Securing Ad Hoc Networks Lidong Zhou and Zygmunt J. Haas Cornell University Abstract Ad hoc networks are a new wireless networking paradigm far mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure, Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main a plications of a d hoc networks, although there is a trend to adopt ad hoc networe for commerciol uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats an ad hoc network faces and the security goals to be achieved. W e identiFy the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundoncy in ad hoc networks - multiple routes between nodes - to defend routing a ainst denial-of-service attacks. W e olso use replication and new cryptogra hic sc\emes, such a s threshold crypto raphy, to build a hi hly secure and high1 available key management service, wfich forms the core o our security framework. 9 d hoc netwnrks arc a iicw paradigm of wireless commuiiication for mohile hosts (which wc call nodes). In a n ad hoc nctwork, thcre is no fixed inlrastructurc such as basc stations o r mobilc switching centers. Mobile iiodcs withiti cach othcr's radio r;ingc cnmmunicatc directly via wirclcss links, while thosc that arc far apart rcly on othcr nodcs to relay messages as rn~itcrs.Node mohility in an ad lioc network causes frcquenl changcs of nctwork topology. Figurc I shows an examplc: initially, nodcs A and D llavc ii direct link bctwccii thcm. Whcn D movcs out o l A's radio range, thc link is broken. However, thc nctwork is still cnnncctcd, hccausc A caii rcach D through C, E, and F. Mililary tactical opcrations iirc still tlic main application of ad hac networks today. b'nr cxmnplc, military units (c.g., soldicrs, tanks, or planes), cquippcd with wirclcss communicetioii dcvices, could form an ad hoc nctwork when thcy roam in a battlcficld. Ad hoc networks can ;ilso lie uscd for emcr- 24 0890-8U441991$l0.00 0 1999 IEEE gency, law enforcement, and rescuc missions. Sincc an ad hoc network caii be deployed rapidly with relatively low cost, it bccomes iui attractivc option fnr commcrcial uscs such as scnSOS nctworks or virtual classrooms. Security Gods Security is an important issuc for ad hoc nctworks, espccially for sccurity-scnsitive applications. To sccure :in ad hoc network, we consider tlic fallowing attributes: availabilify, conpidentiaiulity, integrity, nutlienticalion, and nonrepudiation. Availabilily ensurcs the survivability or nctwork services despite dcnial-of-servicc attacks. A denial-of-scrvice attack could bc launched ai any laycr of ;in ad boc nctwork. On the physical and mcdia access control Iaycrs, an adversary could cmploy jamming to interferc with communication on physical channels. On the nctwork Iaycr, a n adversary could disrupt the routing protocol and disconncct the nctwork. On the highcr layers, an adversary could bring down high-lcvcl serviccs. Onc such targct is the kcy maiiagcnient scrvice, an cssential scrvicc for any sccnrity framcwork. Confidentiality cnsnres that certain information is nevcr disclosed to unaulhorizcd entitics. Network transmission of scnsitivc information, such as strategic 111 tactical military information, rcqnires confidentiality. Leakage of such information to cncmics could have dcvastating consequcnces. Routing information must iilso remain confidcntial in certain cases bccause thc information might bc valuablc for eiiemics t n idcntify and locate their targets in a battleficld. Iritegri@ giiarantecs that a mcssage being transferrcd is never corrnpted. A mcssage could be corrupted bccause of hcnign [ERE Nclwotk - NovcmhedDeccmbcr 1999 1 failures, such as radio propagation impairment, or hccausc of malicious attacks on the network. Autlieriticution enables a node to ensure the identity of thc peer node with which it is communicating. Without authentication, an advcrsary could masquerade as a nodc, thus gaining unauthorized acccss to resource and sensitive information and intcrfering with the operation of olhcr nodcs. Finally, nonrepudiution ensures that tlic origin of a mcssagc cannot deny having sent the message. Nonrcpudixtion is uscful for detcction and isolation of compromised nodes. When node A rcceivcs an crroncous message [rum node B, nonrcpudiation allows A to accuse B using this message and lo convince othcr nodcs that B is compromised, Thcre arc othcr security goals (e.g., authorization) that arc of concern to certain applications, but wc will not pursue tlncse issues in this article. Challenaes " The salient features of ad hoc nctworks pose both challcnges and opportunitics in achieving these security goals. First, usc of wireless links rcndcrs an ad hoc network susceptihle to link attacks ranging from passive eavesdropping to active impersonation, message rcplay, and mcssagc distortion. Eevesdropping might givc an adversary access to secrct information, violating coniidcntiality. Active attacks might allow thc adversary to delctc messages, to inject erroneous messages, to modify mcssagcs, and to impersonate a nodc, thus violating availability, integrity, authentication, and nonrepudiation. Sccond, nodes roaming in a hostile cnvironment (e.g., a battlcfield), with relatively poor physical protcction, have nonncgligihlc probability of bcing compromiscd. Thcrelorc, wc should not only consider malicious attacks from outside a nctwork, but also take into ~ c c o u nthe t attacks launchcd from within the network by compromised nodes. Thercforc, to achicve high survivability, ad hoc networks should have a distributed architecture with no cciitral entities. lntroducing any central entity into our security solution could lead to signilicant vulncrahility; that is, if this centralized entity is compromised, the entire network is subvertcd. Third, an ad hoc network is dynamic hecause of frequent changes in both its topology and its membership (i.e., nodes frequently join and leave the network). Trust relationships among nodes also change, Sor cxample, when certain nodcs arc detected as heiiig compromised. Unlike other wirelcss mobile networks, soch as mohile IP 1, nodes in an ad hoc network may dyn;imic;illy hccomc a ited with administrative domains. Any security solution with a static configuration would not suffice. It is desirable for our security mcchanisms to adapt on the fly to these clnangcs. I'ioally, an ad hoc network may consist of hundrcds o r even thousands of nodcs. Sccririty mcchanisms should hc scalablc to handle such a large network. Scope and Roadrnap Traditional sccurity mechanisms, such as auihciiticatioii protocols, digital signature, and encryption, still play important roles in achicving confidentiality, integrity, authentication, and nonrcpudiation of communication in ad hoc nctwnrks. However, these mechanisms are not sufficient by thcmsclvcs. We lurther rely on the following two principles. First, we take advantage of redundancies i n thc network topology (i.e., multiple routes between nodes) to achieve availahility. Thc second principle is distrihufion ofrrrist. Although no single node is trustworthy in an ad hoc network hecause of low physical security and availahility, wc can distribute trust to a n - IEEE Nclwork NovcmbcdDcccmbcr 1999 (b) - _ ~ _ - _ _____ Figure 1 lbpologv rhnuges in ad hoc networks Nodes A, R, C, D,15, ond l~conrtrtrilean ad hoc network The circle represents the radu range of node A. The network rntrully has the topoloby in a) When node 1)movea out of the rodio range ofA. the network topolopy changes to that m b) aggregation of nodes. Assuming that any f t 1 nodes arc unlikcly to all he compromised, consensus o l at least t t 1 iiodcs is trustworthy. In this article, we will not addrcss denial-of-scrvicc attacks toward the physical and data link layers. Ccrtain physical layer comntcrmeasiires such as spread spectrum have hecn extensivcly sludicd [4-81. However, we do focus on how to deSend against dcnial-of-servicc attacks toward routing protocols in the following section. All key-based cryptographic schemes (e.g., digital signature) dcmand a key management service, which is rcsponsihlc for keeping track oS bindings heiwccn keys and nodes, and assisting the estahlislnment of mutual trust and sccurc communication bctwccn nodcs. We will focus our discussion later on how to cstahlish such a key managcrnent scrvicc that is appropriate for ad hoc networks. We then prescnl rclated work and conchide in the last section. Secure Rouiing To achieve availability, routing protocols should he robust against both dynamically changing topology and malicious attacks. Routing protocols proposcd For ad hoc networks cope well with thc dynamically changing topology [9-161. However, nonc of thcni, to our knowledge, have accommodated mechanisms to defend against malicious attacks. Routing protocols for ad hoc nctworks are still under active research. Thcre is no single standard routing protocol. Thcreforc, we aim to capture the common sccurity threats and providc guidclincs to secure routing protocols. In most routing protocols, routers exchange information on the topology of the network in ordcr to establish routes between nodes. Such information could become a target lor malicious advers;iries who intcnd to bring the network down. There are two sources of threats to routing protocols. The first comes from cxternal attackers. By injccting crroncous routing information, replaying old routing information, or distorting routing infnrmation, an attacker conld successfully partition a network or introduce exccssivc trallic load into the network hy cmsing retransmission and inellicicnt routing. Tlnc second and more severe kind of threat comes from compromised nodes, which might advcrtisc incorrcct rooting information to (ither nodes. Detection of such incorrect information is difficult: merely requiring routing information to he signed by each node would not work, bccausc compromised nodes are able to gccneratcvalid signatures using thcir private keys. To defend against the first kind of threat, nodes can protect routing information in the same way as thcy protect data traffic, that is, through thc use of cryptographic schemes such a s digital signature. However, this dcfcnsc is incffective against 25 W Figure 2. The configuration of a key management service. The key management service cori,si,stsofn servers. 7 % service, ~ a.?11 whole, has a publiclprivuiepair Klk Tiiepublic key K i,s known to all nodes in the network, wliereos theprivate key k is divided inro n shares SI, SA ,, .,sn, one share Joreach server. Each sewer i also has rrpubliclprivate keypuir Kit$ and knows thepublic 1cey.s of all nodes attacks from coniproiniscd servcrs. Worsc yel, a s wc liavc argocd, we cannol neglect the possibility of nodes bcing comproiniscd in an ad hoc nctwork. Dctection of compromiscd nodcs tlirough routing information is also difficult in an ad hoc network hecausc of its dynamically changing topology: w h e n a piccc of routing information is found invalid, the information could he generated by a compromised node, or it could have becomc iiivalid as a result of topology changes. It is difficult to distinguish bctweeii thc two CHSCS. On tlic. ollier hand, we can exploit certain propertics of ad lioc networks lo achieve sccure routing. Note that routing protocols for ad hoc nctworks niusl handle outdated routing information to accornmodatc the dynamically changing topology. False rooting information generatcd by comproiniscd nodcs could, to somc cxtent, bc considcred outdated information. As long as therc are sufficiently many corrcct nodes, the routing protocol should be able to find routcs that go around tliese compromised nodes. S u c h clipability of thc routing protocols iisually relies on the inhcreiit rcdundancies - multiplc, possibly disjoint, routes hctwecn nodcs - i n ad hoc networks. If rouiing protocols can discovcr multiple routes (e.g., protocols i n ZRP [14], DSR [lOJ, TORA 11’21, and AODV [ l h ] all can achicvc this), nodes can switch to an altornalive route wlicn the primary route appears to havc failed. Divemiq coding 1171 takes advantage of multiplc paths in an efficicnt way witlioul mcssage retransmission. The basic idea is to transmit redundant information through additional routcs lor error detcction and correction. For cxamplc, if there are 11 disjoint routcs betwccn two nodcs, we c m use n r channels to transmit data and use tlic otlicr r channcls to lransmil redundant information. Evcn if ccrtain routcs are compromised, thc reccivcr may still be able to validate mcssiigcs a n d recovcr them from errors using the redundant informati~mfrom the additional r channels. Key Management Service Wc employ cryptographic sclicmes, such as digital signatures, to protect both rooting information and data traffic. Usc of such sclicmes usually requircs a key managcmcnl scmicc. We adopt a public key infrastructurc hccause of its supcriority in distributing kcys, and achicving integrity and noiircpudiation. Efficicnl secrct key schemes are uscd to securc further communication after nodcs autlicnticate cach othcr and establish a sharcd secrct scssion kcy. In a public key infrastructure, each node has a publiclprivate kcy pair. Public kcys can bc distributed to other nodcs, while privale kcys should be kcpt confidcntial to individual nodes. Therc is ii trustcd entity called a certification uuthority 26 (CA) [IS-201 [or key inanaeement. The CA has a publiclprivatc kcy pair, wilh its public key known to evcry node, and signs certificates binding public keys to nodes. Thc trustcd CA hiis to stay onlinc to rcflect thc currcnl hindings, becausc the bindings ciiuld changc ovcr limc: a public key should bc rcvokcd if the owner niide is no loiigcr trustcd or is out ol thc network; a nodc may rcfresh its key pair periodically to reducc the chance of a succcssful brute force attack on its privatc kcy. It is problematic to establish a key management service using a single CA i n ad hoc networks. Thc CA, rcsponsiblc lor the security of thc entirc nctwork, is a vulnerablc poini of thc nctwork: if the CA is unavailablc, nodcs cannot get thc current public kcys of other no& or cstablish secure communication with otlicrs. If thc CA is comprnmiscd and leaks its privatc kcy lo an advcrsary, thc ;~dversarycan then sign any crrniieous certificate using this private kcy to impcrsonate any nodc o r to rcvoke any certificate. A standard approach to improvc availability of a scrvice is rcplication, but a naivc replication of thc CA makes the scrvice more vulncrable: compromisc of m y singlc rcplica, which posscsscs the scrvice private key, aiuld lcad to collapse of tlie entirc systcm. To solve this problem wc distribute trust to a sct of nodes by letting these nodes sliarc the kcy managcment responsibility. The Sysiem Model Our key matiagemcnt scrvicc is applicable to an asynchronous ad hoc network; that is, a network with no hound on mcssage delivery and proccssing times. Wc also assume that the undcrlying nctwork laycr providcs reliable links.’ Tlic scrvice, as a whole, lias a publiclprivatc key pair. All nodes in thc systrm know thc public key of the servicc and trust any certificates signed using the corresponding privatc key. Nodes, as clients, can submit query requcsts to gct othcr clients’ puhlic kcys or submit ulidate rcqncsls to changc tlicir own public kcys. Internally, our kcp management service, with an ( n , t t 1) configuration ( n 2 31 + I), consists of n special nodes, which we call server,s, prcscni within an ad hoc network. Each servcr also has its own key pair and stores thc public keys of all the nodes in tlic nchvork. In particular, each scrvcr knows thc public keys of othcr scrvers. Thus, SCNCKS can cstablish securc links among them. Wc assumc that thc adversary can compromise up t o t scivcrs in any period of timc cif a certain duration.2 If a server is compromised, tlic adversary hiis access to all the secrct information storcd on thc servcr. A comprnmiscd servcr might he unavailablc o r exliibii Byzanline bchavior (i.e., it can dcviate arbitrarily from its protocols). Wc also iissumc that l l i e adversary lacks thc computational power to break thc cryptographic schemcs wc employ. Thc scrvice is correct if thc following two coliditions hold: (Robustness) Thc scrvice is always able to process query and updatc requests from clients. Every query always rcturns thc lasi updated public kcy associated witli the requested clicnl, assuming no coiicurrciit updates ou this entry. * (Cunficlentiality) The privalc kcy of thc servicc is never disclosed to an advcrsary. Thus, an adversary is nevcr able to issoc certificates, signcd hy tlic servicc privatc kcy, Sor crroiicoiis bindings. I Our-key management ,se,vi<m acriially woik,y ~ m d w n niuck weaker.link asmmplion, which i.r more uppropriatcfm ad hoc network.?. We leave such detail,^ to U seprufr.urlicle currently inprqmation. The drrrulion depends on how ojim and how jk.sl share rej>c.shi,z# (dis cussed i x the nwit section) i.s done IEEE Nclwurk NavcmberlDcccmhcr 1999 _ _ _ ____ ~ Threshold signature Klk robust combining schcmcs are propnscd [21, 241. Thesc schemes cxploit the inherent rcdundancics in tlic partial signatures (note that any t 1 correct partial signaturcs contain all the information of the final sigtxiture) and use crror correction codes to mask incorrcct partial signatures. In 1231, a robust threshold Digilal Sigiidturc Standard (DSS) scheme is proposed. The process of computing a signature from partial signatures is essentially an interpolation. The authors usc the Berlekamp and Wclcli decoder s o that the interpolation still yields a correct signature despite a m a l l portion (fewer than onc fnurth) of partial signatures being missing or incorrect. + Server 1 m Server 2 I \I 3.lhreshold signature. Given a sewice consirling of three servers, let Klk he the puhliclprivute /<cypair of the service. Using a (3, 2) threshold cryptography scheme, each seiver i gets a shore q ofthe private key k. For a nmvage m, sewer i can generate a partial signature PS(m, sJ using its share si. Correct sewers I and 3 hoth generate partial .sigiiature,sand forwnrd the signnturer to a combirier c Even though sewer 2 failr to su6mit a partial signature, cis able to generate the signature (m)k of in signed by serverprivate key k W Figure Threshold Cryptography Distribution of trnst in our key managemcnt service is accomplished using threshold cryptography [21, 221. An ( n , t t I) threshold cryptography scheme allows n parties to share tlic ability lo perform a cryptographic operation (e.g., creating a digital signature) so that any t 1 parties can perform this operation jointly, whereas it is infeasible for at most t parties to do so, cvcn by collusion In o u r casc, thc tt servcrs of the kcy management scrvice share thc ability to sign certificates. For the service to tolcrate t compromiscd servers, wc employ an ( n , f + I ) thrcshold cryptography schemc and divide the private key k of the scrvice into n sharcs (SI,SZ, ,.., s,,), assigning onc share to each sewcr. We call (si,s2, ..., s,? an (11, t 1) sharing of k. Figure 2 illustrates how the service IS configurcd. For the service to sign a certificate, each scrver gcnerates a partial signature for the certificate using its private key sharc and submits the partial signature to ii With t + 1 correct partial signatures, the combiner is ablc to compute the signaturc for thc ccrtificatc. Ilowevcr, compromised servers (there arc at most t of them) cannot gcnerate correctly signed certificates by theniselvcs, because they can geuerale at most t partial signatures. Figurc 3 slinws how scrvcrs gcncrnte a signature using a thrcshold signature scheme. When applying thrcshold cryptography, we must defend against cvmpromiscd servers. Far example, a compromiscd servcr could gcncrate an incorrect partial signaturc. Use o l this partial signature would yield an invalid signalurc. Forlunately, a combiner can verify thc vtilidily of a computcd signature using the scrvicc public key. In casc verification lails, the combiner trics another set o l t t 1 partial signaturcs. This process continues until the comhincr constructs thc correct signature from t t I corrcct partial signatures. More efficient + + "Auyseerver cnii hc a combim,: No exIra infu,malion about k is disclaveil to a combiner. To make sure tlrot U compromi.sed conibher cannot p e veiit a signarsrrfmm being computed, we cuii use t I setoera ns combin- + er.~to e i i ~ ~ ithat l r at least one conihimr is cvmct and + SI, + + 4 Note that the tern Qierntur NuvemhcrlDcccrnher 1999 mobilc hcrr is diffwentfom drat in mobile noworlks. + here could be an addition opmtiun on n Jinitejeld such as Z,, where (a signatwe.. IEEE Network able IO compute lhe Proactive Security and Adaptability Besidcs threshold signaturc, our key managcmcnt service also cmploys share refreshing to tolerate rnobile adver.vnries4 and to adapt its configuration to changes i n the network. Mobile adversaries arc first proposed by Ostrovsky and Yung to characterize adversaries that temporarily compriimise x server and then movc on to the next victim (e.g., in form of viruscs injected inio 21 nctwork). Under lhis adversary model, an xlversaiy might bc ahlc to compsomisc all the scrvcrs over B long period of time. Even if the compromised scrvcrs arc detectcd and excludcd frvm thc scrvice, the advcrsary could still gather morc than t sharcs uf the privatc key from conipromised servers over time. This would allow the adversary to gencrate any valid cerlificatcs signed by thc private kcy. Proactivc scliemcs [26-30] arc proposed as a countermcasure to mobilc adversaries. A proactive threshold cryptography scheme USCS share refrcshing, which cnables servers to compute new sharcs from old ones in co1l;iboralion without disclosing the scrvicc private key to any server. The ncw s h a m constitute a new ( n , t + I) sharing of the scrvice privatc key. After refreshing, servers rcmovc the old shares and use the new nncs to gcncrate partial signatures. Because the new shares arc independent of thc old ones, thc adversary cannot combine old sharcs with new ones Lo recover thc private key of the service. Thus, the adversary is challengcd lo compromise t t 1 seivcrs between pcriodic refreshing. Share refreshing relics on the following Iioniumorphic propert If sl,si, .,.,.s!~) is an (n, t + I) sharin of k and (sl, ... .s$ is :n (n, t 1) sharing of kz, then (sI? t sf) .si t sz, ... t sf)' is an ( I ! , t t 1 ) sharing of k , + k 2 . 111~2is 0, wc get a new (n. t t 1) sharing (if kc. Given n scrvcrs, let (s,, 9 2 , ..., s.) be an (n,t t I) shariug of the privatc key k cif the service, with scrvcr i having si. Assuming ;ill servers arc correct, share refreshing procecds as follows. First, cach server randomly gcncratcs ( s i l , sizr ...,si,,), an (n, t t 1) sharing of 0. We call these newly gcncratcd sys sirbskares. Then every suhsharc sij,is distribntcd to scrvcr j through a securc link. When scivcrj gels thc suhsharcs slj, .sq. ..., s,,~,il can compute a ncw share from these subshares and its old share (s'j = sj Z'/=,sij). Figurc 4 illustratcs a share rcfrcshing proccss. Share refreshing must toleratc missing suhsharcs and crroneous subshares from compromiscd servers. A compromised server may not scnd a n y suhsharcs. Howcvcr, as long as corrcct servers agrcc on tlic sct of subshares to use, they can gencrate ncw shares using only subsharcs generated from t 1 servers. For seivcrs to detect incorrecl suhsharcs, wc use vcrifiable secrct sharing schcmcs (e.g., those i n [31, 321). A vcrifiable secret sharing scheme gcncrxtes extra public informalion + I>) mmrs (a + I>) niod p. 27 U Figure 4.Share repeshing. Given an (n, t t 1) sharing (sl. ..., sJ of a private key k, with ,share q assigned to server i, to gener- ate a new (n. t + 1)sharing (si, ..., si,) of k each server igenerates subshares sil,siz, ..., sin which constitute the ifh colninn in the figure. Each subshare si, is then .sent securely to serverj. which constiWhe,~seiver j gets all the subshnres sl,,sq, ,.., tute the jth row, it can generate its news lare s!J!of?om these subshare.? and its old share si for cach (su1i)share using ii onc-way function. ‘llle public information can testify to thc correctness of the corrcsponding (sub)shares without disclosing tlic (sub)shares. Avarktion of share refreshing also allows the key management service to change its configuration from (n, t t 1) lo (n’, t’ + 1).This way, the key managerncnt scrvice can adapt itsclf, on the fly, to changes in the network if a compromised servcr is detected, thc scrvice should exclude thc compromised server aud refresh the exposcd sharc; if a server is no longcr available or a new server is added, thc scrvicc should change its configuration accordingly. For examplc, a key management servicc may start with the (7,3) configuration. If, after some time, onc scrver is detected to bc compromised and anothcr is no longer available, the servicc could change its setting to thc (52) configuration. If two new servers are addcd later, the service could changc its configuration back to (7,3) with thc ncw sct of servers. This problem has bcen studied in [33].Thc esscncc of the proposcd solution is again sharc rcfreshing. The only diffcrence is that now thc original set ol servcrs gcncrate and distribute subshares bascd on the new configuration of the service: for a set o f t + 1 of t h e n old servcrs, cach server i in this sct computes an (n’, t’ + 1) sharing (si,, si*, ..., sin,)of its sharc s i and distributes subsharc so secretly to the j t h server of thc n‘ new servers. Each ncw scrver can then compute the new sharc from these subshares. Thcsc ncw shares will constitutc an (n’,t‘ ‘I)sharing of the same service private key. Note that sharc rcfrcshing does not cbmge the service key pair. Nodes in the network can still use the same scrvicc public kcy to verify signed certificatcs. This property makcs share refreshiug transparent to all nodcs, and hence scalable. + Asynchron y Existing threshold cryptography and proactivc thrcshold cvptography schemes assume a synchronous system (i.e., there is a bound on mcssage delivery and messagc processing timcs). This assumption is not necessarily valid in an ad hoc nctwork, considering thc low reliability of wircless links and poor con- 28 nectivity among nodcs. I n [act, any synchrony assumption is a vulnerability in the system: thc adversary can launch denial-ofservicc attacks to slow down a node or to disconnect a uodc for a long enough period of timc to iiivalidatc thc synchrony assumption. Conscqucntly, protocols based on the synchrony assumption are inadcquate. To reducc such vulnerability, our key managcmcnt service works in an asynchronous setting. Dcsigning such protocols is hard; some problems may even bc impossible to solve [34]. The main difficulty lies in the fact that, in an asynchronous system, wc cannot distinguish a compromised scrvcr from a correct but slow one. One basic idea underlying our design is thc notion of weak consistcucy: we do no1 requirc that the corrcct S C N ~ ~beS consistcnt after each opcratiou; inslead, wc require that enough correct servcrs bc up to date. For cxample, in share rcfrcshiug, without any synchrony assumption, a server is no longer able to distribute the siibsharcs to all correct scrvcrs using a reliablc broadcast channcl. I-Iowcver, we only rcquire snbshares to bc distributed to a quorum of servers. This suffices, as long as correct scrycrs in such a quorum can jointly provide or compute all thc subshares that arc distributed. This way, corrcct servers not having certain subsharc(s) could recover thc subshare(s) from othcr correct servers. Anotlicr important mcchanism is the use of multiplo signatures for corrcct servers to dctcct and reject erroncous messages scnt by comprorniscd scrvcrs. That is, wc rcquire that certain messagcs be accoinpanicd with enough signatnrcs from servers. If a message contains digital signaturcs from a certain iiumbcr (say, t t 1) of servcrs testifying to its validity, at least one correct server must havc provided one signature, thus establishing the validity of the mcssage. Wc have implemcntcd a prototype of such a key managemcnt scrvice. The preliminary results havc shown its feasibility. Due to thc lcngth restriction of this article, we arc unable to provide a dctailcd description of this service. Full papers dcscrihing the key management servicc and its underlying proactivc sccret sharing protocol in an asynchronous system are in prcparation. Relafed Work Secure Routing Secure routing in networks such as the Intcrnct has been extensively studicd [9, 35-39], Many proposed approaclics are also applicablc to secure routing in ad hoc nctworks. To deal with external attacks, standard scbcmes such as digital signatures to protect inlormation authenticity and integrity have bccn considered. For cxaniple, Sirios and Kcut [37] propose the use of a keyed one-way hash function with a windowed sequence numbcr for data integrity in point-to-point communication and the usc of digital signaturcs to protect messages scnt to multiple destinations. Perlman studies how to protcct routing information from compromised routcrs in the context of Byzantine robustness [35].The study analyzcs the theoretical fcasibility of maintaining network counectivity under such assumptions. Kumar recognizes thc problem of compromised routers as a hard problem, but providcs no solution [36]. Other works [9,37,38] give only partial soliitions. The basic idea undcrlying these solutions is to detect inconsistcncy using redundant information and to isolate compromised routers. For cxample, in [38], where methods to secure distance-vector routing protocols are proposed, extra information of a predecessor in a path to a destination is added into each entry in the routing tablc. Using this piece of information, a path-traversal techniquc (by following the predecessor link) can be used to verify the correctness of a path. - IBEE Network NovcmbcriDcccmbcr 1999 Such mechanisms usually come at a high cost and arc avoidcd (e.g., in [9]) because routers on networks such as the Internet are usually well protected and rarcly compromised. ReplicatedSecure Services The concept of distributing trust to a group of servers is investigated by Reitcr [40]. This is thc foundation of the Rampart toolkit [41]. Reiter and others have successfully used the toolkit in building a replicatcd key management service, Cl, which also employs threshold cryptography [42]. Onc drawback of Rampart is that it may removc corrcct but slow servcrs from the group. Such rcmoval rcnders the systcm at least temporarily more vulnerablc. Membership changcs are also expensive. For these reasous, Rampart is more suitable for tightly coupled networks than for ad hoc networks. Gong applies trust distribution to a key distribution center (KDC), thc central cntity rcspoiisiblc for key managcmeut in a secret key infrastructure [43]. In his solution, a group of servers jointly act as a KDC, with cach scrver sharing a unique secret key with each client. Malkhi and Reiter present Phalanx, a data rcpository servicc that tolerates Byzantine failures in an asynchronous system, in [44]. The essence of Phalanx is a Byzantinc quorum systcm [45]. In a Byzantinc quorum system, servers are grouped into quora satisfying a certain intersectinn prnpcrty. Thc servicc supports read and write opcrations, and guarantees that a read operation always rcturns thc result of the last completed write operation. Instcad of rcquiring cach corrcct servcr to perform each operation, the service performs each operation on only a quorum of scrvers. However, this weak consistclicy among the servers suffices to achievc giiarantccd service because of the intersection propcrty of Byzantine quorum systems. Castro and Liskov [46] extend the replicated state-machine approach [47] to achieve Byzantine fault tolerance. They use a thrce-phasc protocol to mask away disruptive bchavior of compromised servers. A small portion of servcrs may bc left behind, hut can recnvcr by communicating with other scrvers. Nonc of the systems provide mechanisms to defeat mobile adversaries and achicve scalable adaptability. The latter two solutions do not consider how a sccret (a privatc key) is shared among thc replicas. Howevcr, they are uscful in building highly secure services in ad hoc nelworks. For cxamplc, we could use Byzantine quorum systems to secure a location databasc [48] for an ad hoc network Security In Ad Hoc Networks An authentication architecture for mobile ad hoc nctworks is proposed in [49]. The proposed schcme details the formats of messages, together with protocols that achieve authcntication. The architecture can accommodate different authentication schemes. Our key managemcnt service is a prerequisite for such a security architccture. Conclusion In this article, we analyze the security thrcats an ad hoc nctwork faces and present the security objectives that need to he achieved. On onc hand, the security-sensitive applications of ad hoc nctworks requirc a high degree of sccurity; on the other hand, ad hoc networks are inhcreiitly vulnerable to security attacks. Therefore, sccurity mcchanisms are indispensable for ad hoc networks. Thc idiosyncrasy of ad hoc networks poses both challenges and opportunities for these mechanisms. This article focuses on how to sccure routing and how to establish a secure key management semicc in an ad hoc networking environment. These two issucs are cssenlial to achicving our security goals. Bcsides the standard security mechanisms, we IOEE Nehvork Novcmher/DiDcccrnher 1999 take advantage of the redundancies in ad hoc network topology and usc diversity coding on multiplc routes to tolcrate both benign aiid Byzantine failurcs. To build a highly availablc and highly securc key managcmenl servicc, we proposc to use threshold cryptogruphy to distrihutc trust among a set of servers. Furthermore, our kcy management service employs share rcfreshiug to achieve proactive sccurity and adapt tn changcs in the nctwork in a scalable way. Finally, by relaxing the consistency requirement on the servers, om- scrvice does not rcly on synchrony assumptions. Such assumptions could lcad to vulnerability. A prototypc of the key management service has been implemcnted, which shows its feasibility. The article reprcscnts the first step of our research to analyze thc security threats, undcrstand thc security requiremcnts for ad hoc networks, and idcntify existing techniques, as well as propose new mechanisms to secure ad hoc networks. More work needs to bc done to deploy thcsc security mechanisms in an ad hoc network and to investigate the impact of tlicse security mcchanisms on network performance. Acknowledgments We would like to thank Robhert van Renessc, Fred B. Schneider, and Yaron Minsky for tlieir invaluable contribiitions to this work. We are also grateful to Ulfar Erlingsson and the anonymous reviewers for their comments aiid suggestions that hclped to improve the quality of the article. References [ I ] J. loonnidir, D. Duchamp, and G. Q. Moguire Jr., "IP~BaredProlacolr b r Mobile Internetworking," ACM SIGCOMM Comp. Commun. Rev. {SIGCOMM '911, vol. 21, no. 4, Sept. 1991, pp. 23-45, [21 F. Terooko, Y. Yakore, and M. Tokoro, "A Network Architecture Providing Host Migmlion Tmnrparen~,''S I K W '91, vol. 21, m. 4, Sept. 1991, pp. 209-20. 131 C. E. Perkinr, "IP MO ility Support," RFC 2002. Oct. 1996. 141 M. K. Simon et al., Spread Spectrum Communications, vol. 1-11, Cornpuler Science Piers, Rockville, MD, 1985. [51A . Ephremider, J. E. Wierelthier, and D. J. Baker, "A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling," Prac. IEEE, vol. 75, no, 1, Jan. 1987, pp. 56-73. (61 N. Shochom ond J. Wertcott, "Future Directions in Packet Radio Architecture ond Protoocolr," Proc. IEEE, vol. 75, no. 1, Jon. 1987, pp. 83-99. [7] A. A. Hasron, W. E. Stark, and J. E. Herrhey, "FrequencyHopped Spread Spectrum in the Prerence of o Flower Portial~BondJammer," IEEE Trans. Commun., vol. 41. no. 7, July 1993, pp. 1125-31 I81 M. B. Purrley and H. B. R u n d "Routing in Frequency-Hop Pocket Radio Networks with Partial-Band Jomming," IEEE Trans. Commun., vol. 41, no. 7, July 1993, pp. I I 1 7-24. 191 S. Murphy ond J. J. Garcia~Luna-Acever,"An EAicient Routing Algorithm for Mobile Wirelerr Networks," MONET, Oct. 1996, vol. 1, no. 2, p 183-97 (101 D. 8. Johnson and D. A. Maltr, "Dynamic Source Rouling in AdiHoc Wireless Networks," Mobile Comp., 1996. [ I I ] J. Sharony, "A Mobile Radio Network Architecture with Dynamicolly Changing Topology using Virtuol Subnetr," Prac. ICC/SUPERCOMM '96, Dollar, TX, June 1996, pp. 807-12. (121 V. D. Park and M . S. Corron, "A Highly Adoptoble Distributed Routing Algorithm for Mobile Wirelerr Nelworkr," IEEE INFOCOM '97, Kobe, Japan, 1997. [13] C:K. Toh, "Associativity-Bared Routing for Ad Hoc Mobile Nefworkz," Wireless Pers. Commuo. J., Speciol 1sue on Mobile Networking and Computing Systems, "01. 4, no. 2, Mor. 1997, pp. 103-39. 1141 Z. J. Haos and M. Perlmon, "The Performonce of Query Control Schemer for Zone Routing Protocol," SIGCOMM '98, June 1998. [I51 P. Jacquet, P. Muhlethaler ond A. Qayyum, "Optimized Link State Routing Protocol," IETF MANET, Internet draft, Nov. 1998. (161 C. E. Perkinr ond E. M Royer, "Ad Hoc On-Demand Dirtonce Vector Routing," IEEE WMCSA '99, New Orleans, LA, Feb. 1999. "Diversity Coding for Transparent Self-Healing and [17l E. Ayanoglu et d , Fault-TolerontCommunication Networks," IEEE Trans. Commun., YOI.41, no. 11, Nov. 1993, pp. 1677-86. 11SI M. Gosrer et al., "The Digital Dirtributed Systems Security Architecture," Proc. 12th Nat'l. Comp. Securiw Cod, NIST, 1989, pp. 305-19. [I91 J. J. Tordo ond K. Algappon, "SPX Global Aulhentication Urin Public Key Certificates, Proc. IEEE Symp. Security and Privacy, Oaklon!, CA, May 1991, pp. 232-44. (201 C. Kaufmon, " DASS: Distributed Authentication Security Service," RFC 1507, Sept. 1993. 29 1211 Y. Desmedt and Y. Frankel, "Threshold Cryptoryrtemr," Advoncer in Crypioloav - Cwolo '89 llecture Nofer in Comoulei Science 4351. G. Brassard, Ed.,"~pringe;~Verlag, Aug. 1990, pp. 307-i 5. [ 2 2 ] Y. Dermedt, "Threshold Cryptography," Euro. Troons. Telecommvn., "01. 5 , no. 4, July-Aug. 1994, p 449-57. Threshold DSS Signatures," Advancer in Cryp[ 2 3 ] R. Gennaro el d,"Ro!u;t toaroohv Pmc. Eurocrvpt '96 ltecture Noter in Computer Science 1070J, S$n$lerlag, May 1996. pp. 354-71 (241 R. Gennaro et al., "Robust and Efficient Sharing of RSA functions," A i o l v.. o. n.~.in~ Crvofolonv ~ ,,~ ~ - , Crvob '94 ILecIum Notes in Comoulei Science , IIOP), Springer~Verlag,Aug. 1996, pp. 157-72. 1251 R. Ortroviky and M. Yunq, "How to Withstand Mobile Virus Attacks," Proc. - ~ ~ ~ ~ ,/ ~ ~~~ ~ "~ ~~~ (271 A. Herzbe'rg ;I al., "Proactive Secret Sharini or: H b to Cope with Perpetual Leokage," Advancer in Crypdo y Cryplo '95 1Lechm Noler in Computer Science 9631, D. Coppersmith, E l , G g . 1995, SpringerNerlag, pp. 4 5 7 4 9 . [28] A. Herzber el al. "Praoctive Public-Keyand Signature Schemer," Proc. 41h Annual Coo? Corn;. Commun. Security. 1997, pp. 100-IO. [ 2 9 ] Y. Frankel dol., "Proactive RSA," Advances in Cryplology - Cryplo ' 9 7 /kclure Noler in Campuler Science 1294J, Springer~Verlag,U.S.A., Aug. .. ~. ._ (401 M. K. Reiter, "Distributing Trust with the Rampart toolkit," Carnmun. ACM, vol. 39, no. 4, 1996. pp. 71-74. [41] M. K. Reiter, "The Rampart Toolkit for building high-integrity Services," Theory and Proclice in Distributed Systems (lecture Notes in Compuer Science 9381. 1995. 99-1 IO. 1421 M.'K. R&kl al., "The R Key Manoaement Service,'' J. Como. Secuiihl, .~ ,. vol. 4, no. 4, 1996, pp. 267-97. (431 1. Gong, "Increaring Availobilily and Security of on Authentication Service," IEEE JSAC, vol. 1 I , no. 5 , June 1993, pp. 657-62. [44] D. Malkhi and M. Reiter, "Secure ond rcolable replication in Phnlann," Pmc. 17th IEEE Symp. Reliable Dirt Sys., Oct. 1998, pp. 51-58. [45] D. Molkhi and M. Reiter, "Byzantine Quorum Syrtems," J, Dirt Comp., vol. Il,no. 4, 1998. [ 4 6 ] M . Cortro and B. Liskov, "Proctical Byzantine Fault Tolerance," Proc. 3 r d Symp. Op. Sys. Design and Implementotion, New Orleans, LA, Feb. 1999. [ 4 7 ] F. B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutoriol," ACM Comp. Soweyr. vol. 22, no. 4, Dec. 1990, pp. 299-319. (481 Z. J. Haas ond B. liong, "Ad Hoc Mobility Manogement using Quorum Systems," IEEE/ACM Tronr. Net,, 1999. [49] S. Jacobs and M. S. Corion, "WNET Authentication Architecture." Internet draft (drah~iacobr-imep-outh-orch-01 .txtl, Feb. 1999. 1997 nn A A L Z d ,, , Pr [ 3 0 ] Y. Fmnkel et ol.,"Optimal Reriliencc Proactive Puhlic~KeyClyptoryrtemr," Pmc, 381h 5ymp. Foundotioanr of Comp. Sei., 1997. [31] P. Feldmon, "A Piacticol Scheme for Noninteractive Veriiiable Secret Shar~ ing," Proc. 28th IEEE Symp. Foundations of Comp. Sci., 1987, pp. 427-37. (321 T. P. Pederren, "Noninteractive and Informotion~TheoreticSecure Verifioble Secret Sharing," Cryplo '91 lteclure Noler in Computer Science 576J, Springer~Verlog,Aug. 1992, pp. 129-40 [ 3 3 ] Y. Dermedt and S. Joiodia, "Redistributing Secret Shares to New Accerr Structurer ond 11%Applications," Tech. rep. ISSEtTR-97-01, George Mason Univ., July 1997. 1341 M. J. Fisher, N. A. lynch, ond M. S. Pekrson, "lmpaiibilityof Dirhibuted Consensus wih One Faulty Pmersor," J. ACM, vol. 32, no. 2, Apr. 1985, pp. 374-82. [ 3 5 ] R. Perlman, "Network layer Protocols with 8yrontine Roburtnerr," Ph.D. thesir, Department of Electrical Engineering and Computer Science, Morsachmens In;titute of Technology, 1988. ( 3 6 ) 8. Kumor, Integration of secwily in network routing protocoli," SIGSAC Review, vol. I I , no. 2, 1993, pp. 18-25. [ 3 7 ] K. E. Siroir and S. T. Kent, "Securing the Nimrod Routing Architecture," Prac. Symposium on Nehvork ond Dislributed System Securiw, Los Alomitoi, CA, Feb. 1997, The Internet Society, IEEE Computer Society Press, pp. 74-84. 1381 B. R. Smith, S. Murph ond J. J Garcia Luna~Acever,"Securing DistanceVector Routing Protoco~," Proc. Symp. Nehvork m i d Dirt Sys. Security. Los Alomibr, CA, Feb. 1997, pp. 85-92, [ 3 9 ] R. Haurer, T. Przygienda, and G. Trudik, "Lowering Security Overhead in Link State Routing," Comp. Networks, Apr. 1999, vol. 31, no. 8, pp. 885-94. 30 Biographies LIDONG ZHOU (ldrhou@cr.cornell.ed"] is a Ph.D. condidate in the Deportment of Computer Science, Cornell Univerrily. He received hir 6.5. in 1993 and his M.S. in 1998, both in corn uter xience. His reseclrch interests include distributed ryrtemr, security, fault t o ~ r m c e ond , wireless networks. ment. Therk he pursued research on wireless communications, mobility ma& ment, fast protocols, optical networks, and optical switching. From September 1994 to July 1995, he worked for the AT&T Wireless Center of Excellence, where he investigated various clrpectr of wirelei3 and mobile neborking, concentrating on TCP/IP networks. In August 1995 he ioined the faculty of the School of Electrical Engineering at Cornell Univerri 0 5 o w x i o l e proferror. He is on outhor of numerous technical papers and h o l x 12 patents in the fields of high-speed networking, wireless networks, and optical switching. He has or a nized several Warkiho i , delivered tutorials ot m i o r IEEE and ACM con9.r: ences, and serves CIS &or of ~ e v e r o liournclli. He bo, been (I guest editor of three IEEE JSAC i i s ~ e s(Gigobit Networks, Mobile Computing Networks, and Ad-Hoc Networks). He is CI votin member of ACM and o vice chair of the IEEE Technical Committee on PerronagCommunicationr. His interests include mobile ond wireleis communication and networks, personal communication sewice, and high-$peed communicotion and protocols. IEEE Nclwork * Novcmhcrll~cccmbcr1994