Secure Geographical Routing Vivek Pathak and Liviu Iftode Location - - PowerPoint PPT Presentation

secure geographical routing
SMART_READER_LITE
LIVE PREVIEW

Secure Geographical Routing Vivek Pathak and Liviu Iftode Location - - PowerPoint PPT Presentation

Secure Geographical Routing Vivek Pathak and Liviu Iftode Location Authenticating geographical location False Location Attacks Motivations Economic Benefit of misreporting location Strategic Battlefield Privacy


slide-1
SLIDE 1

Secure Geographical Routing

Vivek Pathak and Liviu Iftode

slide-2
SLIDE 2

Location

 Authenticating geographical location

slide-3
SLIDE 3

False Location Attacks

 Motivations

Economic

 Benefit of

misreporting location

Strategic

 Battlefield

slide-4
SLIDE 4

Privacy

 Location privacy

Surveillance Crime

 Home location

slide-5
SLIDE 5

Outline of the Talk

 Our solution  Simulation studies

Overhead Attack scenarios

 Conclusion

Future work

slide-6
SLIDE 6

Solution Approach

 Ad-hoc network  Nodes have GPS

 Cell phones  Cars

 Geographic communication

 Anonymous nodes  Location authentication

slide-7
SLIDE 7

Geographical Routing Greedy mode

 Ad-hoc routing protocol

 Stateless*  Route closest to the destination  Karp and Kung – MobiCom 2000

 Periodic node beacon

 Transmit node location

slide-8
SLIDE 8

Geographic Routing Perimeter Mode

 Greedy mode failure

 Enter perimeter mode to route around the

network hole

slide-9
SLIDE 9

Features of Geographical Routing

 Highly effective ad-hoc routing protocol

Stateless

 Handle mobility  Only local one-hop state  Scalable

 Large number of nodes  Large number of destinations

 Nodes should “know” their location

slide-10
SLIDE 10

Traditional Geographic Routing

 Use case from Karp & Kung

Find location of the node of interest Geographic routing finds route to location

 Vulnerabilities

Location errors and attacks Location privacy

slide-11
SLIDE 11

Our Solution

 Geographical secure path routing  Resilient to malicious nodes

 False location attack  Other malicious behavior like dropping packets etc.

 Infrastructure free authentication

 Public key of destination  Location of destination  Path taken by a routed message

slide-12
SLIDE 12

Geographical Authentication Model

 Nodes are anonymous

 Use temporary pseudonyms  Generate their own key pairs  All messages are signed

 Locations mapped to integer

vector space

 Application dependent global

constant for mapping

11.118N 55.551W

A

{1111,5555} {1110,5556}

B C

2m/s {1111,5556} {1110,5555}

slide-13
SLIDE 13

Assumptions

 Wireless network

 Bi-directional links

 802.11 MAC

 Physical layer defense against Jamming

 Spread spectrum techniques

 Global range limitation  Overhear transmissions of neighbors

 Adversaries can not affect honest nodes

 Reception or transmission

slide-14
SLIDE 14

Detecting Malicious Neighbors

 Each node detects malicious

neighbors

 Range constraint violation  Overhear malicious forwarding

behavior

 Takes corrective action  Ignore malicious node for

routing

 Malicious actions are provable

because messages are signed

Range R T1 A B T1

False Location Advertised by T1

T2 T2

False Location Advertised by T2

C

slide-15
SLIDE 15

One-hop Public-key Authentication

 Nodes generate their own key

pairs

 Beacon includes public key

 Public keys are well known locally

 One hop authentication through

challenge response

 Man in the middle attack is

impossible in wireless network

A B Public Key Location Time Beacon

slide-16
SLIDE 16

One-hop Public-key Authentication

 Nodes generate their own key

pairs

 Beacon includes public key

 Public keys are well known locally

 One hop authentication through

challenge response

 Man in the middle attack is

impossible in wireless network

A B Nonce Challenge

slide-17
SLIDE 17

One-hop Public-key Authentication

 Nodes generate their own key

pairs

 Beacon includes public key

 Public keys are well known locally

 One hop authentication through

challenge response

 Man in the middle attack is

impossible in wireless network

A B Decrypted Nonce Nonce Response

slide-18
SLIDE 18

Recursive Challenge Response

 Remote keys are

recursively authenticated

 From one hop to another

 Two-hop key is authentic

 If one-hop is authentic  If B is honest

A C B Nonce Challenge

slide-19
SLIDE 19

Recursive Challenge Response

 Remote keys are

recursively authenticated

 From one hop to another

 Two-hop key is authentic

 If one-hop is authentic  If B is honest

A C B Nonce decrypted with two keys Nonce Response

slide-20
SLIDE 20

Pipelined Challenge Response

 Challenge response latency

 Pipelining for performance

 Remove latency

 Get identical response

slide-21
SLIDE 21

Proof of Path

 Recursive challenge response

 Authenticates public key at end-point  Location of the end-point is insecure

 Proof of path

 Packet contains list of tokens  Append to the list at each hop

Nonce Location C C B A Decrypted Nonce Nonce Loc B Loc C

slide-22
SLIDE 22

Proof of Path Mechanism

 Verification before forwarding

 Location list satisfies range constraint  Integrity of nonce decryption

 False location attack

 Must be within range constraint

Nonce Location C C B A Decrypted Nonce Nonce Loc B Loc C

slide-23
SLIDE 23

Geographic Hashes

 Provide unforgeable

positioning

 Use associative one

way hash functions

 The geographic hash

is with respect to a node

 Its value depends on

location

HA HA(nA) A B 1 HA nA

slide-24
SLIDE 24

Construction of Geographic Hashes

 Nodes publish one way

hash functions

 One for each dimension  Random nonce

 Receivers compute the

local value based on integer co-ordinates

HA G = HA(HA(nA )) A B 2 HA nA

slide-25
SLIDE 25

Geographic Hash Agreement

11.118N 55.551W

A

{1111,5555} {1110,5556}

B C

2m/s {1111,5556} {1110,5555}

A D S B rx,ry

One way hash Hs

Hs

l(rx,ry)

Hs

m(rx,ry)

distance l distance m distance l distance m Hs

m+l(rx,ry)

 Hash values must agree along all paths

Detect bad localities

slide-26
SLIDE 26

Transient Geographic Hashes

 Short lived geographic hashes

Source publishes hash function for time Every node applies it once per time period

 Associative hash functions

Preserve the hash value across space and

time

slide-27
SLIDE 27

Location Authentication

 Use multiple paths

to authenticate geographic hash

 Challenge the node

to prove it knows the secret without disclosing the secret

S D

r,r,r x,y,z Challenge to produce hash values at L

L?

slide-28
SLIDE 28

Secure Geographical Routing Sketch

 Conduct challenge response with destination

 Source authenticates public keys of all nodes on the

path

 Attach proof of path tokens on the challenge and

response messages

 Receiver gets correct routing path from sender  Sender gets the correct routing path to receiver

 Destination publishes geographic hash

 Source gets correct location of destination

slide-29
SLIDE 29

Performance Analysis

 Compare with GPSR

 Implement secure routing in NS2  Modify GPSR routing implementation to allow

malicious nodes

 Effectiveness of secure geographical routing

 Node density  Malicious nodes  Mobility

slide-30
SLIDE 30

Effect of Node Density on Delivery Rate

 GPSR is

susceptible to malicious nodes

 Node density

does not help

 Compare with

secure geographical routing

 Take advantage of node density to resist routing

errors introduced by malicious nodes

slide-31
SLIDE 31

Effect of Node Density on Path Length

 Malicious

nodes can not force extreme path lengths

 Resilience

with large proportion

  • f malicious

nodes

slide-32
SLIDE 32

Effect of Malicious Nodes on Delivery Rate

 GPSR

breaks down with malicious nodes

 Resilience to

large fraction

  • f malicious

nodes

slide-33
SLIDE 33

Effect of Malicious Nodes on Path Length

 Increase in

path length along with low delivery rate

 Achieve high

delivery rate with constant path length

  • verhead
slide-34
SLIDE 34

Mobility & Malicious Nodes

 Mobility does

not help GPSR significantly

 Secure

geographical routing improves delivery rate with mobile nodes

 Take advantage of mobility by finding new non-

malicious nodes

slide-35
SLIDE 35

Conclusion

 Secure geographical routing

 Resist malicious nodes  Reasonable performance

 Authenticate location of anonymous nodes

 Using short lived verifiable geographic hashes

 Authenticate public key of node at given location

slide-36
SLIDE 36

Future Work

 Applications

Localized Cab fare negotiation Private communication for highway conditions

 Geographical security policies

slide-37
SLIDE 37

Future Work

 Applications

Localized Cab fare negotiation Private communication for highway conditions

 Geographical security policies