Sie sind auf Seite 1von 123

Security for Mobile and Vehicular Ad hoc Networks

Abderrahim BENSLIMANE abderrahim.benslimane@univ-avignon.fr

LIA- Avignon University


1

IWCMC June 28, Caen, France

Outline
Security on Mobile Ad hoc Networks (MANETs) Security in Vehicular Ad hoc Networks (VANETs)

2
A. Benslimane IWCMC2010

Outline Part I
Security on Mobile Ad hoc Networks (MANETs)
Mobile Ad hoc Networks characteristics MANETs Applications Vulnerability and Challenges Network Security Requirements MANET Security Attacks Security protocols A new MAC layer contribution A new cross-layer contribution Some secure routing protocols Two new contributions at the routing layer
A Secure Architecture for MANET A Confident Community to Secure MANET
A. Benslimane IWCMC2010

Mobile Ad hoc Networks characteristics


Autonomous nodes create a network on their own initiative Self-organizing Open network Easy to deploy/extend Mobility and dynamic topology Wireless communication medium Absence of a fixed infrastructure Multi-hop communication

4
A. Benslimane IWCMC2010

MANETs Applications
Rescue missions, Military operations, WLAN extension, Video-conferencing

5
A. Benslimane IWCMC2010

Vulnerability & Challenges


Shared broadcast radio channel
Easier to passively eavesdrop

De-centralized Control
No trustworthy third party

Unreliable communication
Constantly changing topology

Limited Resources
Limited battery power Limited computational power

Unfriendly Environment
Malicious nodes, Selfish nodes,

Physical vulnerability
Vulnerable to theft,
6
A. Benslimane IWCMC2010

Security Requirements
Authentification
With a key or a card, With a password or a code, With a biometric identification

(1/2)

Confidentiality
protection against non-authorized disclosure of information

Integrity
protection against non-authorized modification of data

Availability
protection against services disturbances (Dos)

Non-repudiation
guarantee that the sender of a message cannot later deny A. Benslimane IWCMC2010 having sent the message
7

MANET Security Attacks


Attacks types can be classified by each layer: Physical layer attacks MAC layer attacks Network and routing layer attacks Transport layer attacks Cross-layer attacks
8
A. Benslimane IWCMC2010

MANET Security Attacks


Physical layer attacks
The jamming attack: is based on radio medium commu nication. A jamming source is able to disturb the entire n etwork or a part of the network; that depends on its powerf ul level. The tampering attack: node can physically be compro mised, the attacker can extract sensitive information such a s cryptography keys.

9
A. Benslimane IWCMC2010

MANET Security Attacks


MAC layer attacks
Greedy behavior: the back off manipulation by the attacker in
order to increase its bandwidth and create unfairness situation

Malicious collision: the attacker produces a collision in order to prevent its neighbours nodes to communicate or cooperate

10
A. Benslimane IWCMC2010

MANET Security Attacks


Network and routing layer attacks
Active attacks Routing procedure Passive attacks Packet silent Eavesdropping of discard data: -Traffic analysis, Wormhole attacks Impersonation Sybil attacks
11
A. Benslimane IWCMC2010

Flood network

False reply

Route request

Route broken message

False routing information

-Sniffing to compromise keys,

MANET Security Attacks


Transport layer attacks
Desynchronization attack: consists in the disruption of an
existing connection by desynchronization of the sequence number

SYN Flooding: the attacker may repeatedly make new connection


requests until the maximum limit connection is reached

12
A. Benslimane IWCMC2010

MANET Security Attacks


Cross-layer attacks
It is complex attacks based on more than one layer to form the attack

Shortcut or detour attack: is based on MAC layer to


create an attack at the network layer

13
A. Benslimane IWCMC2010

Security Protocols
Symmetric cryptography
the key which is used for encryption is the same that is used for decryption, DES, 3DES, ...) (

Asymmetric (public key) Cryptography


each node has a private key which it is the only one to own, and the public key known by its correspondents, (RSA, ElGamal, )

Cryptographic hash function


It is irreversible function which takes as input a message of arbirary lenght and produces as output a message digest of fixed length (MD5, SHA, )

Digital signatures
allows the message receiver to check the sender's identity and the sender also cannot refuse the message content then
14
A. Benslimane IWCMC2010

Security Protocols
Threshold cryptography
(n, k +1) threshold cryptography scheme, the secret key is divided into n partial shares where at least k+1 of n are partial shares which are needed to generate a secret S. The advantage is its increased availability,

PKI (Public Key infrastructure)


A framework for creating a secure method for exchanging information based on public key cryptography. The foundation of a PKI is the certificate authority (CA), which issues digital certificates that authenticate the identity of organizations and individuals The certificates are also used to sign messages
15
A. Benslimane IWCMC2010

Security Protocols
Trust models
1. Hierarchical model

2. peer to peer model

16
A. Benslimane IWCMC2010

A new MAC Layer Contribution

Modeling and Analysis of Predictable Random Backoff in Selfish Environments [15]

17 A. Benslimane IWCMC2010

Behavior: Selfish Behavior: Manipulation of CW

18 A. Benslimane IWCMC2010

Predictable Random Backoff


IEEE 802.11 Binary Exponential Backoff (BEB)
Initially, cw is randomly selected from [0, CWmin] In the presence of failed transmission, cw is selected from [0, 2i CWmin] , i is the number of failed transmission Upon successful transmission, cw is selected from [0, CWmin]

Predictable Random Backoff (PRB)


Initially, cw is randomly selected from [0, CWmin] In the presence of failed transmission, cw is selected from [0, 2i CWmin] , i is the number of failed transmission Upon successful transmission, however: If cw is less than threshold, cw is selected from [CWlb, CWmin] If cw is larger than threshold, cw is selected from [0, CWmin]
19 A. Benslimane IWCMC2010

CrossA new Cross-Layer Contribution

Inter Layer Attacks in Mobile Ad Hoc Networks [16]

A. Benslimane IWCMC2010

The Problem
cw, Due to the random selection of cw, manipulation of cw is t he most difficult selfish behavior to be detected Some work has been done on the detection and reaction of selfish behavior
UIUC scheme: 1) Let the receiver to assign the contention window for the tran smitter; 2) The receiver will monitor the idle time slots between consecu tive multiple transmissions, it will give an alarm if the transmit ter fails to obey the assignment upon a pre-defined threshold DOMINO: 1) No reaction scheme, only detection 2) Detection of manipulation of cw is similar to UIUC, however it can also detect manipulation of NAV and IFS

A. Benslimane IWCMC2010

The Problem cont.


Problems with current methods: a selfish / malicious node sel ectively manipulate cw for routing packets to distract/attract f lows:

Detour: selectively using large cw to reduce the chance to be selected as a forwarding node Shortcut: selectively using small cw to increase t he chance to be selected as forwarding node A misbehaved node does not need to know the ex act packet type, i.e., a broadcast packet most lik ely indicates a route request packet Hard to be detected because less packet informa tion can be collected for statistical analysis
Therefore, we need some new methods to mitigate these new at tacks
A. Benslimane IWCMC2010

Inter Layer Attacks in Mobile Ad Hoc Networks


PSD-I: Randomized Routing Message Selection (MA C)
Define a timeout timer; Buffer received routing/broadcasting packet within timer du ration; Randomized selection of messages collected within the tim er; Packet out of timer bounds could be misbehaved node(s).

PSD-II: Randomized Routing Message Delaying (Rou ting)


Introduce small delays for received routing messages
23 A. Benslimane IWCMC2010

Case (I):

Route Changes: Original: Original: S W0 M1 W2 D Attack: M2 D (M0, M2 attracts route request pkts) Shortcut Attack: S M0 M1 Detour Attack: S W0 W1 W2 D (M1 delays route request pkts)
24 A. Benslimane IWCMC2010

Case (II):

Route Changes: Original: three hops A. nine hops Detour: Benslimane IWCMC2010

Secure routing protocols


ARIADNE [8] Authentication Routing for Ad-hoc Network (ARAN) [7]

Securing Ad hoc Routing Protocols (SAODV) [13] Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks (endairA) [14]
26
A. Benslimane IWCMC2010

Secure routing protocols


A R I A D N
Authentication of routing messages

Ariadne [8] is a reactive routing protocol, proposed by Hu, Perrig and Johnson. Goal: to secure the former DSR protocol
The packets integrity is insured by the symmetric cryptography and MAC (Message Authentication Code). The end-to-end authentication of original and destination nodes and of intermediate nodes which participate to the routing thanks to an authentication mechanism (TESLA: Timed Efficient Stream Loss-tolerant Authentication ) [5]

TESLA, or digital signatures, or standard MACs


27
A. Benslimane IWCMC2010

Secure routing protocols


A R I A D N E
K0 S0 F2 K1 Generation sequence of keys
A. Benslimane IWCMC2010

TESLA authentication protocol [9]


TESLA divides the time interval into N intervals that last the same duration.

i-1

i+1

i+2

n t

F1

S1 F2

F1

...

F1

Sn-1 F2 Kn-1

F1

Sn F2 Kn TESLA key
28

Secure routing protocols


A R I A D N E
29
A. Benslimane IWCMC2010

RREQ mechanism is reinforced by 8 parameters.

<ROUTE REQUEST, Source, Destination, ID, Time interval, hash chain, nodes list, MACs list >
ID : identification number of RREQ packet Time interval: TESLA interval: this is the maximum duration which is necessary so that an original node reaches its destination in the network Hash chain(i)=H(current node, hach chain(i-1)) Nodes list: nodes that have participated to the routing Macs list: calculated with TESLA keys at each nodes level

Secure routing protocols


A R I A D N E
30
A. Benslimane IWCMC2010

The operating steps of ARIADNE


1. After the synchronization, the sender sends a RREQ with a MAC which was encrypted with the TESLA key 2. Each node which participates to the packet routing must add its identity and a MAC encrypted with the TESLA key, that was hached several times (hop number) 3. As soon as the destination node receives the packet, it checks the security condition of TESLA:
Was the TESLA key not already broadcast?

4. After the TESLA key has been broadcast, the receiver checks the packet integrity, if everything worked well, the RREP is sent to an original node. If it did not, the packet is rejected

Secure routing protocols


A R I A D N E
31
A. Benslimane IWCMC2010

Advantages:
Every replay attack are avoided Non-centralized management of keys

Disadvantages:
Ariadne protocol is vulnerable to DoS attacks (buffer overflow before the packets have been checked) Not all real time protocols are supported

Secure routing protocols


e n d a i r A
32
A. Benslimane IWCMC2010

Same as Ariadne:
Instead of signing the rreq, intermediate nodes sign the rrep

security
endairA is provably secure if the signature scheme is secure against chosen message attacks

efficiency
endairA requires less computation
route reply is signed and verified only by the nodes on the route in Ariadne, route request is signed (and potentially verified) by every node in the network

Secure routing protocols


S A O D V
SAODV is a secure variant of AODV protects non-mutable information with a digital signature (of the originator of the control packet) uses hash chains for the protection of the HopCount value
new non-mutable fields:
MaxHopCount (= TTL) TopHash (= iterative hash of a random seed MaxHopCount times) Hash (contains the current hash value corresponding to the HopCount value)

new mutable field:

operation
initially Hash is set to the seed each time a node increases HopCount, it also replaces Hash with H(Hash) verification of the HopCount is done by hashing the Hash field MaxHopCountHopCount times and checking if the result matches TopHash 33
A. Benslimane IWCMC2010

Secure routing protocols


A R A N
Reactive protocol, Based on the introduction of a certification authority (CA), Goal is to insure:
Nodes authentication Messages integrity Non-repudiation

The principle: in order to participate to the routing, nodes must own a valid certification from CA

34
A. Benslimane IWCMC2010

Secure routing protocols


CA: certification authority

A R
Nud A

A N

Nud B Nud X Nud C

Operations principle:
1. The node A must request its certification to CA in order to join the network 2. CA gives the certification after it has checked the node s identity
CA A : CertA = [IPA, KA+, t, e] KCA-A. Benslimane IWCMC2010

35

Secure routing protocols


A R A N
3. The node A broadcasts an RDP (Route Discovery Packet) with its certification
A broadcast : [RDP, IPX, NA, t]KA--, certA

4. The node As neighbours will check the certification validity and then they add their certifications and broadcast the packet
B broadcast : [[RDP, IPX, NA, t]KA--]KB-- , certA, certB

5. When a node C receives the RDP packet, it will check both A and Bs certifications and then it removes Bs certification an d it adds its own
C broadcast : [[RDP, IPX, NA, t]KA--]KC--,certA, certC 36
A. Benslimane IWCMC2010

Secure routing protocols


A R A N
6. At the end the RDP packet arrives to the destination X and after checking the certifications the REP packet is sent to the original node A
X C : [REP, IPA, NA, t]KX--, certX

7. The REP packet will follow the same RDP path until the node A
B A : [[REP, IPA, NA, t]KX--]KB--, certX, CertB

8. If the node C does not find the path until the node X, it will generate the error message which will be sent to the node B
C B : [ERR, IPA, IPX, NC]KC--, CertC
37
A. Benslimane IWCMC2010

Secure routing protocols


Advantages :

A R A N

Non-authorized modifications are detected The nodes authentication and the non-repudiation are insured

Disadvantages :
The asymmetric cryptography is expensive in terms of computational and energy requirements (eg.: RSA and keys size 512 bits (Laptop: 1200MHz and RAM= 512 Mo)=> 2,2 ms). ARAN dont protect against the Wormhole attack (Tunneling) A heavy charge on the CA, if it breaks down, the network security will not be insured anymore

38
A. Benslimane IWCMC2010

TWO Contributions at routing layer

A Secure Architecture for MANET [1]

A Confident Community to Secure MANET [2]

39
A. Benslimane IWCMC2010

A Secure Architecture for MANET - Outline

Motivation Overview of the architecture


Trust Model Dynamic Demilitarized Zone (DDMZ) Secure Distributed Clustering Algorithm (SDCA)

Performance Evaluation: simulations Conclusion and Future Work

40
A. Benslimane IWCMC2010

A Secure Architecture - Motivation


In Mobile Ad Hoc Networks some nodes are:
Confident, cooperative Misbehave, selfish Relative mobility

=> To use the diversity with trust level and mobility among nodes in order to secure a network
41
A. Benslimane IWCMC2010

A Secure Architecture - Motivation


The goals
To define a hierarchical architecture when a network is divided into clusters, with one CA node for each cluster To Provide Public Key Infrastructure (PKI) in each cluster and to secure inter-cluster communication To elect CA among nodes having highest trust level and stability Maintain as long as possible the conceived architecture

42
A. Benslimane IWCMC2010

A Secure Architecture - Trust Model


Trust metric (Tm) : continuous value in [0 1] Only confident nodes have Tm = 1 Each node has trust table which is updated at each metric change and exchanged by nodes with high trust level Each new unknown node starts with Tm = 0 (lower trust level)

43
A. Benslimane IWCMC2010

A Secure Architecture - Trust Model


Definition
To get high trust metric (Tm = 1) either:
1. A node is known by confident nodes and has exchanged keys over secure channel [5] [6] OR 2. A node which has proved its full cooperation (i.e, forward)

=> The idea consists to oblige the unknown nodes to wellbehave

44
A. Benslimane IWCMC2010

A Secure Architecture - Trust Model


We define five types of role for the node :
1. 2. 3. 4. Certification authority of cluster (CA) with Tm = 1 Registration authority of cluster (RA) with Tm = 1 Gateway between clusters (GW) with Tm [0.7 1.0] Member (MN) which success to pass from visitor to member status by well behaviour with Tm [0.5 0.7] 5. Visitor (VN) with Tm [0.1 0.5]

45
A. Benslimane IWCMC2010

A Secure Architecture - Trust Path


The trust value of a path depends on its trust chain. The trust evaluation between two nodes consists to take the small trust value of nodes.

46
A. Benslimane IWCMC2010

A Secure Architecture - Dynamic Demilitarized Zone


Definition
A set of nodes at one hop from CA
- Each node is a Registration Authority (RA)

The role of these nodes is to protect the CA from untrusted nodes

47
A. Benslimane IWCMC2010

A Secure Architecture - Secure Distributed Clustering Algorithm


Main rules of SDCA
Only confident nodes (Tm(i) = 1) can be candidate to become CA Each cluster-head is CA of only one cluster All confident neighbors of CA, can become RA in the cluster Other nodes are at distance of maximum d-hop from the CA

48
A. Benslimane IWCMC2010

A Secure Architecture - Secure Distributed Clustering Algorithm


CA Selection Criteria:
Security: To increase the security of the cluster, SDCA selects the confident node with a maximum trust degree (Tm = 1) and at least one confident neighbor Stability: Is based on mobility metric [1]. It gives a good knowledge about the relative mobility between two neighbors nodes

49
A. Benslimane IWCMC2010

A Secure Architecture - Secure Distributed Clustering Algorithm


Each CA candidate node starts to send beacon with information for the election
Identity of CA candidate Dgree of confident neighbors (DTN) Relative mobility (RM) to its trust neighbors Number of hop from CA (Hop-Count) Sequence number of beacon Message Authenticated Code (MAC) of beacon (MACK[CA, Hop count,DTN,RM, Sq num])
50
A. Benslimane IWCMC2010

A Secure Architecture - Secure Distributed Clustering Algorithm

51
A. Benslimane IWCMC2010

A Secure Architecture - Secure Distributed Clustering Algorithm


Example

52
A. Benslimane IWCMC2010

A Secure Architecture - Security analysis


The security of our architecture depends directly on the trust model. The presence of a great number of confident nodes increases the security of the network. All communications from a malicious nodes or malicious cluster are ignored. The Denial-of-Service (DoS) attack over CA node is prevented by DDMZ where RA nodes filter all requests from unknown nodes. The robustness of DDMZ depends on the number of RAs which collaborate in order to protect CA of their cluster.

53
A. Benslimane IWCMC2010

A Secure Architecture - Security analysis


The malicious nodes can use the identity of legitimate nodes only if their privates keys are divulgated. If attackers try to compromise all the network, it must compromise all CA The cluster size must be adapted with number of confident nodes in order to well secure CA node (trade-off between the number of confident and unknown nodes must be founded). The presence of two confident nodes is the minimum configuration of clustering and it must be reinforced. We can use the thresholds cryptography scheme in each cluster after CA election.

54
A. Benslimane IWCMC2010

A Secure Architecture - Resume


Hierarchical architecture to distribute a certification authority Combination between security and stability to construct clusters in order to secure the network DDMZ concept to prevent attacks against CA nodes This architecture is adapted to topology changes

55
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Motivation

In order to maintain the network security when unknown nodes join the network, the monitoring process is necessary. The security of the cluster is insured by the cluster manager. The concept robustness of the DDMZ require to be well investigated

56
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Secure election process


Secure Distributed Clustering Algorithm (SDCA):
Select the a clusterhead (CH) which become the CA according the trust level and the stability

57
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Monitoring process (1/3)


Each node with a high trust level monitors its neighbor nodes with low trust level The monitor process acts in the different network protocol layer (MAC, Routing, )
MAC layer: Monitor nodes supervise the channel occupation by their neighbors. This function is motivated by one type of selfish misbehavior (The selfish nodes cheat from the choice of the backoff in order to access more bandwidth than other nodes) As solutions:
DOMINO for WLANs [10], PRB(Predectible Random Backoff) [11] for MANET,

Network layer: Monitor nodes supervise the packet forwarding activities of its neighbor nodes and packet integrity. As solutions: Watchdog [12]

58
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Monitoring process (2/3)

We focus on the network layer for the monitoring


59
A. Benslimane IWCMC2010

A Confident Community to Se cure MANET - Monitoring process (3/3)


Let node x and y with Tm(x) > Tm(y):
The node x can monitor the node y, The node x sends a certain number of packets to the node y with an other destination node, After a fixed time interval, the node x can calculate the reputation rating:

Each unknown node starts with a low trust metric (Tm=0.1) and increases when it proves its cooperation and well-behavior If R1 is the report generated for MAC layer, the final report about a node y is:
60
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Cluster Manager (CM) (1/2)


The cluster manager is formed by the:
The Certification Authority (CA) node A set of nodes with high trust levels (if these nodes are located at one hop from CA node, they become the Registration Authority RA)

The role of the CM is:


Insure the cluster security where the CA node will generate a certificate for a cluster member A set of RA nodes forms the DDMZ in order to protect the CA node ag ainst CA node attacks The DDMZ use the reputation rating from the monitoring process to ev aluate the cluster members.
61
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - Cluster Manager (CM) (2/2)


If the CM receives k report from monitor nodes to evaluate the node y, then:

The different functions of the CM and the interaction with monitoring module

62
A. Benslimane IWCMC2010

A Confident Community to Secure MANET - SDCA, Monitoring, Cluster manager


The monitoring, the election (SDCA) and the cluster manager modules, interact with a trust model (transitions: 1, 2, 3) Modules election and cluster manager call the monitoring module to control the behviors of the nodes (transitions: 4, 6) The cluster management module is the result of SDCA with the transition 5

63
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Confident connectivity model (1/4)


The idea is to distribute k confident nodes among n (total number of nodes in the network), In each cluster, the CA node and the confident nodes directly connected form the DDMZ, Two nodes (i) and (j) can directly communicate with each other, if |Xi-Xj| < R (R is a transmission range and Xi location of the node i) The confident community is defined as a set of confident nodes which have the highest trust level
64
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Confident connectivity model (2/4)


Assumptions:
There is no obstacle in the area All nodes have the same transmission range R Each confident node knows the public cryptography keys of all confident nodes The nodes are distributed with Poisson arrival rate

The probability that a node (i) can directly communicate with a node (j) is:

65
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Confident connectivity model (3/4)


The probability to have d+1 confident nodes directly connected is:

The higher the transmission range is, the greater the probability of connected network is The probability to get two nodes i and j directly connected, knowing that they belong to the set of confident community |K|=k in the networ k of n total number of nodes is:

66
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Confident connectivity model (4/4)


The probability of (d+1) confident nodes directly connected
according to the transmission range (R), the percentage of confident nodes in the network (k/n) and the degree of direct connectivity d between confident nodes,

67
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Results analysis


The clusters and CAs become more resistant against DoS (Denial of Services) attacks when the transmission range is getting longer. The result shows that: when the transmission range increases, the probability of two directly connected nodes is increased. Also, the probability of directly connected confident nodes is also increased. It indicates the probability to build robust DDMZ depends on the station transmission range. The best configuration of cluster is to find the trade-off between the number of RA and the number of nodes with low trust levels.
68
A. Benslimane IWCMC2010

A Confident Community to Secure MANET Resume (1/2)


a confident connectivity model to study the security robustness in the clusters. Dynamic Demilitarized Zone (DDMZ), this approach consists on the protection of the certification authority (CA) in each cluster. The security of each cluster depends of the robustness and the availability of the registration authority which form the DDMZ

69
A. Benslimane IWCMC2010

References
[1]A. Rachedi and A. Benslimane, "A Secure and Resistant Architecture against Attacks for Mobile Ad Hoc Networks", Journal of Security and Communication Network, John Wiley InterScience, Vol. 3, N 2-3, March-June 2010, pp.150-166. [2] A. Rachedi, A. Benslimane, Lei Guang and Chadi Assi , A Confident Community to Secure Mobile Ad-Hoc Networks, IEEE International Conference on Communications (ICC 2007), 24-28 June 2007, Glasgow, Scotland, UK. [3] P. Basu and N. Khan and T. Little, " A mobility based metric for clustering in MANET ", In Proceedings of Distributed Computing Systems Workshop, :4351, 2001. [4] M. Gerla and J. T.-C. Tsai, " Multicluster, Mobile Multimedia Radio Networks" , Wireless Networks. (1995) 255256 [5] S. Yi and R. Kravets, " Quality of Authentication in Ad Hoc Networks" , ACM, MobiCom 2004. [6] S. Capkun and J. P. Hubaux and L. Buttyan, " Mobility Helps Peer-to-Peer Security " , IEEE Transactions on Mobile Computing. 5 (2006) 4860 [7] Kimaya sanzgiri, Bridget Dahill, Secure Rourting Protocol for Ad Hoc Networks , IEEE ICNP 02 [8] Yih-Chun Hu, Adrian Perrig, David B. Johnson Ariadne : A Secure On-Demand Routing Protocol for Ad Hoc Networks, MobiCom2002
70
A. Benslimane IWCMC2010

References
[9] Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Song, The TESLA Broadcast Authentication Protocol, RSA CryptoBytes, 2002. [10] M. Raya and J.-P. Hubaux and I. Aad, DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots, In Proc. of MobiSys04 [11] L. Guang, C. Assi, and A. Benslimane, Enhancing IEEE 802.11 Random Backoff in Selfish Environments, IEEE Transactions on Vehicular Technology Journal, May 2008, Vol. 57, N 3, pp. 1806-1822. [12] K. L. S. Marti, T.J. Giuli et M. Baker, Mitigating Routing Misebehavior in Mobile Ad Hoc Networks, ACM/IEEE International Conference on Mobile Computing and Networking, 255265. [13] M. G. Zapata and N. Asokan, Securing Ad hoc Routing Protocols, ACM Workshop on Wireless Security (WiSe 2002), pages 1-10. September 2002. [14] G. Acs, L. Buttyan, and I. Vajda, Provably Secure On-demand Source Routing in Mobile A d Hoc Networks, IEEE Trans on Mob. Comp. 5(11), 2006. [15] L. Guang, C. Assi, and A. Benslimane, Enhancing IEEE 802.11 Random Backoff in Selfish Environments, IEEE Transactions on Vehicular Technology Journal, May 2008, Vol. 57, N 3, pp. 1806-1822. [16] L. Guang, C. Assi and A. Benslimane, On MAC Layer Misbehavior in Wireless Networks: C hallenges and Solutions, IEEE Wireless Communications Magazine, Special Issue on Security in W 71 ireless Mobile Ad Hoc and Sensor Networks, , Vol. 15, N 4, August 2008, pp. 6-14.
A. Benslimane IWCMC2010

Outline Part II
Security on Vehicular Ad hoc Networks (VANETs)
Motivations Security issues and solutions Applications based Dissemination Optimized Dissemination of Alarm Messages: ODAM A risk aware MAC protocol: CRCCA Connecting VANET to Internet: VANETII References

72
A. Benslimane IWCMC2010

Part II Vehicular Ad Hoc Networks: Security and Dissemination

IWCMC June 28, 2010

Professor Abderrahim BENSLIMANE

Outline
Motivations and applications of vehicular communications

Security issues and solutions Applications based Dissemination Optimized Dissemination of Alarm Messages: ODAM A risk aware Mac protocol: CRCCA Connecting VANET to Internet: VANETII References

6/26/2010

Background on Safety
In the US: 6+ million traffic accidents per year
90% driver errors, 43 000 deaths, 3 million injuries,

Financial cost: more than $230 billion Overall Goal: Reduce traffic accidents
Fewer injuries and fatalities Lower direct and indirect cost Reduced traffic congestion

In Europe:
Specific Goal: to reduce the car accidents of 50% by 2010 All world is compact in putting money on safety issues
6/26/2010 3

Background on Traffic Management Unregulated traffic cost much Congestion is a big source of waste
3.6 billion vehicle-hours of delay 5.7 billion gallons of wasted fuel

Improve traffic flow and reduce congestion



6/26/2010

Smart traffic signals Enhanced transit system Central traffic management Electronic toll collection
4

Wireless communications
GPRS/UMTS
Expensive, reliability, capacity, timing

IEEE 802.11-based
DSRC: Dedicated Short Range Communications Car-Car communications at 5.9Ghz 802.11p: IEEE Task Group that intends to standardize DSRC for Car-Car communications 802.11-based Mesh Networks

IEEE 802.16
802.20: extension to high mobility scenarios

Sensor Networks
Bluetooth (in-vehicle communications) ZigBee
6/26/2010 5

Smart Vehicles

Event data recorder (EDR) Forward radar Positioning system (GPS)

Communication facility

Rear radar Display Computing platform

Different components of a Smart vehicles

6/26/2010

VANET characteristics
High mobility: Fast topology changes, Predictable movements of vehicles : Trajectory are linked to roads, There are no constraints of weight or problems with energy conservation, Communications are short and the intervals are about microseconds.
6/26/2010 7

DSRC Network Architecture

Communication paradigms:
V2V V2I, Hybrid.

DSRC: Dedicated Short Range Communications(75


MHz in the 5.8/5.9 GHz band)
V2I V2I

IEEE802.11p (PHY and MAC layers)


6/26/2010

V2V V2V

Some applications (1/2)


Collision Avoidance*
Warn a driver that is not safe to enter an intersection Prevent many vehicle rear-ending each other after a single accident Early braking, Distance keeping and speed management, Lane changing/merging/crossing

Cooperative Driving*
Violation warning, Turn Conflict and Curve warning Lane merging warning

* Life critical
6/26/2010 9

Some applications (2/2)


Traffic Optimization *
Traffic delay continues to increase: Waste time, specially when peak time travelers

Vehicles can serve as data collectors


Transmit the traffic condition information: Number of neighbors and
their mean velocities.

Payment Services
Electronic toll payment

Location-based Services
Parking spot locator Enhanced route guidance and navigation
6/26/2010 10

Security Requirements Authentication and data integrity:


Verify properties of the sender: vehicle, ambulance, traffic sign Detect replay (Timestamp) The sender can be authenticated but the message is falsified

Driver Privacy Detect the actual and not the virtual


Sybil attack: an adversary can transmit safety-related packets
i.e., falsely identify a road as congested
6/26/2010 11

Security Requirements Non-repudiation Secure vehicles localization:


Verify if the sender is actually at the claimed position

High availability and strict message delivery deadline


Adversaries will always be able to reduce availability: Denialof-service attacks

6/26/2010

12

Challenges
Trade-off between authentication and non-repudiation versus privacy Nature of VANET
High speed Open network

Some protocols cannot be employed: voting, consensus and based-reputation Sheer scale
not for protocols that require pre-stored information about participants

Opposing incentives of participants Law enforcement agencies () Drivers


6/26/2010 13

Mitigating characteristics

Mobility of VANET can sometimes be beneficial, Circulation in two opposite directions, Well specified limits: road, motorway, determined number of lanes, etc. Not limited in power: complex cryptographic operations, All vehicles are to be registered in a central authority, Vehicles can leverage their knowledge from the drivers response.

6/26/2010

14

Adversaries

Rational or Malicious
Rational seeks personal benefits, more predictable attack, Malicious No personal benefit, intends to harm other users,

Industrial Insider is a valid user Active or passive attacks


Active: Generates packets, participates in the network, Passive: Eavesdrop, track users, etc.
6/26/2010 15

Some attacks

Disruption of network operation:


Deny of service, Selfish misbehavior

Disclosure of identities, Wormhole attack Cheating with identity or positioning information,


6/26/2010 16

Some Solutions 1/6

Security Hardware
Event Data Recorder (EDR)
Records all emergency-related information received: position data, speed data, acceleration data, time, etc. Liability-related messages should be stored in the EDR

Tamper-Proof device (TPD)


Provides the ability of processing Verify and signs messages Protects Hardware : a set of sensors to detect hardware tampering Has its own battery, own clock, High cost
6/26/2010 17

Some Solutions 2/6

Authentication
Digital Signature Each message should be signed and accompanied with a Timestamp/replay, Symmetric cryptography is not suitable messages are standalone, large scale, non-repudiation required, Cryptosystem based on asymmetric cryptography (VPKI: Vehicular PKI ) Hash function: message space
6/26/2010

hash-codes of specific size


18

Some Solutions 3/6

Non-repudiation
A single unique identity to each vehicle : Electronic License Plate (Affected by the Government) Electronic Chassis Number (Affected by the manufacturer) A CA store a mapping between the unique identity of the vehicle and its set of public keys. Digital signature (using the unique private key of the sender)

6/26/2010

19

Some Solutions 4/6

Save anonymity of drivers


Relationship between the unique identity and public keys must be not visible Use of pseudonyms (one or more): only authorities know the mapping to the unique identity Use of group key: To each group of vehicle is assigned a key

6/26/2010

20

Some Solutions 5/6

Authentication of aggregated data


Emergency road condition warning applications: In large network, a simple forward of all messages is inefficient: significant overhead Message related to the same road condition
Fusion, extrapolation, etc Reduce overhead : redundant transmissions

Example: in application of congestion avoidance: Position and speed of vehicles can be approximated step by step:
It is not very useful to have a high degree of accuracy of the position of an accident if this is further away from the originating nodes (neighboring of the accident)

6/26/2010

21

Some Solutions 6/6 Group formation and Communication


Static group formation: specific vehicles are part of specific group
Rigid and not scalable not suitable for VANET

Dynamic group formation:


Vehicles form groups based their driving pattern and their location Overhead of group formation must be very limited

6/26/2010

22

Some Solutions 6/6


Geographic-based group formation:
The map is divided into small cells: use of localization system (GPS ) Each vehicle knows which group it belongs to at any moment based on its location One group leader per cell: the one closest to the center limited overhead

6/26/2010

23

Optimized Dissemination of Alarm Messages: ODAM

6/26/2010

24

ODAM: Optimized Dissemination of Alarm Messages


To face the network fragmentation while avoiding neighbors computation Solution Geocast: use GPS coordinates of vehicles Introduce Defer Time Distance >> reduce the number of message collisions >> reduce the number of retransmission >> best use of bandwidth >> reduce the delay
Dynamical Relays >> to face the fragmentation Tacking into account the direction of circulation
6/26/2010 25

ODAM: Optimized Dissemination of Alarm Messages

Defer Time Distance

x a b c Accident Alarm message propagation Risk zone Transmission range

defertime ( x) = max_ defer _ time


6/26/2010

( R Dsx )

R
26

ODAM: Optimized Dissemination of Alarm Messages

Accident (1) Initial (0) Waiting (2) Relay broadcasts (4) Passive (5) Direction of circulation
6/26/2010 27

A cluster Based Risk aware cooperative collision avoidance: CRCCA

6/26/2010

28

CRCCA: Related Work

Traditional CCA:
A vehicle dispatches warning messages to vehicles behind it, Warning messages are transmitted over multiple hops, A recipient takes on account the direction of the message Message will be ignored if it arrives from behind generation of large number of messages generation of redundant messages access medium
6/26/2010

Collision in the
29

The 802.11 Mac layer: Issues

Back-off mechanism Increase of the data delivery latency, In case of CCA, decrease of the 802.11 effectiveness, Some vehicles will not have time to react.

6/26/2010

30

CRCCA: Dynamic clustering of vehicles

The clustering considers only vehicles moving in the same road towards the same direction, Three roles of nodes: CH: cluster head, SCH: sub cluster head, the last vehicle reached by the CA ON: ordinary member

6/26/2010

31

CRCCA: An example of three clusters

6/26/2010

32

CRCCA: a risk aware Mac protocol(1/3)

In a cluster i, to each vehicle correspond an emergency level as follow: i

i
S: cluster size : skew factor

(1 ) =

(1 S )

1 i S

The contention windows of a vehicle in cluster i: j


k

CW

j =1

(1 i ) .cw .

k : the number of transmission attempts cw : window size : the slot time of the used PHY layer
6/26/2010 33

CRCCA: a risk aware Mac protocol(2/3)

Calculate of i , maximum latency since the detection of emergency situation: if Ci and Ci +1 slow down with ae and ar respectively:

max Then i is:

i max = Max (

Vi ae

V 2 Vi .( (V i + 1 i ) d i +1, i _ L v ) , 0 ) ar ae 2

ar :Is the regular deceleration, ae : is the emergency deceleration, Lv : the average vehicle length.
6/26/2010 34

CRCCA: a risk aware MAC protocol(3/3)

As consequence :
(1 i ) j .cw. j =0
Min ( j = 0 (1 i ) j .cw. , i
k max

CWi =

if i max = 0
) otherwise

6/26/2010

35

Connecting VANET to Internet: An efficient routing protocol

6/26/2010

36

Connecting VANET to Internet: Related Work


Ad hoc

routing protocols do not typically select a route with sufficient lifetime to maintain the longest possible duration of communication with a mobility agent. The handover mechanism is not sufficiently fast to manage handovers in VANET environment known as Strong Mobility. More than one gateway may be available at the same time, How to discover gateways with the best quality of service (QoS) without wasting network resources.

6/26/2010

37

Connecting VANET to Internet: Related Work FleetNet Project


The FleetNet investigated the VANET Internet Integration through stationary roadside gateways, Use of a modified version of Mobile IPv6 to handle the mobility, Use of a service discovery protocol for gateway discovery, Use location based routing protocols.

Problems
Do not take vehicle movement parameters into account, Do not cover handovers.
6/26/2010 38

Connecting VANET to Internet: Related Work


MMIP6
A mobility management protocol (for VANETs): integrate IPv6-based VANETs into the Internet Use of a proactive service discovery protocol for Foreign Agent (FA) discovery. The service announcements are restricted to a limited broadcast zone: Using of geocast capabilities of VANET routing protocols. Avoid of the flooding of the overall network In route selection, a fuzzy-based approach is used It considers available information about gateways.
6/26/2010 39

Connecting VANET to Internet: VANETII


VANETII (VANET Internet Integration):
Purpose: discover of gateways creation routes to them.

Three phases in VANETII :


Agent (gateway) discovery Route selection handing the connection to the new gateway.

The aims :
reducing the overhead during the gateway discovery process selecting the most stable route to gateways performing seamless handovers.
6/26/2010 40

Connecting VANET to Internet: VANETII


In VANETII network , two types of nodes : Vehicles : stationary or mobile Gateways : stationary. Each vehicle is equipped with a positioning system, e.g., GPS, The coordinate of a vehicle u is denoted as (xu, yu). Each vehicle is also able to calculate its speed, Vu, and direction, u. Links between vehicles are established if the distance between them is less than their transmission range R.
6/26/2010 41

Connecting VANET to Internet: VANETII


Table : Agent Advertisement Message Fields Field Gateway Relay Sequence Number Sender Position Sender Speed Sender Direction RET Zm Description Address of the source gateway Relay address Message Sequence Number Geographical Position of the sender Speed of the sender Direction of the sender Expiration time of the route Message Broadcast Zone

6/26/2010

42

Connecting VANET to Internet: VANETII Proactive Gateway discovery:

X Y

A B C

A Gateway broadcasting an advertisement message periodically, then relays rebroadcast


6/26/2010 43

Connecting VANET to Internet: VANETII


Stability metric
Link Expiration Time (LET): time duration such that two nodes will remain connected. Let (xi , yi) and (xj , yj) be the coordinate of the vehicles i and j which are moving in direction i ,j (0 i , j < 2 ) with the speed of vi and vj, LETij is as follows :

LETij =
Where :

( ab + cd ) + ( a 2 + c 2 ) r 2 ( ad bc ) 2 a 2 +c2

a = vi cos i v j cos j ; b = xi x j c = vi sin i v j sin j ; d = yi y j


44

6/26/2010

Connecting VANET to Internet: VANETII


Stability function :

S = 1 e

LET a

a: a constant that defines the rate at which the function is rising: the lower is a, the faster the function rises:
Effect of selecting different values of a on function S

6/26/2010

45

Connecting VANET to Internet: VANETII


Let Rk be a route, which consists of n 1 links l01, l12, ... , l(n2)(n1) between n vehicles 0, 1, ..., n1 To compute the Route Expiration Time (RET) we should find the link which expires before the others, hence:

RETk = Min{LETi,(i +1) | i = 0 .. n - 1}


With analytical studies, we compute a, and then the stability function will be:

S = 1 e
6/26/2010

2 LET RET

46

Connecting VANET to Internet: VANETII


If two nodes have the same stability function value introduce a second function to eliminate duplications We will take into account the progress that the packet has made in the opposite direction of the movement:

The second function is as follow: cos( i j ) d ij

P=

Where: i sender, j,k,l receivers (j is the farther).


6/26/2010 47

Connecting VANET to Internet: VANETII


We should combine S and P together. P should not be as effective as S for next hop selection:

F = S + (1 ) P
For the contention in our protocol we select the timer runtime as:

t ( F ) = T (1 F )
Where: T: the maximum forwarding delay. The next hop will be the one with the longest lifetime and the largest progress in the opposite direction of the road.

6/26/2010

48

Conclusion

We presented Security issues of vehicular networks and We proposed: ODAM, a protocol for disseminating alarm messages, CRCCA, a risk aware Mac protocol, VANETII, a protocol for connecting VANET to Internet Still open field in security: Group formations and management of public/private key, group signature Preserving privacy: attacks against privacy in different layers.
6/26/2010 49

Further readings
Securing Vehicle ad hoc networks, M. Raya and J.P. Hubaux, J. of comp. Science, Vol. 15, pp. 39-68, 2007. Secure Vehicular Communication Systems: Design and Architecture, P. Papadimitratos, et al., IEEE Communication Magazine, 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks, Computer Communications, 2008. Optimized Dissemination of Alarm messages in Vehicular Ad-Hoc Networks (VANET), A. Benslimane, 7th IEEE HSNMC 2004, LNCS 3079, Springer Publisher, pp.655-666. An Efficient Routing Protocol for Connecting Vehicular Networks to the Internet, S. Barghi, A. Benslimane and C. Assi, 10th IEEE WoWMoM 15-19 June 2009, Greece. Towards an Effective Risk-conscious and Collaborative Vehicular Collision Avoidance System, T. Taleb, Z. Fadlullah, A. Benslimane, and K. Ben Letaief, IEEE Transaction on Vehicular Technology.

6/26/2010

50

Thank you
COCONCLUSIONS AND FUTUREWORKS

6/26/2010

51

Das könnte Ihnen auch gefallen