Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Securing Neighbor Discovery
the wormhole attack centralized and decentralized wormhole detection mechanisms
Securing Neighbor Discovery the wormhole attack centralized and - - PowerPoint PPT Presentation
Securing Neighbor Discovery the wormhole attack centralized and decentralized wormhole detection mechanisms Security and Cooperation in Wireless Networks Georg-August University Gttingen Introduction many wireless networking
Security and Cooperation in Wireless Networks
Georg-August University Göttingen
the wormhole attack centralized and decentralized wormhole detection mechanisms
Georg-August University Göttingen
Securing Neighbor Discovery
2
Georg-August University Göttingen
Securing Neighbor Discovery
– the adversary installs radio transceivers at both ends of the wormhole – it transfers packets (possibly selectively) received from the network at one end of the wormhole to the other end via the out-of-band connection, and re-injects the packets there into the network
wormhole attack: the two wormhole ends (adversarial transceivers) WE1 and WE2 transmit (tunnel) the neighbor discovery messages heard in their radio rage to each other (possibly selectively) result: A and B which are far away from each other will believe to be neighbors (because they actually hear each other through the wormhole)
– adversary’s transceivers are not regular nodes (no node is compromised by the adversary) – adversary doesn’t need to understand what it tunnels (e.g., encrypted packets can also be tunneled through the wormhole) – it is easy to mount a wormhole and it may have devastating effects on routing
3
Georg-August University Göttingen
Securing Neighbor Discovery
– routing protocols may choose routes that contain wormhole links
but only through the wormhole
– adversary can then monitor traffic or drop packets (DoS)
4
x y (a) x y (b) x y (c) x y (d) x y (e) x y (f) A set of nodes are randomly placed in the area; the gray disk: radio range of x Neighbor relationships between the nodes Shortest possible path from all other nodes to x The wormhole: black rectangles are the attacker’s transceivers As the result of the wormhole attack x and y become neighbors because the attacker relays their neighbor discovery messages Shortest possible path from all other nodes to x after the attack happens: many nodes reach node x through the wormhole
Georg-August University Göttingen
Securing Neighbor Discovery
5 access control system: gate equipped with contactless smart card reader contactless smart card contactless smart card emulator smart card reader emulator fast connection wormhole user may be far away from the building
Georg-August University Göttingen
Securing Neighbor Discovery
6
Georg-August University Göttingen
Securing Neighbor Discovery
7
Georg-August University Göttingen
Securing Neighbor Discovery
8
5 10 15 20 25 30 35 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
node degree number of nodes
degrees in the experiment when there is a wormhole
some nodes with an unexpectedly high node degree.
Georg-August University Göttingen
Securing Neighbor Discovery
9
500 1000 1500 2000 2500 3000 3500 4000 4500 5000 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
path length number of shortest paths
Georg-August University Göttingen
Securing Neighbor Discovery
10
Georg-August University Göttingen
Securing Neighbor Discovery
11
a b c d e f g c d b e f a g
Real replacement of the nodes reconstructed virtual layout
wormhole
the nodes.
measurements of the neighboring nodes.
communication range
(assuming that we know in advance that the nodes are located on a straight line).
Georg-August University Göttingen
Securing Neighbor Discovery
12 wormhole
the nodes.
measurements of the neighboring nodes.
communication range --- > MDS brings them together
Georg-August University Göttingen
Securing Neighbor Discovery
13
Georg-August University Göttingen
Securing Neighbor Discovery
14
Georg-August University Göttingen
Securing Neighbor Discovery
15
Georg-August University Göttingen
Securing Neighbor Discovery
16
MAC packet K MAC packet K time at sender time at receiver
ts ts + mac + pkt tr tr + mac mac pkt mac ts - Dt + mac + pkt
Georg-August University Göttingen
Securing Neighbor Discovery
17
Georg-August University Göttingen
Securing Neighbor Discovery
18
Georg-August University Göttingen
Securing Neighbor Discovery
19
Georg-August University Göttingen
Securing Neighbor Discovery
20
Georg-August University Göttingen
Securing Neighbor Discovery
21
Georg-August University Göttingen
Securing Neighbor Discovery
22
x Ax AO R 2R O D Ax' AO'
Georg-August University Göttingen
Securing Neighbor Discovery
23
Georg-August University Göttingen
Securing Neighbor Discovery
24
Georg-August University Göttingen
Securing Neighbor Discovery
25
AxO O R x D Ax AO
Georg-August University Göttingen
Securing Neighbor Discovery
26
Georg-August University Göttingen
Securing Neighbor Discovery
27
1 2 3 4 5 6
y
1 2 3 4 5 6
x
Georg-August University Göttingen
Securing Neighbor Discovery
28
1 2 3 4 5 6
y
1 2 3 4 5 6
x v
Georg-August University Göttingen
Securing Neighbor Discovery
29
Georg-August University Göttingen
Securing Neighbor Discovery
30 y x
4 1
v
1
v y x
4 4 1
Georg-August University Göttingen
Securing Neighbor Discovery
– they hear each other from opposite zones – there’s at least one valid verifier v such that x and v hear each other from opposite zones
– let us assume that y hears x through the wormhole one end of the wormhole is near to x, the other end is in zone Zyx – let us further assume that v is a valid verifier first condition (Zyv Zyx) is satisfied (because v is a valid verifier) y hears v directly (since y hears v from a zone different from Zyx) x hears both y and v through the wormhole second condition (Zvx Zyx) is satisfied (because v is a valid verifier) x and v cannot hear each other from opposite zones
If ty and x hear each other through wormhole no valid verifier v exists such that x and v hear each other from opposite zones y will not accept x as a neighbor
31
Georg-August University Göttingen
Securing Neighbor Discovery
32