240 likes | 401 Views
Castor: Scalable Secure Routing for Ad Hoc Networks. Wojciech Galuba , Panos Papadimitratos, Marcin Poturalski, Karl Aberer EPFL, Switzerland Zoran Despotovic , Wolfgang Kellerer Docomo Euro-Labs, Munich, Germany. Ad-hoc network routing challenges. source. destination.
E N D
Castor: Scalable Secure Routing for Ad Hoc Networks WojciechGaluba, Panos Papadimitratos, Marcin Poturalski, Karl Aberer EPFL, Switzerland ZoranDespotovic, Wolfgang KellererDocomo Euro-Labs, Munich, Germany
Ad-hoc network routing challenges source destination
Ad-hoc network routing challenges source destination
Ad-hoc network routing challenges source destination
Scale Mobility ? Security
Secure route discovery Castor Secure data transmission • Evaluates routes • Needs route redundancy Continuously-Adapting Secure Topology-Oblivious Routing Provides routes Avoids compromised nodes
Topology-obliviousness • Nodes only aware of their neighbors • No routing information exchange • no routes included in control traffic • no routing table fragments exchanged
Flows instead of destinations d1 s1 d2 s2 • In-network state is maintained per-flow • not per-destination • Flow isolation crucial for security
Castor – basic operation source destination PKTscontain the data payload ACKs follow the reverse path of PKTs
Local learning from failures v3 per-flow per-neighbor reliability estimator - - + + + v2 v1 v4 + + • Locality: each node only aware of its neighborhood • Autonomy: each node routes independently
Broadcast as a fallback v3 - - - v1 v2 v4 • Autonomy: nodes independently decide wether to broadcast or unicast
Initial PKT flood source destination No reliability history each node decides to broadcast the PKT ACKs are broadcasted back
Routing around failures source destination • Failure ACKs stop returning • Local repair: • on failure some nodes broadcast, most still unicast • alternative route discovered without network-wide flood
Castor is failure agnostic • Same recovery mechanism good for: • Malicious PKT or ACK dropping • Links broken by mobility • Wider-area outages (e.g. jamming) • Wormholes and tunnels
Trust model d1 s1 d2 s2 • Untrusted cloud of intermediate nodes • Security associations: • Source to destination • Neighbor to neighbor
Crucial property: flow state isolation v2 v5 v1 v4 v3 Routing state at v1: Isolate in-network states for the two flows Otherwise malicious flows could disrupt the benign flows
Ensuring flow isolation • Flow authentication • Nodes can recognize PKTs belonging to the same flow • Only source can generate the next PKT • ACK authentication • Nodes can match ACKs to PKTs • Only destination can generate correct ACK • Achieved without public-key crypto
Evaluation 1Mbps 802.11b MAC 3 km x 3 km plane 1-20 m/s random waypoint mobility 5 flows, 4 packets/s, 100 nodes
Blackhole attack: adversary drops data packets • not control traffic
Wormhole drops data packets, no mobility Complete recovery from wormholes
Mobility, 20% of balckholes • Increasing the network size Scalability
Summary • Simple PKT-ACK messaging • flow-control-ready • applicable to other networks than MANETs • Scalability • No routing information exchanged • Local repair, few network-wide floods • Fast adaptation • Security • Failure agnosticism • Flow state isolation