Principles of Ad Hoc Networking Michel Barbeau and Evangelos - - PowerPoint PPT Presentation

principles of ad hoc networking
SMART_READER_LITE
LIVE PREVIEW

Principles of Ad Hoc Networking Michel Barbeau and Evangelos - - PowerPoint PPT Presentation

Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Challenge Wireless Open medium Mobility Handover implies change of security parameters Ad hoc Infrastructure


slide-1
SLIDE 1

Principles of Ad Hoc Networking

Michel Barbeau and Evangelos Kranakis November 12, 2007

slide-2
SLIDE 2

Wireless security challenges Network type Challenge Wireless Open medium Mobility Handover implies change of security parameters Ad hoc Infrastructure based security not applicable Sensor In-network processing

2

slide-3
SLIDE 3

Signature

  • 1. Unforgeability: proof that the signer signed the document
  • 2. Authenticity: convincing of the document’s authenticity
  • 3. Unreusability: signature cannot be “moved” elsewhere
  • 4. Unalterability: document cannot be changed after signing
  • 5. Unrepudiatability: signer cannot later claim: did not sign the

document

3

slide-4
SLIDE 4

Digital signature

  • Set of messages: P; Set of signatures: A; Set of keys: K
  • Signing algorithm: Sigk : P → A, with k ∈ K
  • Verification algorithm: V erk : P × A → {true, false}
  • V erk(x, y) =
  • true

if y = Sigk(x) false if y = Sigk(x).

4

slide-5
SLIDE 5

RSA signature

  • An integer n = pq, the product of two distinct primes p and

q

  • Two integers e, d such that ed ≡ 1 mod φ(n), φ(n) is the Euler

totient function

  • n, e are public; p, q, d are private
  • Signature: Sig(M) ≡ Md mod n
  • Verification: V er(M, N) = true ⇔ M ≡ Ne mod n

5

slide-6
SLIDE 6

ElGamal signature

  • 6
slide-7
SLIDE 7

Constructing one-way hash chains

v H H H H H H H v v v v v v

n−1 n−2 n−3 n−4 2 1

later values earlier values

GENERATE CHAIN USE/REVEAL

7

slide-8
SLIDE 8

Authentication in one-way hash chains

H H v H H H H

i

v j H (v ) = v

i j i−j

8

slide-9
SLIDE 9

Forming a Merkle tree

v v v v v v v v

1 2 3 4 5 6 7

9

slide-10
SLIDE 10

Blinding in Merkle authentication trees

v v v v v v v v

1 2 3 4 5 6 7

u u u u u u u u

1 2 3 4 5 6 7

H H H H H H H H

10

slide-11
SLIDE 11

Recursive hashing in Merkle authentication trees

v v v v v v v v

1 2 3 4 5 6 7

u u u u u u u u

1 2 3 4 5 6 7

u u u u67

23 01 45

u u u

03 47 07

11

slide-12
SLIDE 12

Example of Merkle authentication trees

✁ ✁ ✁ ✂✁✂ ✂✁✂ ✂✁✂ ✄✁✄ ✄✁✄ ✄✁✄ ☎✁☎ ☎✁☎ ☎✁☎ ✆✁✆ ✆✁✆ ✆✁✆ ✝✁✝ ✝✁✝ ✝✁✝ ✞✁✞ ✞✁✞ ✞✁✞ ✟✁✟ ✟✁✟ ✟✁✟ ✠✁✠ ✠✁✠ ✠✁✠ ✡✁✡ ✡✁✡ ✡✁✡

v v v v v v v v

1 2 3 4 5 6 7

u u u u u u u u

1 2 3 4 5 6 7

u u u u67

23 01 45

u u u

03 47 07

path path path path path sibling sibling sibling

12

slide-13
SLIDE 13

The RC4 encryption

1001100 1001111 1000111 1001001 1001110

L O G I N

Message

Text

Message

in ACSII

Key

Stream

Ciphertext 1000100 1000001 1010110 1001001 1000100 0001000 0001110 0010001 0000000 0001010

XOR

13

slide-14
SLIDE 14

Cracking RC4 messages

Ciphertext

1

0001000 0001110 0010001 0000000 0001010

XOR

Ciphertext

2

0001110 0010100 0011010 0000000 0000101 0000110 0011010 0001011 0000000 0001111

J U L I A

2nd Message

Text

1001100 1001111 1000111 1001001 1001110 1001010 1010101 1001100 1001001 1000001 2nd Message

in ACSII XOR

XOR of un encrypted messages

1st

Message

(LOGIN )

in ACSII

14

slide-15
SLIDE 15

ZigBee frame with auxiliary header

Encrypted Payload Message Integrity Code Network Header MAC Header Physical Header

Auxiliary

Header Encrypted Payload Message Integrity Code Network Header MAC Header Physical Header

Auxiliary

Header Encrypted Payload Message Integrity Code MAC Header Physical Header

Auxiliary

Header (a)

(b)

(c) Application

Header

15

slide-16
SLIDE 16

ZigBee network entry

Joiner Router Trust Center (1) Beacon Request (2) Beacon (3) Association Request (5) Association Response

(4) Update-Device

(8) Transport-Key(Network Key)

(7) Transport-Key Joiner-Trust Center Link Key Setup Using SKKE

(9) Transport-Key(Network Key)

(6) Transport-Key

16

slide-17
SLIDE 17

Key establishment using the fuzzy commitment protocol Initiator

Responder

Generate common symmetric key k Derive feature

value v

Compute

e = v xor k

Derive feature

value v'

[hash(k), e]

Compute

k'

= v'xor e

hash(

k)=hash(k'

)?

17

slide-18
SLIDE 18

ECG with IPI markers

IPI

18

slide-19
SLIDE 19

Initiator calculation in the fuzzy commitment protocol

1 1 2 2 3 3 4 4 5 5 6 7 8 6

v=(8.26,1.37)

c=(4,5)

19

slide-20
SLIDE 20

Responder calculation in the fuzzy commitment protocol

1 1 2 2 3 3 4 4 5 5 6 7 8 6

v'=(7.76,0.96)

f(v' - d) = (4,5)

v'-d=(3.50,4.59) 20

slide-21
SLIDE 21

Fuzzy encryption protocol

Sender Receiver Get message m Generate symmetric

key k Derive value v Derive value v' Using v',decommitk

[E [m], C(k, v)]

k

D [E [m]]

k k

21

slide-22
SLIDE 22

Authentication using the fuzzy commitment protocol

m' = D [E [m]]

k k

Sender Receiver Get message m Generate symmetric

key k Derive value v Derive value v' Using v',decommit k

[E [m], MAC [m], C(k, v)]

k k

MAC [

m'

] = MAC [m]?

k k 22

slide-23
SLIDE 23

Example of SEAD implementation (only indices are depicted)

15 14 13 12 11 10 9 7 8 6 5 4 3 2 1

23

slide-24
SLIDE 24

Example of hash tree chain. One-way chain generation

24

slide-25
SLIDE 25

Merkle tree

25

slide-26
SLIDE 26

Example of using the hash tree chain

H( ) v H( ) H( ) H( ) vi || vi || v || i || i H H H H H H H H 1 2 3 b b b b

2 3 1

H( ) H( ) b0 ||b1 b2 b3 || = b01 = b23 H H H H b01 ||b23 H( ) H H v v i−1 i Hash−Tree

26

slide-27
SLIDE 27

The bin-and-balls signature scheme

s1 s2 s3 s4 st Gh

27

slide-28
SLIDE 28

A single verifier v (inside region R) and a prover p (not depicted)

R v

28

slide-29
SLIDE 29

A single verifier at the center of a circular region R where there is an upper bound of ∆p on the processing delay

v s ∆p

R = RoA(v,0)

p

RoA(v, )

29

slide-30
SLIDE 30

Wormhole attack

X Y A B

30

slide-31
SLIDE 31

Impact on routing protocols: one hop tunneling

X Y A B C

31

slide-32
SLIDE 32

Partitioning the range of the sensors into six zones numbered 1, 2, . . . , 6 clockwise

1 2 3 4 5 6

32

slide-33
SLIDE 33

Bidirectional communication link

A B

33

slide-34
SLIDE 34

Wormhole vulnerability in the first protocol

B Region I Region II Y X A C 2 3 4 5 6 1 1 2 3 4 5 6

34

slide-35
SLIDE 35

Cooperating with neighbors to prevent protocol vulnerabilities

B Region I Region II Y X 1 2 3 4 5 6 1 2 3 4 5 6 D A C

35

slide-36
SLIDE 36

Verifier region

B A

36

slide-37
SLIDE 37

Worawannotai attack

A B V X

37

slide-38
SLIDE 38

Preventing the Worawannotai attack A B V X a b

38

slide-39
SLIDE 39

Verifier region

A B V X a b c d

39

slide-40
SLIDE 40

Sequence number attacks

s a b c d e f g v source malicious destination 4 hops 3 hops

40

slide-41
SLIDE 41

Impact of location of base stations on disrupting traffic in a sensor network delimited by a square region

41

slide-42
SLIDE 42

Omnidirectional and directional antennas

Directional Omnidirectional A B A B

42