a test bed for mobile ad hoc networks
play

A Test-Bed for Mobile Ad-hoc Networks How Much Can Watchdogs Really - PowerPoint PPT Presentation

A Test-Bed for Mobile Ad-hoc Networks How Much Can Watchdogs Really Do? Sonja Buchegger, Cedric Tissieres, Jean-Yves Le Boudec EPFL (Swiss Federal Institute of Technology Lausanne) WMCSA, December 3, 2004 12/3/04 A Test-Bed for Mobile


  1. A Test-Bed for Mobile Ad-hoc Networks How Much Can Watchdogs Really Do? Sonja Buchegger, Cedric Tissieres, Jean-Yves Le Boudec EPFL (Swiss Federal Institute of Technology Lausanne) WMCSA, December 3, 2004 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 1

  2. � � � � � � � � � Presentation Outline Problem: Detecting Misbehavior in Mobile Ad-hoc Networks Attacks on Dynamic Source Routing (DSR) Detectability of Attacks Proposed Solution: Enhanced Passive Acknowledgment Test-Bed Performance Evaluation: Some Experimental Results Related Work Conclusions 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 2

  3. Mobile Ad-hoc Networks Network of devices, no infrastructure, nodes forward packets for others. Nodes cooperate to communicate. 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 3

  4. But Why Cooperate? Misbehavior Pays Off Selfish: to save power Example: No or incorrect forwarding Malicious: to attack the net Example: Route deviation Faulty: (no reason) Example: Repeating packets 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 4

  5. Here’s the Dilemma! Tragedy of the Commons: Free ground for everyone to let sheep graze Individually: good to put many sheep Overall: too many sheep! 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 5

  6. � � Problem Statement How can we make a system work despite misbehavior? Which types of misbehavior are actually detectable and how? 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 6

  7. Background: Dynamic Source Routing (DSR) 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 7

  8. DSR - Route Request Route Request(E[A]) B A R o R u t e ( R o e D q Route Request u u e s t [ ( E t A [ A e Route Request(E[A]) , B ] , ) R B E e ] ) q (E[A,B]) u e s t Route Request(E[A,C]) C D Cache: E 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 8

  9. DSR - Route Reply Route Reply(A, [E,B,A]) B Route Reply(A, [E,B,A]) A Route Reply(A, [E,D,C,A]) E Route Reply(A, [E,D,C,A]) C D Cache: E 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 9

  10. DSR – Data B A Data(E, [A,C,D]) E ) ] D , C , A [ , E ( a t a D Data(E, [A,C,D]) C D Cache: E 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 10

  11. � � � Acknowledgments in DSR Explicit ACK Passive ACK Link-layer notification 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 11

  12. � � � � � Enhanced Passive Acknowledgment PACK: Overhearing of A Forwarding Tampering Fabrication B In addition: Packet Reception C 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 12

  13. � � � � � � � � � � � � � � � � � � Attacks on DSR Dropping Attacks Fabrication Attacks All or partial Forged RERR Omit Route Error Spoofed RREQ Modification Attacks Forged RREP Forged routing packets Frequent RREQ Added nodes Timing Attacks Last Hop External RREP disproportionally fast Salvage intact routes Loops Tamper with RREQ, RREP Decrease TTL 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 13

  14. � � � � � Test-Bed Components Piconet with PACK, enhanced PACK, and attacks APE Netfilter with promiscuous mode Pcmcia-cs with promiscuous mode Setup: Laptops with Linux kernels 2.4.19 and 2.4.20, Orinoco Classic Gold 802.11b cards 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 14

  15. Test-Bed Architecture 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 15

  16. � � � � � � � � � � � � � Implemented Example Attacks Header Modification Partial Dropping Selfish Attacks Attack works! Remove from RREP RERR Fabrication RERR modification Attack works! Attacks work! Malicious Attacks Change Source Route RERR destination Attacks work! 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 16

  17. Experimental Results 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 17

  18. Experimental Results II 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 18

  19. � � � � Related Work: Economic Incentives Forwarding is Solution only for the rewarded. non-forwarding type of misbehavior. Target: selfish/rational nodes Examples: nuglets/counters, Crowcroft, Sprite 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 19

  20. � � � � Related Work: Secure Routing Solution only for route Using Cryptography to discovery. Nodes can secure route discovery still deviate traffic or Target: malicious drop packets. nodes Examples: Ariadne, SRP, S-AODV, BISS 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 20

  21. � � � � � � � � � Related Work: Reputation Systems 1 In MANET or P2P: Either Keep track of Use only first-hand misbehaving nodes, information, so only exclude them detect neighbors, or Target: misbehaving are vulnerable to nodes regardless of spurious ratings, or reason assume trust Examples: Watchdog, transitivity, or CORE, Context, only consider OCEAN, ID, Aberer, negative (positive) SECURE information 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 21

  22. � � � � � Related Work: Reputation Systems 2 E-Commerce Centralized History of transactions for future choice of partners Target: human decision makers, agents Examples: E-Bay 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 22

  23. � � � � � Solution Proposal: CONFIDANT Target both routing and forwarding misbehavior Regardless whether selfish, faulty, or malicious Be able to detect misbehavior before meeting (use second-hand information) Cope with spurious ratings Fully distributed 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 23

  24. ✁ ✂ � ✁ � ✂ ✁ ✂ Purpose of CONFIDANT CONFIDANT detects misbehaving nodes by means of observation or reports about several types of attacks and thus allows nodes to route around misbehaved nodes and to isolate misbehaved nodes from the network, so that misbehavior does not pay off, cannot continue, and routes are functional. 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 24

  25. Misbehavior F C B D A E G 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 25

  26. Publication F C B D A E G 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 26

  27. Isolation and Rerouting F C B D A E G 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 27

  28. � � � � � Conclusions Watchdogs can work well Enhanced Passive ACK can detect quite a lot Watchdogs with enhanced PACK can give useful input to misbehavior detection and reputation systems Need to do larger test-bed experiments to find limitations, false positives Make code and documentation freely available 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 28

  29. � � � Watch This Space! Code and Documentation will be available from http://icapeople.epfl.ch/sbuchegg Soon. 12/3/04 A Test-Bed for Mobile Ad-hoc Networks S. Buchegger, C. Tissieres, JY. Le Boudec 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend