240 likes | 421 Views
S E A D. Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu, David B.Johnson, Adrian Perrig. Outline. Features of ad-hoc networks Attack types of ad-hoc networks SEAD VS DSDV One-way hash chains Message authentication SEAD VS DSDV Evaluation.
E N D
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu, David B.Johnson, Adrian Perrig
Outline • Features of ad-hoc networks • Attack types of ad-hoc networks • SEAD VS DSDV • One-way hash chains • Message authentication • SEAD VS DSDV • Evaluation
Ad Hoc Networks • Unstable link • High mobility • Very limited computing resources • Easy to eavesdrop
Assumptions • All links are bi-directional • No physical or MAC layer attacks • The network may drop, corrupt, duplicate, or reorder packets • MAC layer can detect randomly corrupted packets • Network diameter
Security Threats to Ad Hoc Networks • Wireless communication allows remote attacker to Eavesdrop on all communication • Inject malicious messages into the network • Current ad hoc network routing protocols designed for a trusted environment • Highly susceptible to attacks! • Skilled attacker can prevent communication
Possible Attacks • Ignorance attack (discarding packets) • Jam attack (jam routing packets) • Modification attack (modifying packets) • Replay attack (sending old advertisements) • Blackhole attack
Our Goal • Does not need too much resource • Provides security features • It is robust enough against multiple uncoordinated attackers Developing a protocol that
Distance Vector • DSDV is Based on Distance Vector routing. • It is easy to implement and is efficient in terms of required memory and CPU processing capacity.
DSDV • Destination-Sequenced Distance-Vector routing protocol • Introducing a sequence number to prevent loops • Each node’s routing table is tagged with the most recent sequence number
DSDV (cont) • When a node receives a routing update, the node does the update if the sequence number is greater or sequence number is the same but metric is lower.[same as AODV] • Routing updates are both “periodic and triggered”, and both “full dump or incremental”.
DV vs. DSDV vs. SEAD DV DSDV
Security features • Using one-way hash chains rather than asymmetric cryptographic operations • Digital Signature like RSA algorithm is used for Encryption and requires a lot of computation. • Using one way hash function is 10000 times faster than using RSA with 1024 bit length Encryption. • Which contradicts with ad-hoc networks nature, in which its Nodes may have a limited resources of CPU, Memory, Power
One-way hash chains • Built on a one-way hash function. • H:{Input Value}*→{Output}p • Simple to compute but infeasible to invert • It is used to authenticate both Destination sequence number and Metric
One-way hash chains • h1,h2,h3,…,hn • h0=x, some arbitrary value • hi=H(hi-1) for all 1≦i≦n • Given hi it is easy to verify the authenticity of hj, if j>i
Message Authentication • The source node randomly pick up a value x in the beginning, and then it generates a hash chain: x=h0,h1,h2,…,hn • Suppose m is the network diameter, and n is divisible by m
Message Authentication (cont) • For authenticating a routing update with sequence number i and metric j, it sends hn-i*m+j • The attacker can never forge better metrics or sequence numbers • Attacker can only generate worse metrics or sequence numbers
Example m=5, n=20 i=sequence number, j=metric, m=network diameter, n=length of hash chain
SEAD v.s. DSDV • SEAD doesn't delay any triggered update • When a node detects a broken link and send a routing update, SEAD doesn't increment the sequence number. Instead, it sets the metric to infinity • As sequence numbers are updated only with BetterMetric , so this will prevent attacks
Evaluation • Scenario parameters • 1500m * 300m • 50 nodes • 20 Source-Destination Pairs • Maximal velocity : 20 m/s • Transmission range : 250m • Date Rate : 4 packets/second (512 bytes/packet) • SEAD parameters • Periodic updates missed before link is declared broken : 3 • Hash length : 80bits
Conclusion (pros) • SEAD is robust against uncoordinated attacks • SEAD is very efficient if nodes in space are distributed randomly enough
Conclusion (cons) • SEAD doesn't provide a way to prevent an attacker from tampering with “next hop” or “sequence number” columns • Hash chains are consumed very fast • Either new hn needs to be released very often or the hash chain to be rather long