240 likes | 425 Views
Security Issues in Mobile Ad-Hoc Network. Mukul A. Khairatkar. Agenda. Introduction to MANET Various Security Model Operations Introduction to IPSec IPSec Operation Simulation Details Conclusion. Mobile Ad-Hoc Network. No Infrastructure No Server Nothing
E N D
Security Issues in Mobile Ad-Hoc Network Mukul A. Khairatkar
Agenda • Introduction to MANET • Various Security Model • Operations • Introduction to IPSec • IPSec Operation • Simulation Details • Conclusion
Mobile Ad-Hoc Network • No Infrastructure No Server Nothing • Everybody acts like a Router • Security Problem • Network Resources • Source Spoofing • Eavesdropping • Data Transformation
Security • Key Pre-Distribution Scheme • Web of Trust • Public Key Certification • IPSec
Some Security Terms • Public Key • Private Key • Digital Signature • Certificate • Digital Signature • Certificate Of Authority • Certificates • Public Key Infrastructure • X.509
Key Pre-distribution Scheme Node 2 Node 1 Key Key Key Key Key Node 3 Key Node 4
Web Of Trust Public Key Node 1 Node 2 PGP PGP Public Key Node 3 PGP
Public Key Infrastructure • X.509 • Certificate Authority CA • CA CA Root Certificate • Root certificate • Distributed with Web Browser ..etc • SSL/TLS web pages
IPSec • Why IPSec? • Open Standard Freely Available • Modular • Integrates in Existing IP structure • Transparent to application layer entities • For IPv6
Modes • Transport Mode • Payload Encrypted • IP header is Intact • Routing is Intact • Tunnel Mode • New IP packet • New Routing • NW-NW Communication (tunnel)
IPSec for Ad-Hoc IP Cloud Subnet 1 Subnet 2
Problems • Latency Increases • Overhead Increases • Throughput Decreases • Complexity Increases
Conclusion • Ad-hoc Network uses various security methods • Do not violate existing protocol • IPSec is a new approach to secure IPv4 and IPv6 packets • Better approach can be used than IPSec
References • [1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE 2004. • [2] Secure Ad Hoc Networking, PanagiotisPapadimitratos, Virginia Polytechnic Institute and State University, IEEE 2006. • [3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMANLaboratoirc CNRS-PRiSM. University of Versailles. • [4]Securing Ad-Hoc Networks by IPSEC, AbhrajitGhosh, Telcordia Technologies Applied Research Piscataway, NJ, IEEE paper 2004. • [5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999. • [6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC 2510, Mar 1999 • [7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003. • [8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.