Sunteți pe pagina 1din 41

Rushing Attacks and Defense

in Wireless Ad Hoc Network Routing Protocols


Yih-Chun Hu, Adrian Perrig, and David B. Johnson

Presenter: Sandeep Mapakshi


CS 6910-ACIS Project 6
Instructor: Prof. Leszek T. Lilien, Fall 2006
Department of Computer Science
Western Michigan University

Outline
On-Demand

Routing Protocols
Rushing Attacks
Rushing Attack Prevention
Evaluation
Conclusion

Introduction
Wireless

Ad hoc network

a collection of mobile computers (or nodes) cooperate


to forward packets
dynamic topology
self-organization

Introduction (cont.)
Routing

Transport Subsystem
Neighbor State Maintenance
Database Maintenance

Ad

protocol

hoc network routing protocols

Run in untrusted environments


Provide resilience against misconfigured nodes
4

Routing Protocols
Proactive

Table-Driven routing protocol

Reactive

routing protocol

routing protocol

Source-Initiated On-Demand routing protocol


Forward ROUTE REQUEST packets when needed

Comparison between Table-Driven


Routing and On-Demand Routing
Table-driven Routing On-demand Routing
Availability of
Routing information
Route updates
Routing overhead

Immediately from
Route Table

Periodic advertisements

Proportional to size of
network regardless of
network traffic

After Route discovery

When requested

Proportional to number of
communication nodes and
increase with increased node
mobility

On-Demand Route Discovery


B

A-B-D-G

A-B-D-G

A-B-D-G
A-B

A
source

A-B-D

Destination

A-C-E
A

A-C

H
A-C-E
A-C-E
F
7

The Rushing Attack

On-demand routing protocols use duplicate suppression at each node: first


ROUTE REQUEST that reaches a node is considered legitimate, next are
discarded (all have the same identifier, higher identifiers denote new
requests)

Attacker scatters RREQ quickly throughout the network suppressing any


later legitimate RREQ

Initiator will be unable to discover any usable routes containing at least


two hops

An effective denial-of-service attack


8

Why is the Attack Possible?

An attacker can send faster, by avoiding the delays that are part of the
design of both routing and MAC (802.11b) protocols.

Why Delay in ROUTE REQUEST forwarding ?


In a MAC protocols using time division
On-demand protocols generally specify a delay
Remove these delays at both the MAC and routing layers?
- more collisions

Attacker can send at a higher wireless transmission level

An attacker can take advantage of a wormhole, to create flood rushing


attacks, use the wormhole to rush the packets ahead of the normal flow
9

Rushing Attack

D
S

Slide courtesy: [2]

10

Rushing Attack Example


A sends a ROUTE REQUEST

11

Rushing Attack Example


A sends a ROUTE REQUEST
B forwards the REQUEST without checking the signature, or
otherwise
rushes the REQUEST

12

Rushing Attack Example


A sends a ROUTE REQUEST
B forwards the REQUEST without checking the signature, or otherwise
rushes the REQUEST
C correctly processes the REQUEST, and forwards it later as a result

13

Rushing Attack Example


A sends a ROUTE REQUEST
B forwards the REQUEST without checking the signature, or otherwise
rushes the REQUEST
C correctly processes the REQUEST, and forwards it later as a result
Since D has already heard a REQUEST from this discovery, D discards the
REQUEST

14

Rushing Attack Example


B rushes the REQUEST
C forwards it later
Since D has already heard a REQUEST from this discovery, D discards
the
REQUEST
A discovers a path through B because B rushed the REQUEST

15

Rushing Attack Example


Route discovery process under no attack
RouteBQuery

Route
A Query
Route Query

E
Route Reply

D
16

Rushing Attack Example


Route discovery process under attack
Attacker

Attacker

RouteBQuery

Route Reply
E

Route
A Query
Route Query

D
17

Wormhole Attack

Attacker records a packet at one location in the network,


tunnels the packet to another location.
Packets may be replayed from the far end of the wormhole.
Puts attacker in a powerful position.
Its a replay so authentication does not help

Applications of the Wormhole Attack

Denial-of-Service
Routing Disruptions
Unauthorized Access
18

Routing Tree

Adapted from Chris Karlof


and David Wagner's
WSNPA slides
19

Routing

Adapted from Chris Karlof


and David Wagner's
WSNPA slides
20

Wormhole Attack

Tunnel packets received in


one place of the network
and replay them in another
place

The attacker can have no


key material. All it requires
is two transceivers and one
high quality out-of-band
channel

Adapted from Chris Karlof


and David Wagner's
WSNPA slides
21

Disrupted Routing

Most packets will be routed


to the wormhole

The wormhole can drop


packets or selectively
forward packets to avoid
detection

Adapted from Chris Karlof


and David Wagner's
WSNPA slides
22

What Protocols Are Vulnerable?

On-demand unsecure (AODV, DSR) and secure (ARAN,


Ariadne, etc) protocols
Result: when under attack, the routing protocol will not be
able to discover paths longer than 2 hops

23

Network Assumption

Network links are bidirectional


Ignore unidirectional links

Ignore jamming attack


Requires additional hardware
Easier to detect

Disregard attacks on MAC protocol


MAC (Medium Access Control)
ALOHA and Slotted ALOHA

Medium-sized
50 500 nodes
Clustering
24

Security Assumptions And Key Setup

Fast authentication protocol


Instantly-verifiable broadcast authentication

Keys setup
Broadcast authentication key are distributed in
advance

Powerful attacker
Coordinated attacker
25

Secure Routing Requirements And Protocol

Secure Neighbor Detection


Secure route delegation
Randomized ROUTE REQUEST forwarding

yes

Single-Hop?

no

Gather n
REQUESTS;
Randomly
Choose 1

Secure Neighbor
Detection

Original Routing
Protocol

26

Secure Neighbor Detection

Neighbor Detection

Two nodes detect a bidirectional link between themselves


In Proactive routing protocol
In Reactive routing protocol

Requirements

Sender-receiver can check that the other is within the normal


communication range
Node needs to hear Neighbor Request

27

Secure Neighbor Detection

Three-round mutual authentication protocol

S broadcasts a Neighbor Request packet


R return a Neighbor Reply packet to S
S sends a Neighbor Verification to B

Short delay timing

Within a maximum communication range

sender
neighbor Request

receiver
broadcast
neighbor reply

neighbor verfication
28

Notation
A or B denote communicat ing nodes
A : R 0,1
denotes that node A randmoly selects an bit long nonce

A B : M, H A
means that node A sends B the message M and
the hash of A' s idnetifier concatenat ed with the nonce
A : M, M
means that node A broadcasts message M with its signature M
29

Secure Neighbor Detection (cont.)


S:

1 R

0,1

M1 Neighbor Solicitation, S,1


M1 Sign H M1

S :

R:

Nonces 1, 2

M1, M1

2 R

0,1

<M32,
,M >
<M
>
23

M 2 Neighbor Reply, S, R,1, 2


M2 Sign H M 2

R S:
S:

freshness

M 2 , M2

R1

<M1,M >
1

R2

M 3 Neighbor Verificat ion, S, R,1, 2


M3 Sign H M 3

S R:

M3 , M3

30

Secure Neighbor Detection (cont.)


Integration

with an On-Demand Protocol

A : REQUEST || Neighbor RequestA

BA:

Neighbor ReplyBA || Neighbor RequestB

AB:

Neighbor VerificationAB || Neighbor ReplyAB

B : REQUEST || Neighbor VerificationAB


|| Neighbor VerificationBA

31

Secure Route Delegation

Delegate neighbor to forward the Route Request packet


To verify that both nodes of each adjacent node pair indeed
believes to be a neighbor

A received ROUTE REQUESTSR || id

MA
MA
AB:

=<Route Delegation,A,B,S,R,id>
=Sign(H(MA))
<MA>

32

Randomized Message Forwarding

To minimize the chance that a rushing adversary can dominate all returned
routes

Randomized message forwarding


Collects a number of REQUESTs
Selects a REQUEST at random to forward

The number of REQUEST packets collected


The more the better?

The algorithm by which timeouts are chosen


Topology closer
Geographically closer
Randomly
33

Secure Route Discovery

To secure any protocol using an on-demand Route Discovery protocol

Secure Neighbor Detection

Secure route delegation

Randomized ROUTE REQUEST forwarding


To limit the number of REQUESTs that traverse an attacker

The nodes that dont have n distinct path to the source of the REQUEST

Choose a random timeout

Two addition security optimizations

Each REQUEST signed

Use location information


34

Evaluation

Simulation Evaluation

Underlying protocol: Adriane


HORS as broadcast signature
100 nodes
1000 m x 1000 m
Random waypoint model
Pause Time: 0, 30, 60, 120, 300, 600, 900
Workload: 5 flows

4 packets per second


64-byte packets
35

Packet Delivery Ratio

% of Offered traffic

DSR
99.8% to 100%
Ariadne
95% to 100%
RAP
7.6% to 47.7%
MAC-layer congestion
Slide courtesy: [2]

36

Median Latency

DSR and Ariadne

zero mean latency

RAP

Congestion
Waiting to forward a
REQUEST

Slide courtesy: [2]

37

Packet Overhead

5 flows has 5x as much


overhead
Reduces usefulness
Overhead should reduce
when congestion not an
issue

Slide courtesy: [2]

38

Overall

Evaluation

RAP adds significant costs


Higher costs due to congestion at lower bit rates.
RAP is designed to be used only when necessary
Only when underlying protocol is unable to discover a
working route

Security Analysis

Attacker needs to propagate ROUTE REQUEST from each


ROUTE DISCOVERY from many locations.
Wouldnt do it if they considered due to intrusion detection
39

Conclusion

Described the Rushing attack

Presented RAP (Rushing Attack Prevention)

RAP incurs higher overhead, but it can find usable


routes when other protocols cannot work

40

References

[1] Yih-Chun Hu,Adrian Perrig, David B.Johnson ,


Rushing attacks and defense in wireless ad hoc network routing protocols,
Proceedings of the 2003 ACM workshop on Wireless security, San Diego, CA,
USA. Available at:
http://www.ece.cmu.edu/~adrian/projects/secure-routing/wise2003.pdf

[2] Rushing Attacks and Defense in Wireless Ad Hoc Network Routing


Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson
Presenter: Tammy Nguyen. Available at:
http://www.eecs.wsu.edu/~smedidi/teaching/Spring05/rushing1.ppt

41

S-ar putea să vă placă și