IWAN2005-Presentation

Seventh Annual International Working Conference on Active and Programmable Networks
November 21-23 2005
CICA, Sophia Antipolis, French Riviera, La Cote d'Azur, FRANCE
Securing AODV Routing Protocol
in Mobile Ad-hoc Networks
Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim
Network-based Automation Research Center and
School of Computer Engineering and Information Technology
University of Ulsan, Ulsan Metropolitan City, 680-749, Republic of Korea
Network-based Automation Research Center
Contents
Motivation and Goals
The proposed security schema
Security analysis
Conclusions and future work
Slide 1
Motivations
The AODV routing protocol is under consideration by
IETF for MANET routing protocol standardization
Security aspects for AODV also have been studied in
other researches
Based on unrealistic assumptions about the availability of key
management infrastructures
=> Alternative solutions more suitable to ad hoc
networks are needed
Slide 2
Goals
Consider two related works: ARAN and SAODV
These schemas do not consider intermediate
nodes during the routing steps
nodes may perform fabrication attacks.
The goal: design a schema which performs
point-to-point message authentication without a
deployed key management infrastructure
Slide 3
The proposed security schema (1/4)
Principle:
messages in AODV must be authenticated to guarantee the
integrity and non-repudiation
Each node maintains table for security info; a record
contains:
neighbor address, neighbor public key, and a shared secret key
The authentication is executed by checking hashed
message which is hashed by the shared key
Slide 4
The proposed security schema (2/4)
Key agreement process
1. Broadcast : <AGREEMENT_REQ, request_id,sender_addr,eS>
2. For each received message
3.
4.
5.
If message_type=AGREEMENT_REQ
send <AGREEMENT_REP, request_id, sender_addr, neighbor_addr,eR>
ElseIf message_type=AGREEMENT_REP
6.
generate a shared key Ks;
7.
send <KEY_OFFER, encrypt (Ks)>
8.
9.
10.
eR
ElseIf message_type= KEY_OFFER
decrypte to get the shared key Ks;
End if;
11. End for;
eS and eR are the public key of the sender node and replying node
Slide 5
The proposed security schema (3/4)
Route request
Ik
Hased value = hashKs(RREQ) the hashed value of RREQ
message by the shared key Ks between the two nodes.
Slide 6
D
The proposed security schema (4/4)
Route reply and route maintenance
Route replies (RREP) in AODV also need to be authenticated; the
request and reply for authentication:
• <AUTHEN_RREP_REQ, dest_addr,dest_seq_#>;
• <AUTHEN_RREP_REP, dest_addr, dest_seq_#, hashKs(RREP)>
Authentication for route error report message (RERR)
• <AUTHEN_RERR_REQ,unreachable_dest_addr,
unreachable_dest_seq_#>;
• <AUTHEN_RERR_REP, unreachable_dest_addr, unreachable_dest_seq_#,
hashKs(RERR)>
Slide 7
Security analysis (1/2)
The proposed schema is a new fully distributed
authentication process
does not require any third parties
provides the integrity and non-repudiation of messages
The schema uses point-to-point authentication process
can authenticate intermediate nodes in routing steps
does not require a certificate server (like ARAN) or assumption of
key distribution (SAODV).
Slide 8
Security analysis (2/2)
By supplying integrity of exchanging messages, our
schema can prevent against attacks
A malicious node can not forms loops by spoofing nodes
can prevent falsified error messages or modification attacks
during route discovery process
However,
The end-to-end authentication process has not been considered
yet
Slide 9
Conclusions
A security schema for AODV has been proposed to prevent common
kinds of attacks and compensate for the security flaws of recent
related works
Exchanging messages in AODV are required to be authenticated in
point-to-point step by using hash chains during a transaction
Shortcomings
Some kinds of attacks (tunneling attacks or selfishness problems) have
not been considered in this work
end-to-end authentication process has not been considered yet
Slide 10
Future work
The end-to-end authentication procedure will be
added to the current approach
Trust self-management in the schema will be
studied
The implementation and simulation of the
schema has been investigating on GloMoSim
simulation tool
Slide 11
Slide 12
Impersonate attacks
 A malicious node impersonates the source node
 A malicious node impersonates the destination
node
Forging a RREP with its address as a destination node
Associating with modifying sequence number with a
big value
 Impersonates the neighbor of destination
 A malicious node forms loops by spoofing nodes
Modification attacks
 Modify hop count field
Reduce the hop count field in RREQ messages
The malicious node is included on a newly created
route
 Modify destination_seq_# field
after re-broadcasting a RREQ, a malicious
node creates a falsified RREQ with increased
destination_seq_#
Falsifying Route Errors
 A malicious node can falsifies a fabrication
route error message
A malicious node M spoofs node B and send to
node A (previous hop of B in a route to a
destination) a error message indicating a
broken link between node B and the destination
Node A delete the table entry for the
destination and forward the route error
message
B
S
A
Falsified RERR
D
M