MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule ›...

106
MANET Security: Background and Distributed Defense Angelos D. Keromytis Network Security Lab Department of Computer Science 1 Monday, June 28, 2010

Transcript of MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule ›...

Page 1: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

MANET Security:Background and Distributed

DefenseAngelos D. KeromytisNetwork Security Lab

Department of Computer Science

1

Monday, June 28, 2010

Page 2: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

MANETs

• Mobile Ad hoc NETworks

- Mobile nodes communicate using wireless links

- Nodes can join or leave the network any time

- Limited resources: Energy and computing

2

Monday, June 28, 2010

Page 3: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

MANETs vs. Sensor Nets

• Base station central point of trust

• Data aggregation

• Limited computing, memory and energy

• Large scale, redundancy

3

Monday, June 28, 2010

Page 4: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Uses of MANETs

• Where infrastructure cannot be deployed, must be deployed rapidly, or is at risk

- military/tactical networks

- disaster response

- certain rural environments

4

Monday, June 28, 2010

Page 5: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

MANETs

5

Monday, June 28, 2010

Page 6: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Security in MANETs- Lack of clear line of defense

• Mobile nodes function as routers

• Wireless channel accessible to both legitimate nodes and attackers

• Many MANET protocols assume trusted and co-operative environment

- Routing: AODV, DSR

- MAC: 802.11

- Compromises and physical capture

- Resource constraints

- Node mobility6

Monday, June 28, 2010

Page 7: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Security in MANETs

- Routing attacks

• misbehaving nodes may attract traffic to see, modify or drop it

- Denial of service attacks

• radio interference

• network congestion

• packet dropping

- All other network attacks apply

7

Monday, June 28, 2010

Page 8: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Securing MANETs

8

MANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

Monday, June 28, 2010

Page 9: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Taxonomy

MANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

9

Monday, June 28, 2010

Page 10: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Key management

• Many attacks prevented using cryptographic means

• Require scalable key management solution

- Public key

• Problem: Availability of CA

- Symmetric keys

• Requirement for sensor networks

10

Monday, June 28, 2010

Page 11: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Public key distribution• Problem: Availability of CA

• Solutions

- Threshold cryptography [Zhou, Haas, Network 1999]

• Divides the private key into n shares (s1,s2,…,sn)

• (t+1) parties can perform operation, t parties cannot; n ≥ 3t+1

- Distributed [Hubaux, Buttyan, Capkun, MobiHOC, 2001]

• Users issue their own certificates; trusts limited number of other certificates

• When two users want to communicate, merge the certificate repositories and find a certificate chain

11

Monday, June 28, 2010

Page 12: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Key management in sensor networks

• Challenges

- Public key system impractical

- Vulnerability of physical capture

- Lack of a-priory knowledge of deployment configuration

- Limited resources

• Key types [Zhu, Setia, Jajodia, CCS 2003]

- Individual key shared with base station

– pairwise key shared with another sensor node

- cluster key shared with multiple neighboring nodes

- group key shared by all the nodes

12

Monday, June 28, 2010

Page 13: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Key pre-distribution• Problem: Not enough space to store pairwise keys for all

possible neighbors

• Solution

- Pre-distribute random subset of keys [Eschenauer, Gligor, CCS 2002]

- Pairwise key between the nodes if they share any of those keys

- Multi-path key establishment for neighbors not sharing keys

- Q-composite random key pre-distribution [Chan, Perrig, Song, S&P 2003]

• Require q common keys from the key ring for a pair of nodes

- Polynomial pool-based key pre-distribution [Liu, Ning, CCS 2003]

• Uses pool of randomly generated bivariate polynomials

• Each node gets a subset of key share13

Monday, June 28, 2010

Page 14: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Key pre-distribution scheme (cont.)• Blom’s key pre-distribution scheme

- G:[λ+1,N] matrix, D:[λ+1,λ+1], A=(D.G)T

- kth row of A and kth column of G stored in node k

- K = A.G, key matrix; λ- secure

• Multiple-space key pre-distribution scheme [Du, Deng, Han, Varshney CCS 2003]

- Generate w key space (D1,G), (D2,G)…(Dw,G)

- A node gets T subset

- Better resilient than previous schemes

• Integrity (I)-codes based on physical layer [Cagalj et. al., S&P 2006]

- Assumption: Cannot change 1 to 0 by the attacker

- Can detect 0 to 1 change by coding

14

Monday, June 28, 2010

Page 15: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Taxonomy

MANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

15

Monday, June 28, 2010

Page 16: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Securing Data• µTESLA: Authenticated broadcast [Perrig, Szewczyk, Wen, Culler, Tygar,

Mobicom 2001]

- Delayed disclosure of symmetric keys

- Requires loose time synchronization and authenticated key-chain commitment

- Each key is a key in hash chain

• Time synchronization [Sun, Ning, Wang, Liu, Zhou, CCS 2006]

- Pairwise time synchronization

• Shared nature of wireless medium calls for recording the time only when the packet is guaranteed to leave

• MAC computation at line rate

- Global time synchronization

• Based on pairwise synchronization

• Need to be resiliant against compromised nodes

• Authenticated local broadcast using µTESLA

16

Monday, June 28, 2010

Page 17: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Securing Data (cont.)• Problem: Compromised sensor nodes may introduce false

data

• Solution

- Hierarchical aggregate computation [Chan, Perrig, Song CCS 2006]

• Aggregation commit phase: Each node commits to the results obtained from its children

• Result checking phase: Each node can verify that their result was taken by the parent

- False data injection [Zhu, Setia, Jajodia, Ning, S&P 2004]

• Compromised node can inject false data; detect upto t compromised nodes

• At least t+1 nodes need to agree on a reading

17

Monday, June 28, 2010

Page 18: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

TaxonomyMANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

18

Monday, June 28, 2010

Page 19: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

MANET routing protocols[Milanovic, Malek, Davidson, Milutinovic, Computer 2004]

• On-demand routing algorithms

- Dynamic source routing (DSR)

- Ad hoc on demand distance vector routing (AODV)

• Link state algorithms

- Optimized link-state routing (OLSR)

- Topology broadcast based on reverse-path forwarding (TBRPF)

• Hybrid approach

- Discovers route only when needed, but use multipoint relays

- Master, gateway and plain nodes

19

Monday, June 28, 2010

Page 20: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Routing Attacks

• Forge initiated routing packets

- Cannot be detected using cryptographic techniques

- IDS (e.g., DMEM) can detect it

• Forge forwarded routing packets and node identity

- Cryptographic techniques can detect it

• Drop forwarded packets

- Can be detected by sender based on acknowledgements

- Reputation-based mechanisms

20

Monday, June 28, 2010

Page 21: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Routing Attacks (cont.)• Rushing attacks

- The attacker forwards the ROUTE REQUEST more quickly than legitimate nodes

• The route is discovered through the attacker

• Worm hole

• Black hole

• Ad Hoc Flooding Attack (AHFA)

- Attacker broadcasts mass route request packets

• JellyFish [Aad, Hubaux, Knightly, MOBICOM 2004]

- Targeted against closed-loop flows such as TCP

- Conforms to all routing and forwarding specifications

- Reorder attacks

• Delivers all the packets, but after placing them in reorder buffer

- Periodic dropping attacks

• Drop all packets for a short duration once per RTO

- Delay variance attacks21

Monday, June 28, 2010

Page 22: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Routing Security

• Ariadne [Hu, Perrig, Johnson, MOBICOM 2002]

- Based on DSR (dynamic source routing)

- Uses TESLA, digital signature or pairwise keys for authentication

- Route discovery

• Target authenticates Route Requests using MAC

• Initiator node verifies the reply using MAC

- Route maintenance

• Route error messages are authenticated

22

Monday, June 28, 2010

Page 23: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Preventing Routing Attacks

• Rushing attacks prevention [Hu, Perig, Johnson, WiSe, 2003]

- Secure neighbor detection

- Each node collects a number of REQUESTs and forwards one

• Flooding Attack Prevention (FAP) [Yi, Dai, Zhang, Zhong, Int. J. of Info. Technology, 2005]

- Neighbors of attacker records the rate of route request

- Denies the requests after threshold is reached

- Easy to break the scheme, if the attacker pretends the request is a forwarded request!

23

Monday, June 28, 2010

Page 24: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Preventing Routing Attacks (cont.)

• Wormhole attack prevention [Hu, Evans, NDSS 2003]

- Directional antennas: Divides the region into 6 zones

- Directional neighbor discovery

• A hears B from the opposite zone of B hears A

• Cannot detect wormhole if nodes are in opposite zones relative to worm hole end points

- Verified neighbor discovery protocol

• A verifier V can verify the link A link

- zone(B,A) != zone(B,V); zone(B,A) != zone(V,A)

- Strict neighbor discovery

• Above scheme fails if A & B are unable to communicate, but close enough to have a verifier that can communicate with both A & B

- Zone(B,V) cannot be both adjacent to zone(B,A) and zone(V,A)

24

Monday, June 28, 2010

Page 25: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Taxonomy

MANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

25

Monday, June 28, 2010

Page 26: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Transport for Mobility• Network and transport layer solution for multi-homing

and mobility [Nikander, Ylitalo,Wall, NDSS 2003]

- IP address has dual role host identity and topological location

• Security problems with multi-homing and mobility

- Address stealing

- Address flooding

• Proposed solution

- Host Identity Protocol (HIP): cryptographic namespace and protocol layer between network and transport layer

- Packet forwarding agents: Forwards packets sent to a given IP address to another IP address

26

Monday, June 28, 2010

Page 27: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

TaxonomyMANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

27

Monday, June 28, 2010

Page 28: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

IDS Architecture• IDS Requirement

- Distributed, without centralized point

• Needs practical and scalable approach to gather evidence from other nodes

- Links are much more unreliable

- Limited bandwidth and computing power

• Solutions

- Local intrusion detection architecture (LIDS) [Albers et. al., WIS, 2002]

• Different LIDS exchange security data and intrusion alerts

• Audit data: SNMP MIBs

• Use of mobile agents to do specific mission in autonomous and asynchronous manner

- Distributed IDS Architecture [Zhang, Lee, Mobicom 2000]

• Local detection engine: input from local data collection

• Cooperative detection engine: input from neighboring nodes

28

Monday, June 28, 2010

Page 29: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Routing attack detection• Routing Attack detection based on specification

- Based on extended finite state automation (EFSA) of AODV [Huang, Lee, RAID 2004]

• Detects invalid state, transition and action violation

- DMEM for OLSR [Tseng, Wang, Ko, Levitt, RAID 2006]

• Detection by validating the consistency among related routing messages

• Example: Neighbors in Hello messages must be reciprocal

• Intrusion response [Wang, Tseng, Levitt, Bishop, RAID 2007]

- Topology dependency index (TDI)

• Number of nodes that cannot be reached without the attacker

- Attack damage index (ADI)

• Number of nodes to which the routing has changed after attacks

- If TDI = 0 or ADI > 2 TDI Isolate attacker

• Model the attacks on AODV protocol using attack tree [Ebinger, Bucher, LNCS, 2006]

- Greatest damage from black hole or wormhole; Easy to perform rushing and Sybil

29

Monday, June 28, 2010

Page 30: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Taxonomy

MANET Security

DetectionPrevention

IDS

Specific attacks

Bad node detection

Specific detectionKey mgmt

Public key

Symmetric key

RoutingData protection

Aggregate computation

Secure routing

DoSSpecification based

Anomaly

Others

Attacks

30

Monday, June 28, 2010

Page 31: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Compromised/Selfish node detection• Tamper resistant hardware

• Node replication attacks [Parno, Perrig, Gligor, IEEE S&P 2005]

- Replicas of a compromised node planted in the network

- Neighbors forward the location claim of a node to randomly selected witnesses

- High probability of collision (birthday paradox)

- Lower overhead if the intermediate routers also acts as witnesses

• Reputation mechanism [Jaramillo, Srikant, Mobicom 2007]

- Co-operation induced by threatening partial or total disconnection

- DARWIN: Avoid retaliation after a node has falsely perceived as selfish; cooperation restored

• Modeled after game theory

• Player that has better standing should proportionately punish its opponents with the difference in the two standing instead of absolute standing of its opponent.

• Collusion resistance31

Monday, June 28, 2010

Page 32: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Other attack detection

• Secure implicit sampling (SIS) [McCune, Shi, Perrig, Reiter S&P 05]

- Detection against denial of broadcast messages

- Elicits authenticated acknowledgements from subset of nodes unpredictable to attacker

- If number of ACKs received is less than a threshold of expected, there is attack

• ACK not received either due to packet loss or due to attack

32

Monday, June 28, 2010

Page 33: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Related work: network capabilities

• Capability implemented in early computer systems (1984)

• “visas” for packets (1989)

• Network capabilities to prevent DoS in wired networks (2003)

- Capability assigned by receivers

- Links in the path between a sender and receiver cannot be snooped

33

Monday, June 28, 2010

Page 34: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

What can we do?

• For open environments: tomorrow

• For closed (e.g., military) environments:

- redesign network from scratch

- Policy enforcement framework

- Distributed Enforcement: all intermediate nodes enforce the capability policy

34

Monday, June 28, 2010

Page 35: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Securing MANETs• Firewalls keep away malicious traffic from set

of nodes

• Placed on the perimeter, enforcing policy

- Nodes inside trusted; outside potential enemies

• MANETs have no well-defined perimeter

35

Monday, June 28, 2010

Page 36: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

36

Distributed Firewalls

Monday, June 28, 2010

Page 37: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

36

Distributed Firewalls

• Traditional Firewalls: broken assumptions

- Inside trusted, outside untrusted

- Machines require uniform external access

Monday, June 28, 2010

Page 38: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

36

Distributed Firewalls

• Traditional Firewalls: broken assumptions

- Inside trusted, outside untrusted

- Machines require uniform external access

• Policy centrally defined; Enforcement at end hosts

• Distributed firewalls sufficient for MANETs?

• No protection of network bandwidth

• No limit on amount of service access

• No protection of routing protocols

Monday, June 28, 2010

Page 39: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Distributed Enforcement

• Capability: access rules and bandwidth constraints represented using capabilities

• Deny-by-default: every packet in the network need to have an associated capability

• Unauthorized traffic dropped closer to the source

• Protects end-host resources and network bandwidth

37

Monday, June 28, 2010

Page 40: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

38

DIPLOMA• DIstributed PoLicy enfOrceMent Architecture for

MANETs

• Enforcement done at all nodes

• Access and bandwidth control

• Capability based access control

- Useful for highly dynamic environments

• Nodes participating not known in advance

• Same IP may be assigned to multiple nodes

- Rule update does not require populating to all the nodes

- Prevents source address spoofing

Monday, June 28, 2010

Page 41: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

39

DIPLOMA Components

• Policy language for access control and bandwidth access

• Rules and algorithms for deriving new policy

• Protocol for communication of policy

• Enforcement of policies

Monday, June 28, 2010

Page 42: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

40

Capability• Access control and bandwidth limitation represented

using capability (KeyNote [BFIK99])

- Identity of the principal

- Identity of the destination

- Type of service and bandwidth

- Expiration date

- Issuer & Signature

• Policy tokens

- Issued by the administrator

• Network capability

- Issued by the receiving node

Monday, June 28, 2010

Page 43: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

41

Policy Token Exampleserial: 130745owner: unit01.nj.army.mil (public key)destination: *.nj.army.milservice: httpsbandwidth: 50kbpsexpiration: 2010-12-31 23:59:59issuer: captain.nj.army.milsignature: sig-rsa 23455656767543566678

Monday, June 28, 2010

Page 44: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

42

Network Capability Example

serial: 1567owner: unit01.nj.army.mil (public key)destination: unit02.nj.army.milbandwidth: 150kbpsexpiration: 2009:10:21 13:05:35issuer: unit02.nj.army.milcomment: Policy allowing the receiverto issue this capability.signature: sig-rsa 238769789789898

Monday, June 28, 2010

Page 45: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

43

Protocol• Capability associated with each communication session

- Transaction identifier and signature

• Capability Establishment

- Source node informs the intermediate nodes about transaction identifier, capability and key for signature

• Smaller keys used for per packet signature

• Sender

- Adds transaction id, sequence number and signature to the packet

• Intermediate nodes and Receiver

- Verifies the packet (probabilistically) for signature and bandwidth

Monday, June 28, 2010

Page 46: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

44

System Architecture

Monday, June 28, 2010

Page 47: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 48: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 49: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 50: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 51: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 52: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 53: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 54: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 55: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 56: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 57: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 58: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

45

System Architecture

Monday, June 28, 2010

Page 59: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

46

Capability Establishment

Monday, June 28, 2010

Page 60: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

47

Data Transfer

Monday, June 28, 2010

Page 61: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

48

Node State• Capability Table (intermediate nodes)

- Sessions passing thru the node

• Transaction Table (sender)

- Sessions initiated by the node

• Issue Table (receiver)

- Network capabilities issued by the node

• Policy Table (sender)

- All the capabilities available to the node

Monday, June 28, 2010

Page 62: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 63: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 64: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 65: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 66: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 67: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 68: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 69: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 70: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

49

Node Operations - Sender

Monday, June 28, 2010

Page 71: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

50

Node Operations – Intermediate Node

Monday, June 28, 2010

Page 72: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

51

Node Operations - Receiver

Monday, June 28, 2010

Page 73: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

52

Routing Traffic

• Attacks can be launched using routing traffic alone

• DIPLOMA limit the number of route requests

- Allow route request only the node has capability

- Limit the number of route request per capability

Monday, June 28, 2010

Page 74: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

53

Multicast Traffic• Multicast Policy Tokens (MPT)

- Contains multicast group and bandwidth allowed

• DIPLOMA enabled On Demand Multicast Routing Protocol [LSG00]

- Join Query and Join Reply has MPT

Monday, June 28, 2010

Page 75: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

54

Challenges

• Route Change

• Selfish Nodes

• Capability Misuse

• Bandwidth Allocation

Monday, June 28, 2010

Page 76: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

55

Route Change• Frequent route change in MANET due to mobility

• New intermediate node get state update from upstream node

- Changes localized

Monday, June 28, 2010

Page 77: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

56

Selfish Nodes

• MANET requires co-operation of nodes

- Routing protocols

- Packet forwarding

• DIPLOMA requires

- Signature verification

• Reward and punishment model to ensure co-operation [JS07]

- Nodes forwarding too many packets with wrong signature is selfish

Monday, June 28, 2010

Page 78: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

57

Capability Misuse• Nodes may reuse the same capability for

multiple sessions

- Consolidated capability

- Multiple disjoint paths

• Distributed IDS to detect it [ZL00]

- Require minimum amount of data exchange

• Capability bandwidth divided into buckets

- Bitmask intersection to detect the reuse

Monday, June 28, 2010

Page 79: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

58

Resource Allocation

• Policy tokens at hosts Access control

• Network capabilities Bandwidth

- Allocated by the receivers according to the policy tokens they have

• How to allocate the bandwidth in the policy?

Monday, June 28, 2010

Page 80: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

59

Feasibility• Memory and CPU per packet high in

MANETS

- Technology trend: Faster and more power efficient processors

- iPhone: 624 MHz Arm-11 processor, 128 MB RAM

• Threat Model and Security Analysis

• GloMoSim Simulator

• Orbit Lab Testbed

Monday, June 28, 2010

Page 81: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

60

GloMoSim• Global Mobile Information

System Simulator

• Discrete event simulator

• A layered approach – communication using APIs

• Added DIPLOMA layer

- Process protocol packets

- Capability establishment and enforcement

- Bandwidth enforcement

- Supported packet processing delay

Monday, June 28, 2010

Page 82: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

60

GloMoSim• Global Mobile Information

System Simulator

• Discrete event simulator

• A layered approach – communication using APIs

• Added DIPLOMA layer

- Process protocol packets

- Capability establishment and enforcement

- Bandwidth enforcement

- Supported packet processing delay

Monday, June 28, 2010

Page 83: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

60

GloMoSim• Global Mobile Information

System Simulator

• Discrete event simulator

• A layered approach – communication using APIs

• Added DIPLOMA layer

- Process protocol packets

- Capability establishment and enforcement

- Bandwidth enforcement

- Supported packet processing delay

DIPLOMA

Monday, June 28, 2010

Page 84: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Parameters of Interest

• Latency of packets

- Time taken for a packet to reach from a source to destination

- First packet latency, Average latency

• Throughput

• Packet Delivery Ratio (PDR)

61

Monday, June 28, 2010

Page 85: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Input Parameters• Radio range = 377m, link bandwidth = 2 Mbps, 802.11

MAC

• Packet processing time = 0.01 mS (equavalent to 100Mbps for 128 B packets)

• Database: insertion = 0.01 mS, lookup = 0.005 mS

• 1024 bit RSA for capability

- Signature 3.159 mS, verification 0.140 mS

• 256 bit for packet signature

- Signature 0.168 mS, Verification 0.0275 mS

62

Monday, June 28, 2010

Page 86: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Latency of first packet

• Capability establishment, database lookup, signature verification, larger header (36B)

• Overhead (35.8 mS, 41.6 mS, 60.9 mS) – About 20.5%

• Line topology (node distance = 200 m)

• CBR 512 B

63

Monday, June 28, 2010

Page 87: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Average Latency

• Database lookup, signature verification, larger header (36B)• Overhead (0.6 mS, 1.2 mS, 1.6 mS) – About 8%

• Line topology • CBR 512 B, 100

mS, 1000 pkts

64

Monday, June 28, 2010

Page 88: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Throughput (CBR)

• Throughput overhead: 2% lower for our scheme

• Line topology • CBR 1400 B, 1

mS

65

Monday, June 28, 2010

Page 89: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Throughput (FTP)

• Throughput overhead: 5.3% lower for our scheme

• Line topology • 10 FTP files

66

Monday, June 28, 2010

Page 90: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Route Change

• Original Drops: 108mS worth of traffic• Our scheme: 155mS

• Line topology • CBR 512 B,

1000 pkts• Path length: 3• Route change at

0.5 S

67

Monday, June 28, 2010

Page 91: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Mobility on Grid

• PDR overhead: 1.6% (50mS), 9.14(25mS) lower for our scheme

• Random topology: 50 nodes, 1200x1200m grid

• CBR 256 B• 5 pairs of traffic• Random way point

mobility

68

Monday, June 28, 2010

Page 92: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Resilience against misbehaving nodes

• S1-D1: CBR 512B, 40mS

• S2-D2: CBR 512B, 20mS

• S3-D3: CBR 512B, 10mS

69

Monday, June 28, 2010

Page 93: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Resilience against misbehaving nodes

70

Monday, June 28, 2010

Page 94: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

71

Orbit Lab

• 400 nodes with 802.11 radios

- 20x20 grid, node 1 m apart

• 2 node sandboxes for testing

• Framework to install and save the images

• Ruby scripts to install, run experiments

• Multi-hop achieved through MAC filtering

Monday, June 28, 2010

Page 95: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

72

Linux Implementation• Without changes to any application

• Implementation using netfilter queue

• iptables gives the packet to user level daemon

• Outgoing Packet

- Establish capability if first packet

- Add transaction id, seq. number, signature

• Transit Packet Validate the packet

• Received Packet

- Packet verification

- Strip the capability headers

• Change MTU size to avoid fragmentation

Monday, June 28, 2010

Page 96: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Implementation

73

Monday, June 28, 2010

Page 97: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

74

Orbit Lab

• 400 nodes with 802.11 radios

- 20x20 grid, node 1 m apart

• 2 node sandboxes for testing

• Framework to install and save the images

• Ruby scripts to install, run experiments

• Multi-hop achieved through MAC filtering

Monday, June 28, 2010

Page 98: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Topology

75

Monday, June 28, 2010

Page 99: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

TCP throughput

76

2

3

4

5

6

7

8

9

10

11

12

13

0 5 10 15 20 25 30 35 40

TCP

Thro

ughp

ut (M

bps)

Packet block size (p)

tcp 2hopstcp 3hopstcp 4hopstcp 5hopstcp 6hops

Monday, June 28, 2010

Page 100: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

UDP throughput

77

2

4

6

8

10

12

14

16

0 5 10 15 20 25 30 35 40

UD

P Th

roug

hput

(Mbp

s)

Packet block size (p)

udp 2hopsudp 3hopsudp 4hopsudp 5hopsudp 6hops

Monday, June 28, 2010

Page 101: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Throughput

78

0

5

10

15

20

25

30

2 3 4 5 6

Thro

ughp

ut (M

bps)

Hop length (H)

UDP (ORG)TCP (ORG)UDP (DIP)TCP (DIP)

Monday, June 28, 2010

Page 102: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

FTP throughput

79

2

4

6

8

10

12

14

16

18

20

22

2 3 4 5 6 7

FTP

Thro

ughp

ut (M

bps)

Number of hops (H)

OriginalDIPLOMA

Monday, June 28, 2010

Page 103: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Attack resilience (local attacker)

80

0

2

4

6

8

10

12

14

16

18

20

2 3 4 5 6

UD

P Th

roug

hput

for 5

M a

lloc

bw (M

bps)

Number of hops (H)

attacker (ORG) good node (ORG)

good node (DIP)attacker (DIP)

Monday, June 28, 2010

Page 104: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

Attack resilience (distant attacker)

81

0

2

4

6

8

10

12

14

16

18

20

3 4 5 6

UD

P Th

roug

hput

for 5

M a

lloc

bw (M

bps)

Number of hops (H)

attacker (ORG)good node (ORG)

good node (DIP)attacker (DIP)

Monday, June 28, 2010

Page 105: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

82

Other experiments

• Similar experiments for multicast

- different topologies, streaming audio/video applications

• Capability misuse detection based on distributed auditing

• However, static topologies

- challenge: introducting (experimenting with) realistic mobility

• mechanism? model?

• What about policy generation?

Monday, June 28, 2010

Page 106: MANET Security: Background and Distributed Defenseswing10.di.uniroma1.it › schedule › MANETs-Capabilities.pdf · Computer Science at Columbia University Network Security Lab Key

Computer Science atColumbia University

Network Security Lab

83

Summary

• MANETs are an interesting problem domain

- resource constraints, trust model, operational environment

- clean-slate vs. add-on security?

- realistic experimentation is challenging

Monday, June 28, 2010