Security of ad hoc networks

14
Security of Ad-Hoc Networks -Presented By- Jayesh Rane R.C.Patel Institute of Technology, Shirpur. -A Presentation on- Converges ‘12

description

this presentation gives you best you want in ad hoc networks and wireless networking

Transcript of Security of ad hoc networks

Page 1: Security of ad hoc networks

Security of Ad-Hoc Networks

-Presented By-Jayesh Rane

R.C.Patel Institute of Technology, Shirpur.

-A Presentation on-

Converges ‘12

Page 2: Security of ad hoc networks

2

Traditional Wireless Network

Infrastructure– base stations– high speed backbone– on-line servers

Network operators– operate and maintain the system– determine policies

Single-hop wireless communication

high speed backbonehigh speed backbone

basestation mobile

station

on-lineserver

Security in Ad-Hoc Networks

Page 3: Security of ad hoc networks

Security in Ad-Hoc Networks 3

Wireless Ad-Hoc Networks

No infrastructure– no base stations– no backbone– no servers ( P2P)

No network operators– self-organization– self-configuration– self-healing

Multi-hop wireless communication

Page 4: Security of ad hoc networks

Security in Ad-Hoc Networks 4

Motivation

Security is the most often cited concern with wireless networks

Wireless networks pose unique security problems

Power computation constraints are often higher in wireless networks, making security requirements different

Page 5: Security of ad hoc networks

Security in Ad-Hoc Networks 5

Attacks on Ad-Hoc Networks

• Place of disclosure: Location disclosure Attacks that target Confidentiality requirements of the

ad hoc network.• A black hole: Attack malicious node and enters false answers route to route requests it

receives• Wormholes: It involves co-operation between the two malicious nodes that

participate in the network to appear one attacker.• Denial of Service: Specific instances of denial of service attacks include the routing table

overflow and the sleep deprivation torture.

Page 6: Security of ad hoc networks

Security in Ad-Hoc Networks 6

Why Security Required?

Data confidentiality: keep data secret

Data integrity: prevent data from being altered

Data freshness: data must be recent

Data availability: data should be available on request

Data authentication: confirmation that data or request came from a specific, valid sender

Page 7: Security of ad hoc networks

Security in Ad-Hoc Networks 7

Security Challenges

Vulnerability of channels Messages can be overheard and fake messages can be introduced into the

network

Vulnerability of nodes Nodes do not usually reside in physically protected places

Lack of infrastructure Special networks should operate independently of any fixed infrastructure.

Dynamic Topology The permanent changes of topology require sophisticated routing protocols

Page 8: Security of ad hoc networks

Security in Ad-Hoc Networks 8

Solution against Attacks

1. Model Based on TTP(Third Trusted Party)

Page 9: Security of ad hoc networks

Security in Ad-Hoc Networks 9

Solution against Attacks(cont…)

2. Secure Aware Protocol (For Blackhole Attack)

Improve the relevance of the routes

discovered by ad hoc routing protocols.

Embed security metric into the RREQ packet

Authenticated users belonging to same

trust level share a secret key

Page 10: Security of ad hoc networks

Security in Ad-Hoc Networks 10

Solution against Attacks

3. Packet Leashes (for Wormhole Attacks)

The recipient of the packet is within a certain distance from the

sender

Each node must know its own location; all nodes must have loosely

synchronized clocks

Page 11: Security of ad hoc networks

Security in Ad-Hoc Networks 11

Research Directions

• Decentralized public-key management schemes– using threshold cryptography– exploiting mobility and secure side channels

• Secure ad hoc routing– various schemes for authenticating routing information that is distributed or exchanged

among the nodes

• Incentives for co-operation– micro-payment based schemes– reputation based schemes

• Low cost cryptographic primitives (algorithms and protocols)

Page 12: Security of ad hoc networks

Security in Ad-Hoc Networks 12

Conclusion

• Security in ad hoc networks is a very challenging issue• Basic Mechanisms

– Difficult to force the nodes to collaborate– No standard routing protocol yet

• Because of their characteristics, ad hoc networks, are open especially to Denial of service attacks

• Classical security solutions are not suited for ad hoc networks – Security services should be distributed

• Standard protocols?– At the moment no universal solution

Page 13: Security of ad hoc networks

Security in Ad-Hoc Networks 13

Summary

Traditional Wireless Networks

Attacks on Ad-Hoc Networks

Solutions for Challenges» Model based on TTP» Protection against Black Holes» Protection against Wormholes

Wireless Ad-Hoc Networks

Research Directions Conclusion

Why Security Required? Security Challenges

Page 14: Security of ad hoc networks

Security in Ad-Hoc Networks 14

QUESTIONS….?