Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Network Access Control for Mobile Ad Hoc Network
#1

[attachment=15327]
Network Access Control for Mobile Ad Hoc Network
Pan Wang
North Carolina State University
Outline
Background
Problem statement
Related work
Proposed scheme
Key Synchronization
Packet Retransmission
Analysis, simulation and field test
Summary
Background
Mobile Ad Hoc Network (MANET)
A MANET consists of mobile platforms (e.g., a router with multiple hosts and wireless communications devices), which are free to move about arbitrarily. -- IETF RFC2501
Characteristics of MANET
No pre-determined infrastructure
Ease of deployment
Dynamic topologies (e.g., mobility, network partition )
Constrained resources (e.g., bandwidth, energy )
Network access control
Not media access control
Who has the right to access the network
Physical*
Technical *
Administrative *
Firewalls
Conventional network
Using network topology and service information
* H. F. Tipton, Handbook of information security management
Problem Statement
An attacker may inject bogus packets to consume the network resources, or insert itself into critical routes

No mature access control scheme for MANET
more complicated due to open media and dynamic topology
Related Work
DHCP Access Control Gateway
Kerberos
Distributed firewall
Pebblenets
Distributed access control scheme for consumer operated MANET
LHAP
Related Work --Cont
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
Based on one-way key chain and TESLA
Hop-by-hop authentication
Each transmitted packet associated with a traffic key,
Receiver (or intermediate node) verifies to decide whether forward (accept) the packet
Proposed Scheme cryptographic tools
Group key agreement
Group key distribution
Controller chooses key
Stateful vs. Stateless
Stateless key distribution
Each user is assigned an unique set of personal keys
New key is encrypted with the personal keys only known to the legitimate users
Nice stateless property
Proposed Scheme underlying models
Network model
All nodes come from one domain
A node s access to the network is controlled by a domain manager (i.e., key manager)
Each node has a unique ID and a set of personal secret keys
Attack model
Attackers inject packets to deplete the resources of node relaying the packets
Proposed Scheme - outline
Basic idea
Cryptography-oriented (using group key)
Authenticate all the packets with a network-wide access control (group session) key.
Any bogus packet that has incorrect authentication information will be filtered out immediately.

As a result, illegitimate nodes will be excluded from communication (routes).
Research challenges
Two critical challenges
Synchronization of network access control key
Interaction between data transmission and key distribution
If these two challenges can be solved, the proposed group key based network access control scheme will be done.
Key Synchronization
Problem statement
A key update message may fail to propagate across MANET. Thus, two legitimate user may simultaneously hold different session key (lack of key synchronization)
Key Synchronization (Cont-1)
An example of lack of key synchronization
Key Synchronization (Cont-2)
Solution
Exploit the stateless feature of the proposed stateless group key distribution scheme
Each user buffers the key update message most recently received
Transmit the buffered message to the other users that are using old session keys
Key Synchronization (Cont-3)
Scheme details
Proactive part
Broadcast the buffered key update message every t time unites
Reactive part
Send a key synchronization request, if a received packet has higher session ID
Send the buffered key update message, if a received packet has a lower session ID
Key Synchronization (Cont-4)
Illustration of the proposed key synchronization scheme
Key Synchronization (Cont-5)
Security analysis (possible attacks)
Resource consumption via forged key update message
Solution: lightweight authentication methods (One-way key chain & Merkle hash tree)
Resource consumption via forged data packet
Constrained to one-hop
Logically partition MANET via refusing forwarding key update message
Multiple paths, watchdog
Key Synchronization (Cont-6)
One-way key chai
Key Synchronization (Cont-7)
Merkle hash tree
Key Synchronization (Cont-8)
Performance analysis
Rely on the adopted stateless group key distribution scheme
Storage
One message
Computation
Communication
Depends on t and number of users using an old key
Packet Retransmission
Problem statement
The interaction between data transmission and key distribution. That is, in the case of a lack of key synchronization, a user may receives some (unverified) packets authenticated with a different session key.
Packet Retransmission (Cont-1)
Possible options
Simply drop
Buffer and then verify
Synchronize the keys before sending every data packet
All of them have serious drawbacks
Packet Retransmission (Cont-2)
Algorithm of the proposed scheme
Packet Retransmission (Cont-3)
Security analysis (possible attacks)
Resource consumption attack
Forged ACK message
Packet modification
Packet Retransmission (Cont-4)
Performance analysis
Computation
Authentication & verification
Pentium 4 2.1 GHz processor *
MD5 216.674 MB/s SHA-1 67.977 MB/s
Communication
Retransmission rate
Simulation Evaluation
The simulation modal
40/80 nodes randomly placed in a fixed area (a square of size 1km x 1km)
Random walk with a maximum speed 20m/s
Communication range 200m
2000 simulations, using different random number seeds
Simulation Evaluation (Cont-2)
Average percentage of nodes which got the latest session key
Simulation Evaluation (Cont-3)
Average percentage of nodes which got the latest session key
Simulation Evaluation (Cont-4)
Implementation
Based on Netfilter
Two daemons
Adopt the stateless scheme proposed by Liu & Ning
Field Test
Test bed
One Dell P4 laptop with Linux 9.0 (kernel 2.4.20)
Two Compaq iPAQ 3970 PDAs with Familiar v0.7.2 (kernel 2.4.19-rmk-pxal-hh30)
Lucent Orinoco wireless cards
Tests
Key distribution
User revocation
Packet authentication and verification
Key synchronization
Summary
Network access control is an important issue for MANET
Cryptography-oriented solution exploiting the stateless feature of stateless group key distribution scheme
Simulation as well as functioning prototype indicates it practical and effective
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.