SlideShare a Scribd company logo
1 of 21
Analysis of a SuperSEAD
Aaron Staple
Mukund Sundararajan
Mobile Ad-hoc Networks
Changing topology
Relatively Low Power :No Asymmetric Crypto
Low Physical Security
Broadcast physical medium
Group of people with laptops in a room
Routing Protocol: DSDV
Distance Vector Routing = Distributed Bellman-
Ford
Sequence Numbers prevent Routing Loops
Routing Table: Contains ID,Metric, SequenceNo,
NextHop
Periodic Updates: Sequence Numbers
Higher Sequence Numbers, Lower Metrics take
precedence
Contextual assumptions
Wireless Links are Bidirectional
Physical Layer attacks are beyond the scope of
the Protocol – Jamming, DOS
Number of Nodes is known and no new nodes
can be added to the network.
Routing information is distributed via broadcasts
Attacker Actions
Failing to Advertise Routes
Ignoring existing routes
Modifying routing updates :Black holes
Replaying information
Wormhole Attack
Assumptions regarding Attacker
Power
Attacker nodes have the same capabilities as other
nodes
Cannot schedule arbitrary inter-leavings
Can talk to nodes in its vicinitae
Cant disrupt other nodes messages
Compromised Nodes
Compromised Key material
Collusion
Dolev-Yao attackers.
What SuperSEAD attempts to
accomplish.
“SEAD performs well over the range of
scenarios we tested,and is robust against
multiple uncoordinated attackers creating
incorrect routing state in any other node,even in
spite of any active attackers or compromised
nodes in the network.”
Secure Efficient Ad Hoc Distance Vector
Routing
SuperSEAD Protocol
Hash Tree Chains to Authenticate the lower bound on
the metric and an upper bound on the sequence
number
Neighbor Authentication:
Origin of the message
N^2 Symmetric keys
Hash Chain Anchors and Symmetric Keys are
distributed using an external mechanism
Packet Leashes :Temporal
Avoid replays.
Hash Chains
3
2
1
0 1 2 3 4
Metric
S
e
q
u
e
n
c
e
N
O
Hash Trees
Hash Tree Chains
Hash Trees Chains Contd..
Analysis Method :Equivalence Based
Impact on network topology achieved in the
presence of a few attacker nodes
Compare states achievable in the presence of
attacker to an attacker-free model
We consider only steady states
Essentially simulating the hash chains and the
neighbor authentication, assuming that they
operate correctly
Security Properties
Correct Routing state at all good nodes about all the
other good nodes
Review of Attacker capabilities:
Cant interfere with any messages
Cant advertise different information to two different
neighbors.
Cant perform arbitrary inter-leavings of messages
Cannot determine all the events that take place in the
network
Murphi Transition Scheduling
We DO NOT consider all possible schedulings of
routing updates
Attackers can’t control the scheduling
Murphi State Space would be extremely large
We randomly generate permutations that
determine order of broadcast updates
All attacker actions are enumerated
Project Flow
Generate sequence of
topologies
All-pairs Shortest
Paths
Generate Murphi
Code
Simulate/Verify
Model
Analyze resulting steady
states Generate
Message Trace
for Offending
states
ruleset change: boolean do
ruleset new_seq_no: 0..MaxSequenceNumber do
ruleset new_distance: 1..(MaxDistance-1) do
rule 300 "A bad node performs a broadcast update about a single other node"
(turn_list[turn] > NumGoodNodes)
==>
begin
for j: 1..TotalNodes do
if ((topology[top_id][turn_list[turn]][j] = true) &
((routing_tables[turn_list[turn]][badAbout].sequence_no > new_seq_no) |
((routing_tables[turn_list[turn]][badAbout].sequence_no = new_seq_no) &
(routing_tables[turn_list[turn]][badAbout].distance + 1 <= new_distance))) &
((routing_tables[j][badAbout].sequence_no < new_seq_no) |
((routing_tables[j][badAbout].sequence_no = new_seq_no) &
(routing_tables[j][badAbout].distance > new_distance)))) then
routing_tables[j][badAbout].sequence_no := new_seq_no;
routing_tables[j][badAbout].distance := new_distance;
printout := 1;
end; end;
if (badAbout = TotalNodes) then
turn := (turn % TotalNodes) + 1;
change_top := change;
end;
badAbout := (badAbout % TotalNodes) + 1;
end; end; end; end;
Attacks that we focused on
Run the protocol without SEAD present and see the attack
Run it with SEAD present and if an attacker node cannot
advertise different information to different neighbors, show that
found no attack.
In the presence of collusion,tunneling there is a wormhole attack.
Node placement attack.
K (>1) consecutive attacker nodes on a path can shorten path
by k-1.
Attacks in the absence of neighbor authentication and
packet leashes
Issues that we faced
Inconsistently specified Murphi Syntax [Some
things that could have been wrong were wrong
at the worst possible time]
Difficult to model a more representative subset of
all possible routing update inter-leavings.
No Protocol Specification, Only Prose
Had to modify poorly documented Murphi Code.
Conclusions
Tool Related
Simulate certain moves but verify other moves
Should scale to verifying larger collections of nodes
Connectivity is orthogonal to the protocol and it is useful to be
able to specify separately
Print out all states that satisfy certain conditions
SEAD Related
New nodes cannot join the network
Simple collusion attacks
Need for reputation mechanisms
Lot of assumptions at the physical layer
Attacker power
References
1. SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks
Yih-Chun Hu,David B.Johnson,Adrian Perrig
2. Y.-C.Hu,A.Perrig,D.B.Johnson,Packet leashes:a
defense against wormhole attacks in wireless ad hoc
networks,in:Proceedings of IEEE Infocomm 2003,April
2003.
3. Efficient Security Mechanisms for Routing Protocols
Yih-Chun Hu ,Adrian Perrig,David B. Johnson
4. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures
Chris Karlof David Wagner
5. The TESLA Broadcast Authentication Protocol
Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

More Related Content

Similar to 01 - Slides.ppt

AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
IJNSA Journal
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
busireddy harish
 

Similar to 01 - Slides.ppt (20)

AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
SIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACHSIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACH
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
B017130508
B017130508B017130508
B017130508
 
Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 

More from RockFellerSinghRusse (12)

2015-lachs-panel_6-1-jasani.ppt
2015-lachs-panel_6-1-jasani.ppt2015-lachs-panel_6-1-jasani.ppt
2015-lachs-panel_6-1-jasani.ppt
 
quiz-150926123857-lva1-app6892 (1).pptx
quiz-150926123857-lva1-app6892 (1).pptxquiz-150926123857-lva1-app6892 (1).pptx
quiz-150926123857-lva1-app6892 (1).pptx
 
EE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptxEE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptx
 
EC8094 – SATELLITE COMMUNICATION.pptx
EC8094 – SATELLITE COMMUNICATION.pptxEC8094 – SATELLITE COMMUNICATION.pptx
EC8094 – SATELLITE COMMUNICATION.pptx
 
logic_families_lecture.ppt
logic_families_lecture.pptlogic_families_lecture.ppt
logic_families_lecture.ppt
 
Lesson_8_2--Asynchronous_Counters1.ppt
Lesson_8_2--Asynchronous_Counters1.pptLesson_8_2--Asynchronous_Counters1.ppt
Lesson_8_2--Asynchronous_Counters1.ppt
 
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptxPARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
 
FF and Latches.ppt
FF and Latches.pptFF and Latches.ppt
FF and Latches.ppt
 
1.ppt
1.ppt1.ppt
1.ppt
 
lecture4signals-181130200508.pptx
lecture4signals-181130200508.pptxlecture4signals-181130200508.pptx
lecture4signals-181130200508.pptx
 
EC8702 – Unit 1.pptx
EC8702 – Unit 1.pptxEC8702 – Unit 1.pptx
EC8702 – Unit 1.pptx
 
IMPLEMENTATION OF WBSS IN LOW SNR.pptx
IMPLEMENTATION OF WBSS IN LOW SNR.pptxIMPLEMENTATION OF WBSS IN LOW SNR.pptx
IMPLEMENTATION OF WBSS IN LOW SNR.pptx
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

01 - Slides.ppt

  • 1. Analysis of a SuperSEAD Aaron Staple Mukund Sundararajan
  • 2. Mobile Ad-hoc Networks Changing topology Relatively Low Power :No Asymmetric Crypto Low Physical Security Broadcast physical medium Group of people with laptops in a room
  • 3. Routing Protocol: DSDV Distance Vector Routing = Distributed Bellman- Ford Sequence Numbers prevent Routing Loops Routing Table: Contains ID,Metric, SequenceNo, NextHop Periodic Updates: Sequence Numbers Higher Sequence Numbers, Lower Metrics take precedence
  • 4. Contextual assumptions Wireless Links are Bidirectional Physical Layer attacks are beyond the scope of the Protocol – Jamming, DOS Number of Nodes is known and no new nodes can be added to the network. Routing information is distributed via broadcasts
  • 5. Attacker Actions Failing to Advertise Routes Ignoring existing routes Modifying routing updates :Black holes Replaying information Wormhole Attack
  • 6. Assumptions regarding Attacker Power Attacker nodes have the same capabilities as other nodes Cannot schedule arbitrary inter-leavings Can talk to nodes in its vicinitae Cant disrupt other nodes messages Compromised Nodes Compromised Key material Collusion Dolev-Yao attackers.
  • 7. What SuperSEAD attempts to accomplish. “SEAD performs well over the range of scenarios we tested,and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node,even in spite of any active attackers or compromised nodes in the network.” Secure Efficient Ad Hoc Distance Vector Routing
  • 8. SuperSEAD Protocol Hash Tree Chains to Authenticate the lower bound on the metric and an upper bound on the sequence number Neighbor Authentication: Origin of the message N^2 Symmetric keys Hash Chain Anchors and Symmetric Keys are distributed using an external mechanism Packet Leashes :Temporal Avoid replays.
  • 9. Hash Chains 3 2 1 0 1 2 3 4 Metric S e q u e n c e N O
  • 12. Hash Trees Chains Contd..
  • 13. Analysis Method :Equivalence Based Impact on network topology achieved in the presence of a few attacker nodes Compare states achievable in the presence of attacker to an attacker-free model We consider only steady states Essentially simulating the hash chains and the neighbor authentication, assuming that they operate correctly
  • 14. Security Properties Correct Routing state at all good nodes about all the other good nodes Review of Attacker capabilities: Cant interfere with any messages Cant advertise different information to two different neighbors. Cant perform arbitrary inter-leavings of messages Cannot determine all the events that take place in the network
  • 15. Murphi Transition Scheduling We DO NOT consider all possible schedulings of routing updates Attackers can’t control the scheduling Murphi State Space would be extremely large We randomly generate permutations that determine order of broadcast updates All attacker actions are enumerated
  • 16. Project Flow Generate sequence of topologies All-pairs Shortest Paths Generate Murphi Code Simulate/Verify Model Analyze resulting steady states Generate Message Trace for Offending states
  • 17. ruleset change: boolean do ruleset new_seq_no: 0..MaxSequenceNumber do ruleset new_distance: 1..(MaxDistance-1) do rule 300 "A bad node performs a broadcast update about a single other node" (turn_list[turn] > NumGoodNodes) ==> begin for j: 1..TotalNodes do if ((topology[top_id][turn_list[turn]][j] = true) & ((routing_tables[turn_list[turn]][badAbout].sequence_no > new_seq_no) | ((routing_tables[turn_list[turn]][badAbout].sequence_no = new_seq_no) & (routing_tables[turn_list[turn]][badAbout].distance + 1 <= new_distance))) & ((routing_tables[j][badAbout].sequence_no < new_seq_no) | ((routing_tables[j][badAbout].sequence_no = new_seq_no) & (routing_tables[j][badAbout].distance > new_distance)))) then routing_tables[j][badAbout].sequence_no := new_seq_no; routing_tables[j][badAbout].distance := new_distance; printout := 1; end; end; if (badAbout = TotalNodes) then turn := (turn % TotalNodes) + 1; change_top := change; end; badAbout := (badAbout % TotalNodes) + 1; end; end; end; end;
  • 18. Attacks that we focused on Run the protocol without SEAD present and see the attack Run it with SEAD present and if an attacker node cannot advertise different information to different neighbors, show that found no attack. In the presence of collusion,tunneling there is a wormhole attack. Node placement attack. K (>1) consecutive attacker nodes on a path can shorten path by k-1. Attacks in the absence of neighbor authentication and packet leashes
  • 19. Issues that we faced Inconsistently specified Murphi Syntax [Some things that could have been wrong were wrong at the worst possible time] Difficult to model a more representative subset of all possible routing update inter-leavings. No Protocol Specification, Only Prose Had to modify poorly documented Murphi Code.
  • 20. Conclusions Tool Related Simulate certain moves but verify other moves Should scale to verifying larger collections of nodes Connectivity is orthogonal to the protocol and it is useful to be able to specify separately Print out all states that satisfy certain conditions SEAD Related New nodes cannot join the network Simple collusion attacks Need for reputation mechanisms Lot of assumptions at the physical layer Attacker power
  • 21. References 1. SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks Yih-Chun Hu,David B.Johnson,Adrian Perrig 2. Y.-C.Hu,A.Perrig,D.B.Johnson,Packet leashes:a defense against wormhole attacks in wireless ad hoc networks,in:Proceedings of IEEE Infocomm 2003,April 2003. 3. Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu ,Adrian Perrig,David B. Johnson 4. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures Chris Karlof David Wagner 5. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song