Integrating Quality of Protection into Ad Hoc Routing ProtocolsTraditional ad hoc routing protocolsMotivationSecurity-Aware ad hoc Routing (SAR)GoalsRouting ProtocolPath EstablishmentSecurity Attributes (1)Security Attributes (2)Quality of ProtectionTrust HierarchySimulation Set-upPath DiscoveryRouting TrafficSimulation TimeStrong PointsWeak PointsOpen QuestionsAny Questions?Integrating Quality of Protection into Ad Hoc Routing ProtocolsSeung Yi, Prasad Naldurg, Robin KravetsUniversity of Illinois at Urbana-ChampaignTraditional ad hoc routing protocolsCooperative by natureRely on implicit trust-your-neighbor relationshipsFocus on convergence time and routing performance, rather than securityMotivationSecurity-Aware ad hoc Routing (SAR)SAR is an approach to routing that incorporates security levels of nodes into traditional routing metricsSAR is typically added on top of existing routing algorithmsGoalsApplications can specify the quality of protection on their ad hoc route with respect to security attributes relevant to themSAR aims to protect routing control messagesFor example, disclose routing information to trusted nodes onlyRouting ProtocolAssume the base protocol is on-demand, such as DSRSource broadcasts a Route Request (RREQ) with desired quality of protectionNeighbors propagate RREQ only if they could support the specified quality of protectionRREQ sets up reverse path as it propagatesDestination sends Route Reply (RREP) once it receives RREQPath EstablishmentS DRREQRREPSecurity Attributes (1)AttributesAttributesTechniquesTechniquesAttacksAttacksTimeliness Time stamps ReplayOrdering Sequence numbers ReplayAuthenticity Passwords, certificatesImpersonationAuthorization CredentialsSecurity Attributes (2)AttributesAttributesTechniquesTechniquesAttacksAttacksIntegrity Digests, digital signaturesModification, fabricationNon-repudiation Chaining of digital signaturesRepudiationConfidentiality Encryption EavedroppingQuality of ProtectionWe have seen how quality of protection is used in path establishmentHow to specify quality of protection?Trust hierarchyBit vectorOne bit for each security attributeTrust HierarchyEach level has predefined quality of protectionThese levels represent the security capability of the mobile nodes and also of the pathsAssociate a number with each levelTrust level or protection should be immutableKeys of each level are distributed to nodes on that level.Encrypt the portion of the RREQ and RREP headers that contain the trust levelSimulation Set-upns2 network simulator50 mobile nodes and 3 trust levels15 (H), 15 (M), 20 (L)2 different traffic patterns with 20 flows10% (H), 20% (M), 70% (L)33% (H), 33% (M), 34% (L)SAR is implemented on top of AODVPath DiscoveryTraffic 1 Traffic 2SAR discovered fewer pathsPaths guaranteed to obey the security requirementRouting TrafficTraffic 1 Traffic 2SAR has lower routing traffic overheadnodes drop routing messages if they can not satisfy the security requirementSimulation TimeTraffic 1 Traffic 2SAR takes more time to finishData packets may follow longer but more secure pathsControl packets experience processing overheadStrong PointsExposes security levels to applications so that applications can adapt its behaviorConcept is simple and effectiveWeak PointsOverhead: Encryption, hashes, …If the ad hoc network does not have a path with nodes that meet RREQ’s security requirements, SAR may fail to find a route even if the network is connectedOpen QuestionsHow does SAR perform in real-world experiments?Which base protocols are most suitable for SAR?Any
View Full Document