Ariadne – A Secure On-Demand Routing Protocol for Ad-Hoc Networks

14
1 Computer Science Ariadne – A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 CSC 774 Network Security Computer Science Overview of presentation Introduction : Ad-hoc routing security issues & attacks, basic DSR mechanism Related work Contributions in this paper Ariadne details: Route-discovery, route-maintenance, node misbehavior, malicious floods An optimization for Ariadne Ariadne Evaluation & Security Analysis (if time permits) Conclusions & future work *Knowledge of TESLA assumed, not explained

Transcript of Ariadne – A Secure On-Demand Routing Protocol for Ad-Hoc Networks

• •

• •1

Computer Science

Ariadne – A Secure On-Demand RoutingProtocol for Ad-Hoc Networks

Authors: Yih-Chun Hu, Adrian Perrig,David B Johnson

Presenter: Sameer Korrapati

Date: 4/21/2003

CSC 774 Network SecurityComputer Science

Overview of presentation

• Introduction : Ad-hoc routing security issues &attacks, basic DSR mechanism

• Related work• Contributions in this paper• Ariadne details: Route-discovery, route-maintenance,

node misbehavior, malicious floods• An optimization for Ariadne• Ariadne Evaluation & Security Analysis (if time

permits)• Conclusions & future work• *Knowledge of TESLA assumed, not explained

• •

• •2

CSC 774 Network SecurityComputer Science

Introduction

• Security in routing (not just data traffic) is amajor concern as it can potentially bring downthe whole network (attacks later)

• On demand routing is more suitable for ad-hocnetworks as against periodic-updates basedrouting protocols (being reactive as opposed toproactive)

• Ariadne proposes a new on-demand, securerouting protocol for ad-hoc networks

CSC 774 Network SecurityComputer Science

Introduction-contd.

• Based on Dynamic Source Routing protocol(DSR)

• Authentication scheme has been explainedwith TESLA, and symmetric cryptography hasbeen used in all messages

• •

• •3

CSC 774 Network SecurityComputer Science

Attacks on routing in ad-hoc networks

• Active and Passive

• Selfishness and Maliciousness

• Some active attacks: black hole, resourceconsumption, worm hole, and many more.

• Attacker Model: Active-n-m Ë n is thenumber of nodes attacker has compromised, mis the number of attacker’s own nodes

• Ariadne provides resilience against Active-1-xand Active-y-x attacks

CSC 774 Network SecurityComputer Science

Overview of DSR

• Route Discovery Phase: Initiator broadcastsRREQ, if route not in cache, requesting fortarget. Each intermediate node appends its idand rebroadcasts. target sends RREP,including the list. – Source routing

• Route Maintenance Phase: Needed as routescan break over time. Node detecting this willsend a ROUTE_ERROR to remove that routefrom cache.

• •

• •4

CSC 774 Network SecurityComputer Science

Related Work

• Prevention based schemes:ÿ SAODV (digital sign),ÿ ARAN (certificate-based, with a TTP)ÿ SEAD(one-way hash chains),ÿ Packet Leashes (deals worm-hole attacks),ÿ etc…• Detection and reaction based:ÿWatchdog-and-Pathrater,ÿCONFIDANT (detects misbehaving nodes)ÿ etc…

CSC 774 Network SecurityComputer Science

Contributions in this paper

• Proposed a complete secure routing protocol,based on on-demand philosophy.

• The security scheme made efficient usingsymmetric key MACs and hash chains

• Performance evaluation and security analysispresented.

• Explained some attacks on ad-hoc networkrouting.

• •

• •5

CSC 774 Network SecurityComputer Science

Assumptions

• Key setup is crucial, whichever scheme is used, of thethree. For TESLA, shared pair-wise secret keysbetween source and destination, (why?) and onepublic key needed (why?), apart from TESLA keys.

• Nodes strong enough to do needed computations andshould have loose clock synchronization

• Each node can estimate end-to-end transmission timeto all other nodes in the network (for TESLA)

CSC 774 Network SecurityComputer Science

Assumptions – contd.

• Only network layer security addressed. (NotMAC or physical layer, which are important inwireless ad hoc environments)

• Broadcast transmission medium is reliable

• •

• •6

CSC 774 Network SecurityComputer Science

Ariadne Details

• Ariadne Route Discovery

• Ariadne Route Maintenance

• Thwarting routing misbehavior

• Thwarting malicious RREQ floods

• An optimization for Ariadne with TESLA

• Performance Evaluation

• Security Analysis

CSC 774 Network SecurityComputer Science

Notations

• Notations– A, B : principals

– KAB, KBA : secret MAC keys between A and B

– MAC (M) : MAC of message M using MAC keyKAB

• •

• •7

CSC 774 Network SecurityComputer Science

Route Discovery

• 3 ways to authenticate: Digital signs,symmetric key MACs, TESLA.

• Use of TESLA has been explained, because ofits efficiency.

• Goals:ÿTarget can authenticate initiatorÿInitiator can authenticate each entry of the pathÿNo intermediate node can remove a previous

node’s entry in the node list (per-hop hashing)

CSC 774 Network SecurityComputer Science

Route Discovery Authentication

• Authentication of RREQ by target: Initiator includesa MAC computed by shared-key KSDwith target

• Mechanisms for authenticating data in RREQs andRREPs: The appended node-lists have to beauthenticated; Uses TESLA for efficiency.Intermediate nodes append their MACs computedwith TESLA keys

• Per-hop hashing technique: To avoid a node frombeing removed from the node list in the RREQmessage, a one-way hash function is used. The sourceinitializes the hash chain to a MAC with a key sharedbetween the source and target.

• •

• •8

CSC 774 Network SecurityComputer Science

Route Discovery (contd.)

• Route Requestÿ<RREQ, initiator, target, id, time interval, hash

chain, node_list, MAC_list>

ÿInitiator initializes hash chain to MACKSD(initiator,target, id, time interval)

ÿIntermediate node A which receives the requestchecks <initiator, id> and checks time interval

• Time interval : TESLA time interval at the pessimisticexpected arrival time of the RREQ at target (say T + 2d)

• If any condition fails, discard the request

CSC 774 Network SecurityComputer Science

Route Discovery (contd.)

• If all conditions hold, A appends its address to node list,replaces hash chain with H[A, hash chain], appendsMAC of entire Request with TESLA key KAi

to MAClist

ÿTarget checks validity of Request• By determining that the keys are not disclosed yet

• that the hash chain is equal toH[nn, H[nn-1, H[…,H[n1, MACKSD

(initiator, target, id,interval)]…]

• If Request is valid, target returns a Route Reply

• •

• •9

CSC 774 Network SecurityComputer Science

Route Discovery (contd.)

• Route Replyÿ<RREP, target, initiator, time interval, node list,

MAC list, target MAC, key list>ÿPacket is sent to initiator along the route in node

listÿForwarding node waits until it can disclose its key

and then append its keyÿInitiator verifies that

• Each key is valid (TESLA security condition)• target MAC is valid (based on KDC shared with target)• Each MAC in MAC list is valid (based on TESLA keys)

CSC 774 Network SecurityComputer Science

Route Discovery example

• •

• •10

CSC 774 Network SecurityComputer Science

Route Maintenance

• Need: In the source routes, an intermediatenode might discover that next hop is notworking. So it sends ROUTE_ERROR back toinitiator

• Security issue: Prevent unauthorized nodesfrom sending (bogus) ROUTE_ERRORs

• The case of malicious nodes not sendinggenuine ROUTE_ERRORs not considered.

CSC 774 Network SecurityComputer Science

Route Maintenance (contd.)

• Route Errorÿ<ROUTE_ERROR, sending address, receiving

address, time interval, error MAC, recent TESLAkey> source routed back to initiatorÿIntermediate node

• Forwards the packet and searches its route cache for allroutes that use <sending address, receiving address>

• If exists, checks validity of time interval• If valid, checks authentication of the Error• Until authentication, saves Error info in memory until a

key is disclosed and uses routes in route cache• If authenticated, removes all such routes

• •

• •11

CSC 774 Network SecurityComputer Science

Thwarting routing misbehaviors

• Issue: What if intermediate nodes in the source routemisbehave and don’t forward packets?ÿA feedback based reputation scheme to detect misbehaving

nodes - relies on feedback about which packets weresuccessfully delivered

ÿA node with multiple routes sends a fraction along eachroute and sends packets along the successful route

ÿMalicious node avoidance in Route Discovery• Route Request includes a list of malicious nodes to avoid and the

MAC h0 computed over that list – no details

• Malicious nodes can be detected by target

CSC 774 Network SecurityComputer Science

Thwarting malicious RREQ floods

• As flooded RREQs are authenticated at the target, andnot at every hop, attacker can flood maliciousRREQs.

• Route Discovery chainsÿTo authenticate RREQs instantlyÿOne-way chains generated as Ki = HN-i [KN]1. Release one key for each Discovery (rate-limiting requests)

ÿA node not partitioned from the network can prevent an attackerfrom reusing keys

2. Dictate schedule for disclosure of key + loose clocksynchronization (time-synchronizing chain elements)

ÿAny node can prevent an attacker from reusing keysÿComputationally slightly more expensive

• •

• •12

CSC 774 Network SecurityComputer Science

An optimization

• So far, only initiator can authenticate the target and itsRREP, using the MAC computed with KDS

• But this RREP passes all intermediate nodes, whichcan also use it, if authenticated.

• Solution: Target uses TESLA key that can be used bythese intermediate nodes to authenticate it.

• The key is released by target, to initiator, afterappropriate delay, which the intermediate nodes alsouse.

CSC 774 Network SecurityComputer Science

Performance Evaluation

• ns-2 simulator has been used and followingstudied:ÿPacket Delivery Ratio

ÿPacket overhead

ÿByte overhead

ÿMean Latency

ÿ99.99th percentile latency

ÿPath optimality

• •

• •13

CSC 774 Network SecurityComputer Science

Performance Evaluation – packet overhead

CSC 774 Network SecurityComputer Science

Performance Evaluation – byte overhead

» 26.19% higher byteoverhead forAriadne comparedto un-optimizedDSR because ofauthenticationoverhead

• •

• •14

CSC 774 Network SecurityComputer Science

Security Analysis

• Argue that if an uncompromised shortest pathexists, then Ariadne will find it (correctness)

• In case of Active-1-1 attacker, black holes andgray holes could be thwarted. (per-hophashing), flooding of RREQs could bethwarted (route discovery chains)

• Passive attacks (eavesdropping) cannot bedealt with

CSC 774 Network SecurityComputer Science

Conclusions & future work

• Ariadne adds security extensions to on-demand routing (DSR), which suits ad-hocnetworks well.

• Shown to be better than un-optimized DSR

• Ariadne prevents a wide range of attacks tosecure routing

• It is efficient in terms of communication andcomputational overhead.ÿUses MACs and TESLA