passive routing attacks in manet
play

Passive Routing Attacks in MANET ! Location privacy attack - PDF document

ANODR : AN onymous O n- D emand R outing with Untraceable Routes for Mobile Ad Hoc Networks MobiHOC 2003 June 3, 2003 Jiejun Kong, Xiaoyan Hong Wireless-Adaptive-Mobility Laboratory Department of Computer Science University of California,


  1. ANODR : AN onymous O n- D emand R outing with Untraceable Routes for Mobile Ad Hoc Networks MobiHOC 2003 June 3, 2003 Jiejun Kong, Xiaoyan Hong Wireless-Adaptive-Mobility Laboratory Department of Computer Science University of California, Los Angeles Passive Routing Attacks in MANET Location Privacy Attack: Location Privacy Attack: Correlate nodes’ ids and their locations Correlate nodes’ ids and their locations Motion Inference Attack: Motion Inference Attack: Visualize nodes’ motion patterns Visualize nodes’ motion patterns Route Tracing Attack: Route Tracing Attack: Visualize (multi-hop) ad hoc routes Visualize (multi-hop) ad hoc routes Passive Attacker 2/20 MobiHOC 2003 1

  2. Passive Routing Attacks in MANET ! Location privacy attack – Correlate a mobile node with its locations (at the granularity of adversary’s adjustable radio receiving range) – Counting/analyzing mobile nodes in a cell ! Route tracing attack – Visualizing ad hoc routes ! Motion inference attack – Visualizing motion patterns of mobile nodes – Deducing motion pattern of a set of nodes ! Other traffic analysis – Analyzing packet flow metrics (as in Internet traffic analysis) ! Orthogonal to routing disruption attacks 3/20 MobiHOC 2003 Adversary in Mobile Ad Hoc Networks ! External adversary : wireless link intruder – Eavesdropper – Traffic analyst (not necessary to break cryptosystem) – Unbounded interception: adversary can sniff anywhere anytime ! Internal adversary : mobile node intruder – Capture, compromise, tamper – Passive internal adversary is hard to detect due to lack of exhibition of malicious behavior – Bounded : otherwise secure networking is impossible 4/20 MobiHOC 2003 2

  3. Problems of Ad Hoc Routing ! Must rely on neighbors in data forwarding – Neighbors need to know routing info – “ I can forward your packets”: All existing ad hoc routing protocols reveal nodes’ identity to its neighbors — abundant chances for passive attackers to obtain static info ! [ MobiHOC’01, BasagniHBR ] Encrypted routing information can be decrypted by other internal nodes – Traceable by traffic analysts (without compromising cryptographically protected information) – Allows internal adversary, no location privacy support 5/20 MobiHOC 2003 Motivations for New Secure Routing ! Resistance against location privacy, route tracing, motion inference attacks – Using established security methodologies ! Efficiency – Comparable to existing ad hoc routing schemes ! Low probability of detection, interception, and exploitation (LPD/LPI/LPE) – Focus on data forwarding, not on physical layer radio signal processing 6/20 MobiHOC 2003 3

  4. Related Work ! Other on-demand routing – DSR, AODV ! Other anonymity research for wired network – Onion routing, Crowds, Hordes ! Other MANET security protocols with orthogonal goals – For routing integrity: SEAD, Ariadne, ARAN, etc. – For network access control: URSA, etc. ! Either do not address anonymity & untraceability concerns, or not fit in MANET 7/20 MobiHOC 2003 Design Challenges ! Passive traffic analysis – Side channels: time correlation, content correlation ! Passive internal adversary – Simple encryption does not solve the problem ! Intrusion Tolerance – No single point of compromise or failure – Fully distributed design, no centralized control in MANET ! Avoid expensive processing overheads – Our measurement & simulation show expensive processing overheads cause non-trivial routing performance degradation 8/20 MobiHOC 2003 4

  5. Processing Overhead (Measured on iPAQ3670, Intel StrongARM 206MHz CPU) Asymmetric key Single Single cryptosystem decryption/signing encryption/verifying ECAES (160-bit key) 42 ms 160 ms RSA (1024-bit key) 900 ms 30 ms El Gamal (1024-bit key) 80 ms 100 ms Symmetric key Decryption Encryption cryptosystem (128-bit) bit-rate bit-rate AES/Rijndael 29.2 Mbps 29.1 Mbps RC6 53.8 Mbps 49.2 Mbps Mars 36.8 Mbps 36.8 Mbps Serpent 15.2 Mbps 17.2 Mbps TwoFish 30.9 Mbps 30.8 Mbps 9/20 MobiHOC 2003 Goal and Design ! Efficient routing while anonymous & untraceable to all thy (legitimate & adversarial) neighbors: Mission impossible? ! Clues: MANET on-demand routing likely has two broadcast mechanisms – Global route discovery (aka. RREQ flooding) – Per-hop wireless local radio broadcast ! Our design – On demand routing – Broadcast with anonymous trapdoor assignment 10/20 MobiHOC 2003 5

  6. Framework of Anonymous Route Discovery (between src and dest) ! Similar to existing on demand routing schemes – Route-REQuest 〈 〈 〈 〈 RREQ,seqnum, to_be_opened_by_dest anonymous_trapdoor 〉 〉 〉 〉 – Route-REPly 〈 RREP, presented_by_dest anonymous_proof 〉 〈 〈 〈 〉 〉 〉 ! A global trapdoor can only be opened by dest – Not required to know where dest is – dest can present an anonymous proof of door opening ! Need more design to address per-hop 11/20 MobiHOC 2003 Per-hop Local Wireless Broadcast with Anonymous Trapdoor Assignment Efficient Efficient Trapdoor Info Trapdoor Info ! Trapdoored messages are delivered to specific node(s) – But not other nodes in the same receiving group 12/20 MobiHOC 2003 6

  7. ANODR Route Discovery (using TBO - Trapdoor Boomerang Onion) E Nym E Nym D Route-REPly Nym C C D K A ( N A , hello) K B ( N B , K A ( N A , hello)) K C ( N C , K B ( N B , K A ( N A , hello))) K A ( N A , hello) K C ( N C , K B ( N B , K A ( N A , hello))) K B ( N B , K A ( N A , hello)) B Nym B ! ANODR : destination E receives A 〈 RREQ, seqnum, open_by_ E , onion 〉 〈 〈 〈 〉 〉 〉 where Route-REQuest onion = K D ( N D , K C ( N C , K B ( N B , K A ( N A , hello)))) 〈 RREP, proof_from_ E , onion, Nym X 〉 〈 〉 〈 〈 〉 〉 Nym X is selected by X and shared on the hop 13/20 MobiHOC 2003 Make On demand Routes Untraceable ! ANODR-TBO is robust against node intrusion – Fully anonymous: no node identity revealed – Fully distributed control: avoid single point of compromise – Multiple paths feasible: avoid single point of failure ! So far anonymous only, and symmetric key only – More complexity in realizing untraceability to hide side channels & resist traffic analysis ! Protect RREP flow – Need an asymmetric secret channel • Modified RREQ: Embed a temporary asymmetric key ecpk1 〈 RREQ, ecpk1 , seqnum, open_by_ E , onion 〉 〈 〉 〈 〈 〉 〉 • Modified RREP: Exchange a secret seed Nym K seed 〈 〈 〈 〈 RREP, ecpk1 ( K seed ) , K seed ( proof_from_ E , onion ) 〉 〉 〉 〉 14/20 MobiHOC 2003 7

  8. Make Routes Untraceable (cont’d) ! Protect reused route pseudonyms – Using K seed to do self-synchronized route pseudonym update – So far all pseudonyms/aliases are one-time aliases ! ! Playout “Mixing” Buffer, Re-order, Batch send, – Resist traffic analysis: Insert dummy/decoy packets Time correlation Alice Bob MIX Content correlation Eve 15/20 MobiHOC 2003  Simulation QualNet    ! Metrics – Data delivery ratio, end-to-end latency, normalized overhead, playout “mixing” performance ! Impact of – Processing overhead (no routing optimization on ANODRs) 1) AODV with routing optimization and no cryptographic overhead 2) Anonymous-only ANODR-TBO: symmetric key processing only 3) Anonymous+Untraceable ANODR-TBO: 2) + limited asymmetric key processing 4) ANODR-PO , a naïve MIX-Net ported from wired networks, asymmetric key processing in anonymous route discovery Communication overhead ( ≈ ≈ 400bit onion, etc.) ≈ ≈ – – Mobility – Playout “mixing” buffer size r X & window size t X 16/20 MobiHOC 2003 8

  9. Evaluation: Delivery Ratio & Latency (vs. mobility) Anonymous+Untraceable Anonymous only Anonymous+Untraceable Anonymous only Anonymous only Anonymous+Untraceable Anonymous only Anonymous+Untraceable ! Acceptable delivery ratio degradation for both “anonymous-only” ( ≈ ≈ 3%) and “anonymous + untraceable” ( ≈ ≈ ≈ ≈ 12%) schemes ≈ ≈ ! If without untraceability support (which uses asymmetric key cryptosystems) , ANODR-TBO’s performance is similar to AODV – Asymmetric key processings cause performance degradation 17/20 MobiHOC 2003 Evaluation: Control Packet Overhead (vs. mobility) Anonymous+Untraceable Anonymous+Untraceable Anonymous only Anonymous only Anonymous+Untraceable Anonymous+Untraceable Anonymous only Anonymous only ! Control packet overhead largely due to onion size – Elliptic curves cryptosystems feature comparable storage (but not latency) overhead with symmetric key cryptosystems 18/20 MobiHOC 2003 9

  10. Evaluation: Playout “Mixing” Performance (vs. r X ) Anonymous+Untraceable ! Playout buffer size r X and playout time window size t X are critical parameters – In some cases, dummy/data ratio is predictable ! May consume resources like battery power, but does not significantly affect data delivery ratio 19/20 MobiHOC 2003 Conclusions and Future Work ! Anonymous on demand routing is feasible and efficient in MANET – Comparable performance to existing on-demand protocol – Intrusion tolerant, esp. against passive adversaries ! Adding untraceable route support is feasible with some efficiency degradation – Limited asymmetric key processing – Tradeoffs in playout “mixing” ! Future improvements – Adaptive “mixing” for better performance – Integration with routing integrity countermeasures – Multi-path routes to address mobility and disruption 20/20 MobiHOC 2003 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend