+ All Categories
Home > Documents > S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

Date post: 29-Dec-2015
Category:
Upload: olivia-delphia-ward
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
21
SECURITY ISSUES IN MOBILE AD-HOC NETWORK Mukul A. Khairatkar
Transcript
Page 1: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

SECURITY ISSUES IN MOBILE AD-HOC NETWORKMukul A. Khairatkar

Page 2: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

AGENDA

Introduction to MANET

Various Security Model

Operations

Introduction to IPSec

IPSec Operation

Simulation Details

Conclusion

Page 3: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

MOBILE AD-HOC NETWORK

No Infrastructure No Server Nothing Everybody acts like a Router Security Problem

Network Resources Source Spoofing Eavesdropping Data Transformation

Page 4: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

SECURITY

Key Pre-Distribution Scheme Web of Trust Public Key Certification IPSec

Page 5: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

SOME SECURITY TERMS

Public Key

Private Key

Digital Signature

Certificate

Digital Signature

Certificate Of Authority

Certificates

Public Key Infrastructure

X.509

Page 6: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

KEY PRE-DISTRIBUTION SCHEME

Node 1

Node 3

Node 4

Node 2

Key

Key

Key

Key

Key

Key

Page 7: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

WEB OF TRUST

Node 1

Node 2

Node 3

PGP

PGP

PGP

Public

Key

Public Key

Page 8: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

PUBLIC KEY INFRASTRUCTURE

X.509

Certificate Authority CA

CA CA Root Certificate

Root certificate

Distributed with Web Browser ..etc

SSL/TLS web pages

Page 9: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

IPSEC

Why IPSec?

Open Standard Freely Available

Modular

Integrates in Existing IP structure

Transparent to application layer entities

For IPv6

Page 10: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

SECURITY ARCHITECTURE

Page 11: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

MODES

Transport Mode Payload Encrypted IP header is Intact Routing is Intact

Tunnel Mode New IP packet New Routing NW-NW Communication (tunnel)

Page 12: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

IPSEC PACKET

Page 13: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

NETWORK MODEL

Page 14: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

IP TUNNEL

Page 15: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

PERFORMANCE

Page 16: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

FOR AD-HOC NETWORK

Page 17: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

IPSEC FOR AD-HOC

IP Cloud

Subnet 1 Subnet 2

Page 18: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

SECURITY

Page 19: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

PROBLEMS

Latency Increases

Overhead Increases

Throughput Decreases

Complexity Increases

Page 20: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

CONCLUSION

Ad-hoc Network uses various security

methods

Do not violate existing protocol

IPSec is a new approach to secure IPv4 and

IPv6 packets

Better approach can be used than IPSec

Page 21: S ECURITY I SSUES IN M OBILE A D -H OC N ETWORK Mukul A. Khairatkar.

REFERENCES

[1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and

Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE

2004.

[2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic Institute and State University,

IEEE 2006.

[3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMAN

Laboratoirc CNRS-PRiSM. University of Versailles.

[4]Securing Ad-Hoc Networks by IPSEC, Abhrajit Ghosh, Telcordia Technologies Applied Research Piscataway,

NJ, IEEE paper 2004.

[5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999.

[6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC

2510, Mar 1999

[7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003.

[8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32,

No. 3, pp. 586-615, 2003.


Recommended