

• Summary

Page 3: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

3

Background

• Mobile Ad Hoc Network (MANET)– A MANET consists of mobile platforms (e.g., a

router with multiple hosts and wireless communications devices), which are free to move about arbitrarily. -- IETF RFC2501

– Characteristics of MANET• No pre-determined infrastructure

• Ease of deployment

• Dynamic topologies (e.g., mobility, network partition )

• Constrained resources (e.g., bandwidth, energy )

Page 4: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

4

Background (Cont)

• Network access control– Not media access control – Who has the right to access the network

• Physical*

• Technical *

• Administrative *

– Firewalls • Conventional network

• Using network topology and service information

* H. F. Tipton, Handbook of information security management

Page 5: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

5

Problem Statement

• An attacker may inject “bogus” packets to consume the network resources, or insert itself into critical routes

• No mature access control scheme for MANET– more complicated due to open media and dynamic

topology

Page 6: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

6

Related Work

• DHCP Access Control Gateway

• Kerberos

• Distributed firewall

• Pebblenets

• Distributed access control scheme for consumer operated MANET

• LHAP

Page 7: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

7

Related Work --Cont

• LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks– Based on one-way key chain and TESLA– Hop-by-hop authentication– Each transmitted packet associated with a traffic key, – Receiver (or intermediate node) verifies to decide whether

forward (accept) the packet

C

A

B

D

(i)KFA

(i)KFA

S

Cert &Commit

S

M, KF(i)

S

M, KF(I+1)

Page 8: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

8

Proposed Scheme – cryptographic tools

• Group key agreement• Group key distribution

– Controller chooses key

– Stateful vs. Stateless

• Stateless key distribution – Each user is assigned an

unique set of personal keys

– New key is encrypted with the personal keys only known to the legitimate users

– Nice stateless property

k1 k2

K1-

2

K3-

4

k3

k4

K1-

4

M1 M2 M3 M4

Page 9: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

9

Proposed Scheme – underlying models

• Network model– All nodes come from one domain – A node’s access to the network is controlled by a

domain manager (i.e., key manager) – Each node has a unique ID and a set of personal

secret keys

• Attack model– Attackers inject packets to deplete the resources of

node relaying the packets

Page 10: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

10

Proposed Scheme - outline

• Basic idea– Cryptography-oriented (using group key)

– Authenticate all the packets with a network-wide access control (group session) key.

– Any “bogus” packet that has incorrect authentication information will be filtered out immediately.

– As a result, illegitimate nodes will be excluded from communication (routes).

•pan wang:•pan wang:

Page 11: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

11

Research challenges

• Two critical challenges – Synchronization of network access control key

– Interaction between data transmission and key distribution

If these two challenges can be solved, the proposed group key based network access control scheme will be done.

Page 12: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

12

Key Synchronization

• Problem statement– A key update message may fail to propagate

across MANET. Thus, two legitimate user may simultaneously hold different session key (lack of key synchronization)

Page 13: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

13

Key Synchronization (Cont-1)

• An example of lack of key synchronization

A

B

C

DE

KeyManager

P1

P2

P3

F*

F

Page 14: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

14

Key Synchronization (Cont-2)

• Solution– Exploit the stateless feature of the proposed

stateless group key distribution scheme

– Each user buffers the key update message most recently received

– Transmit the buffered message to the other users that are using old session keys

Page 15: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

15

Key Synchronization (Cont-3)

• Scheme details– Proactive part

• Broadcast the buffered key update message every t time unites

– Reactive part• Send a key synchronization request, if a received

packet has higher session ID

• Send the buffered key update message, if a received packet has a lower session ID

Page 16: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

16

Key Synchronization (Cont-4)

• Illustration of the proposed key synchronization scheme

B

A

S E

F

H

J

D

C

G

IK

M

N

LB

A

S E

F

H

J

D

C

G

IK

Broadcast

M

N

LB

A

S E

F

H

J

D

C

G

IK

M

N

LB

A

S E

F

H

J

D

C

G

IK

M

N

LB

A

S E

F

H

J

D

C

G

IK

M

N

LB

A

S E

F

H

J

D

C

G

IK

M L

N

Represents a node that has the most recent key

Page 17: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

17

Key Synchronization (Cont-5)

• Security analysis (possible attacks)– Resource consumption via forged key update

message• Solution: lightweight authentication methods (One-

way key chain & Merkle hash tree)

– Resource consumption via forged data packet• Constrained to one-hop •

– Logically partition MANET via refusing forwarding key update message

• Multiple paths, watchdog

Page 18: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

18

Key Synchronization (Cont-6)

One-way key chain

k0 k1 ki ki+1 kn-1 kn

k0=h(k1) ki=h(ki+1) kn-1=h(kn)

Page 19: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

19

Key Synchronization (Cont-7)

Merkle hash tree

m07

m01

m0 m1

k0 k1

m23

m2 m3

k2 k3

m45

m4 m5

k4 k5

m67

m6 m7

k6 k7

m03 m47

m0=f(k0)

m01=h(m0,m1)

m03=h(m01,m23)

m07=h(m03,m47)

Page 20: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

20

Key Synchronization (Cont-8)

• Performance analysis– Rely on the adopted stateless group key

distribution scheme

– Storage• One message

– Computation

– Communication• Depends on t and number of users using an old key

Page 21: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

21

Packet Retransmission

• Problem statement – The interaction between data transmission and key

distribution. That is, in the case of a lack of key synchronization, a user may receives some (unverified) packets authenticated with a different session key.

Page 22: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

22

Packet Retransmission (Cont-1)

• Possible options– Simply drop

– Buffer and then verify

– Synchronize the keys before sending every data packet

• All of them have serious drawbacks

Page 23: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

23

Packet Retransmission (Cont-2)

• Proposed solution– Drop, synchronize keys, and then retransmit.

– ACK mechanism

– Unicast & broadcast

D

S B2. ReTx Request

4. ReTx Packet

1. Tx failed due tolack of key Syn

3. Key SynA

5. ACK

Page 24: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

24

Algorithm of the proposed scheme

Page 25: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

25

Packet Retransmission (Cont-3)

• Security analysis (possible attacks)

– Resource consumption attack

– Forged ACK message

– Packet modification

Page 26: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

26

Packet Retransmission (Cont-4)

• Performance analysis– Computation

• Authentication & verification

• Pentium 4 2.1 GHz processor *

MD5 216.674 MB/s SHA-1 67.977 MB/s

– Communication• Retransmission rate

Page 27: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

27

Simulation Evaluation

• The simulation modal– 40/80 nodes randomly

placed in a fixed area (a square of size 1km x 1km)

– Random walk with a maximum speed 20m/s

– Communication range 200m

– 2000 simulations, using different random number seeds

0%

20%

40%

60%

80%

100%

20 40 60 80 100

Number of Nodes

Perc

enta

ge o

f Rea

chab

le N

odes

Page 28: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

28

Simulation Evaluation (Cont-2)

Average percentage of nodes which got the latest session key

0%

20%

40%

60%

80%

100%

1 2 3 4 5 6 7 8

Rounds of Key Update (P_lost=0, 40 nodes)

Stateful Scheme

Stateless Scheme

After 1 Cycle of K. Syn

After 2 Cycles of K. Syn

After 3 Cycles of K. Syn

0%

20%

40%

60%

80%

100%

1 2 3 4 5 6 7 8Rounds of Key Update (P_lost=0.25, 40 nodes)

Stateful Scheme

Stateless SchemeAfter 1Cycle of K. Syn

After 2 Cycles of K. SynAfter 3 Cycles of K. Syn

Page 29: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

29

Simulation Evaluation (Cont-3)

Average percentage of nodes which got the latest session key

65%

70%

75%

80%

85%

90%

95%

100%

1 2 3 4 5 6 7 8

Rounds of Key Updaye (P_lost=0, 80 nodes)

Stateful Scheme

Stateless Scheme

After 1 Cycle of K. Syn

After 2 Cycles of K. Syn

After 3 Cycles of K. Syn

65%

70%

75%

80%

85%

90%

95%

100%

1 3 5 7Rounds of Key Updates (P_lost=0.25, 80 nodes)

Stateful Scheme

Stateless Scheme

After 1 Cycle of K. Syn

After 2 Cycles of K. Syn

After 3 Cycles of K. Syn

Page 30: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

30

Simulation Evaluation (Cont-4)

0%

2%

4%

6%

8%

10%

12%

14%

0 0.5 1 1.5 2 2.5 3

Packet Sending Rate (# packets per second )

Re

tra

ns

mis

sio

n R

ate

40 nodes

80 nodes

Page 31: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

31

Implementation

• Based on Netfilter

• Two daemons– Adopt the stateless scheme proposed by Liu & Ning

Pre-Routing ROUTE Forward Post-

Routing

ROUTE

LocalOut

Verification Authentication

LocalIn

Page 32: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

32

Field Test

• Test bed– One Dell P4 laptop with Linux 9.0 (kernel 2.4.20)

– Two Compaq iPAQ 3970 PDAs with Familiar v0.7.2 (kernel 2.4.19-rmk-pxal-hh30)

– Lucent Orinoco wireless cards

• Tests– Key distribution

– User revocation

– Packet authentication and verification

– Key synchronization

Page 33: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

33

Summary

• Network access control is an important issue for MANET

• Cryptography-oriented solution exploiting the stateless feature of stateless group key distribution scheme

• Simulation as well as functioning prototype indicates it practical and effective

Page 34: Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University

34

Question