manet overview
play

MANET : Overview Nodes freely roam Multi-hop communication towards - PDF document

URSA : Providing Ubiquitous and Robust Security Support for MANET Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang University of California, Los Angeles {jkong,pzerfos,hluo,slu,lixia}@cs.ucla.edu Outline Mobile Ad-hoc Network


  1. URSA : Providing Ubiquitous and Robust Security Support for MANET Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang University of California, Los Angeles {jkong,pzerfos,hluo,slu,lixia}@cs.ucla.edu Outline ♦ Mobile Ad-hoc Network ( MANET) ♦ Design goals & challenges ♦ Problems of conventional approaches ♦ Our approach – Network protocols – Cryptographic algorithms ♦ Implementation & simulations ♦ Conclusions 1

  2. MANET : Overview ♦ Nodes freely roam ♦ Multi-hop communication towards remote nodes ♦ Shared wireless medium is error-prone Security Supports for MANET ♦ Security Supports – Authentication – Service availability – Message privacy – Message integrity – Non-repudiation ♦ More difficult than the wired scenarios – Mobility – State constantly changes – Security threats over vulnerable wireless links 2

  3. Design Challenges ♦ Security breach – Vulnerable wireless links – Occasional break-ins may be inevitable over long time ♦ Service ubiquity in presence of mobility – Anywhere, anytime availability ♦ Network dynamics – Wireless channel errors – Node failures – Node join/leave ♦ Network scale Conventional Approaches Server Server Server Server ♦ Centralized & Hierarchical scheme – Single server – Multi-server infrastructure 3

  4. Problems of Conventional Approaches (Centralized & Hierarchical) ♦ Service performance comparison – Low success ratio: 80% – Large average delay Our Approach ♦ Ubiquitous and robust service provision in the presence of random mobility ♦ Localized algorithms and protocols ♦ One-hop wireless communication 4

  5. Why this model? ♦ No single point of compromise – Hackers must break into K nodes simultaneously to compromise the system ♦ No single point of DoS attack & node failure ♦ K offers tradeoff between intrusion tolerance and service availability – K=1 , single point of compromise, maximal availability – K=N , single point of DoS attack, maximal intrusion tolerance System Overview ♦ Each node carries a verifiable, unforgeable personal certificate ♦ Certificate is signed by network system key SK ♦ Certificate may be issued, renewed, or revoked ♦ Every mobile node periodically renews its certificate ♦ Ubiquitous services enabled by secret sharing 5

  6. System Components ♦ Certification services – Localized certificate issuing, renewal, revocation ♦ Self-initialization service – To provide a secret share to an entity – To provide scalable proactive secret share update service ♦ Proactive secret share update service – To resist long-term adversaries without changing the shared secret Network Protocol 2. Unicast shuffling package 4. Unicast partial secret share 1. Broadcast request 3. Routing shuffling package Service request Return partial certificates ( K =5) ♦ Broadcast service request ♦ Compute partial certificates ♦ Combine K partial certificates 6

  7. Cryptographic Algorithms: Threshold Secret Sharing ♦ Polynomial-based threshold secret sharing – Given a secret d and a random polynomial of degree K-1 f(x) = d + f 1 •x + f 2 • x 2 + …… + f K-1 • x K -1 mod n – Each entity v i obtains its secret share “ f(v i ) mod n ” – d can be recovered by Lagrange interpolation ♦ In RSA cryptosystem, the d in the signing key SK=(d,n) is shared and distributed Lagrange Interpolation f(x5) Polynomial with degree K-1 f(0)=secret f(x4) f(x1) f(x2) f(x3) 0 x1 x2 x3 x4 x5 K K ∑ ∑ = ≡ • ≡ f ( 0 ) d ( f ( v ) lv ( 0 ) mod n ) d (mod n ) j j j ___ = = j 1 j 1 − − − − L L ( x v ) ( x v )( x v ) ( x v ) − + = 1 j 1 j 1 K lv ( x ) j − − − − L L ( v v ) ( v v )( v v ) ( v v ) − + j 1 j j 1 j j 1 j K 7

  8. Multi-signature ♦ Threshold secret sharing reveals d to a coalition ♦ d is not revealed if partial certificates are used – The cornerstone is the equation X d1 • X d2 • … • X dK = X (d1 + d2 + … + dK) – Each coalition member contributes a signed partial X SKi = (X di mod n ) certificate which corresponds to an RSA SK -signing in computation – The certification service requester combines K partial-certificates and obtains a correctly-signed X SK = (X d mod n ) certificate Implementation & Simulation ♦ Implementation in C – Minimized extension: RSA-compatible operations – Optimized for wireless low-end devices • Code size • Instruction set – Coded as value-added plug-in to existing security systems ♦ Simulation in ns-2 – Communication efficiency dimensions: network size (scalability), node mobility, wireless channel errors – Performance metrics: success ratio, average delay, average # of attempts 8

  9. Implementation : RSA and Certification Performance ♦ Comparable performance with standard RSA signing ♦ Little impact of K on computation overhead Implementation: Self Initialization (K=5, time unit: milli-second ) Key SPEC =20.5 SPEC =12.1 SPEC =1.37 (bit) Partial Sum Partial Sum Partial Sum 512 0.413 0.288 1.145 0.378 3.861 1.196 768 0.459 0.382 2.588 0.443 5.163 1.497 1024 0.490 0.319 3.321 0.781 7.024 1.847 1280 0.561 0.411 4.926 0.840 8.215 1.996 1536 0.798 0.460 3.480 0.630 10.251 2.006 2048 1.420 0.473 5.245 0.754 24.414 2.528 ♦ Self initialization and proactive secret share update only use inexpensive operations (+,-, *, multiplicative inversing, and less than K degree exponentiation), thus incur little computation overhead 9

  10. Simulation: Certification Services Avg. # of Attempts vs. Node Speed ♦ Our approach: Reliable and predictable behavior ♦ Centralized & hierarchical approaches: Unreliable and/or unpredictable behavior Simulation: Self Initialization Avg. Delay vs. Node Speed ♦ Mobility does not affect the protocols very much ♦ Scale well to the network size 10

  11. Simulation: Proactive Update Updated Node Percentage vs. Delay ♦ “Explosion” effect: as more and more entities obtain the new version of secret shares, the task is getting easier and faster Conclusion ♦ Certification-based approach – Secret sharing – Multi-signature ♦ Localized and distributed protocols – Faster and more robust than other approaches – Service ubiquity – Scalable ♦ Flexible trade-off between intrusion tolerance & service availability 11

Recommend


More recommend