Ad hoc network security issues for Converging Networks (GIGA

Ad hoc network security issues for Converging Networks (GIGA)
September 30, 2005
Pasi Ahonen
VTT TECHNICAL RESEARCH CENTRE OF FINLAND
Contents
•
•
•
•
hierarchic ad-hoc networks
ad-hoc networks: Security of routing in wireless networks
ad-hoc networks (more)
user view
10/3/05
2
VTT TECHNICAL RESEARCH CENTRE OF FINLAND
hierarchic ad-hoc networks
Internet
WLAN
2.5 GPRS
Mobile
Router (MR)
MR
IPv6
IPv4
MIPv6
MN
IPv6
MN
MIPv6
3G
- E2e Application level security
- Appl. level handover
- Experimenting with Web and VoIP appl.
- Appl. level buffering
- Connection management (e.g. SIP)
- Behavior in Soft/Hard handover
MT
Mobile
Node (MN)
MT
Mobile
Terminal
(MT)
MT
10/3/05
3
VTT TECHNICAL RESEARCH CENTRE OF FINLAND
ad-hoc networks: Security of routing in wireless networks
•Gradual development of trust relationships
•What use cases are valid if certain simpler
implementations
•Simpler node states
•Multiple path routing
•Evaluation of existing implementations
•Real-time application performance
•Comparison of routing methods
•New Scheduling for packet forwarding
Mobile
Router (MR)
MN
Mobile
Node (MN)
MT
Mobile
Terminal
(MT)
MT
MT
10/3/05
4
VTT TECHNICAL RESEARCH CENTRE OF FINLAND
ad-hoc networks (more)
•Monitoring of ad hoc networks to identify attacks
•Router configuration (routing tables, security)
•Experimental, metrics (also simulations)
•Security Analysis
•Further development of Open source
implementations
Mobile
Router (MR)
MN
Mobile
Node (MN)
MT
Mobile
Terminal
(MT)
MT
MT
10/3/05
5
VTT TECHNICAL RESEARCH CENTRE OF FINLAND
user view
• Security info UI for users
• Application usage policy definitions
• Adaptable to user’s knowledge level
• Context aware security (How much to automate and when?)
• On/Off: VPN Internet access, Plain Internet access
• WAN, LAN, PAN usage according to availability and policy
10/3/05
6
Thank You!