secure routing and intrusion detection for mobile ad hoc networks secure routing and intrusion...

16
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim Parker Anupam Joshi Michaela Iorga Tom Karygiannis National Institu for Standards and Technology March 10, 2005 March 10, 2005 Kauai Island, Hawaii Kauai Island, Hawaii

Post on 19-Dec-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks

Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks

Anand PatwardhanJim ParkerAnupam Joshi

Michaela IorgaTom Karygiannis

National Institutefor Standards

and Technology

National Institutefor Standards

and Technology

March 10, 2005March 10, 2005Kauai Island, HawaiiKauai Island, Hawaii

March 10, 2005March 10, 2005Kauai Island, HawaiiKauai Island, Hawaii

Page 2: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

ChallengesChallenges• Wireless communication

• Short range (802.11, Bluetooth etc.)• Open medium

• Identification and Authentication• PKI based solutions infeasible• No prior trust relationships

• Routing• Based on dynamic cooperative peer relations• Key to survival of MANET

• Device constraints• Power Conservation• Finite Storage• Computation power

Page 3: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

AODVAODV

• Ad hoc On-demand Distance Vector routing protocol

• All up to date routes are not maintained at every node

• Minimizes number of broadcasts by creating routes on-demand

• Routes are created as and when required

• Route remains valid until destination is unreachable or the route is no longer needed

• Adaptation to dynamic link conditions

• Low processing and Memory Overhead

• Low Network Utilization

Page 4: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

AODV MessagingAODV Messaging

• Source Node – node originating routing request

• Destination Node – sends route reply

• Sequence Numbers – used to avoid loops/replay

• Route Request – route discovery message

• Route Reply – destination to source message

• Route Error – destination node unreachable

• Intermediate Node Path List – list of nodes traversed along message path

Page 5: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

AttacksAttacks

• Attacks can be broadly classified into• Routing disruption attacks• Resource consumption attacks• Attacks on data traffic

• Objective: Isolate and deny resources to intrusive and/or chronically faulty nodes

Page 6: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Routing disruptionsRouting disruptions

• Malicious nodes may:• convince nodes that it is routing packets to

the correct destination when it is not,• fabricate route-maintenance messages,• refuse to forward or simply drop packets,• spoof routing addresses,• and/or modify messages.

Page 7: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Secure Routing in MANETsSecure Routing in MANETs

• Each node is a Router• Identification and Authentication

• Statistically Unique and Cryptographically Verifiable (SUCV) identifiers

• No prior trust relationships required• Large address space of IPv6 suitable for

SUCVs• Secure binding between IPv6 address and

Public key

Page 8: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Secure Routing in MANETsSecure Routing in MANETs

• Routing state• Additional fields in control messages to protect data

• SUCV: IPv6 address and Public Key• Secure binding, computationally infeasible to compute

private key in order to spoof• Routing messages protected against mangling and

masquerading

Page 9: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Binding IP Address and RSA Public Key

2003:13:0:0:16ba:ae7f:8aea:dab3 2003:33:0:0:31ba:af0f:82ea:a0bIP: IP:64-bit Network Specific ID 64-bit Hash of Public

Key

64-bit Hash of Public Key

64-bit Network Specific ID

RSA Public Key RSA Public Key

Signature Signature

MESSAGE: MESSAGE:

Securing the IPv6 AODVSecuring the IPv6 AODV

Page 10: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

• Wired Networks– Traffic monitoring at routers, gateways,

firewalls– Static routes– Physical security

• MANETs– Mobile nodes– Other radio interference– Reliance on cooperative mechanisms for

routing– Intrusion detection limited to devices within

radio-range

Intrusion DetectionIntrusion Detection

Page 11: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

• Identity– Use SUCVs

• Mobility– False positives

• Scalability– Large radio-ranges or dense networks

• Aggregation of data– Communicate intrusions data to warn others

Intrusion Detection ChallengesIntrusion Detection Challenges

Page 12: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Packet ForwardingPacket Forwarding

A

C

B

Datagram dgram_in has:Source IPv6 address, x U – {B,C}Destination IPv6 address, y U – {B,C} MAC source, mac(u), u U – {B,C}MAC destination, mac(B)

Corresponding dgram_out must have:Source IPv6 address, xDestination IPv6 address, yMAC source, mac(B)MAC destination, mac(u), u ε U – {B,C}

dgram_in dgram_out

Page 13: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Stateful Packet MonitoringStateful Packet Monitoring

AODV TCP

IPv6

Ethernet Frame

{ RREQ, RREP, RERR }{ TCP Sequence no., TCP checksum }

Updatein-memoryHash table

Build andMaintainNeighbor table(mac, ipv6) pairsAnd route status

From the packet capture library (pcap)

Packets that should be forwarded

Page 14: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Example ScenarioExample Scenario

Page 15: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

• Active Response

• Nodes send out accusations on events that they directly observe

• Accusations are signed so accuser is accountable

• No Hearsay is propagated

• All nodes have same information on which to base decisions

• Combine cross layer evidence to evaluate trust between MANET nodes

• Design and develop a secure trust routing protocol

Future WorkFuture Work

Page 16: Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim

Additional InformationAdditional Information

• UMBC• http://ebiquity.umbc.edu

• NIST• http://csrc.nist.gov/manet