Yuzheng

advertisement
Computer Science
Efficient Security Mechanisms for Routing
Protocols
Yih-Chun Hu, Adrian Perrig, David B. Johnson
Presented by Yuzheng Zhou for CSC774
Secure Routing mechanisms in MANET
• Most previous secure routing mechanisms use
standard digital signatures
– Public key cryptography is expensive, especially
for MANET.
• Symmetric cryptography much more efficient
– Link state routing
– Distance vector routing: SEAD works, but is still
vulnerable for several attacks
– This paper propose four mechanisms addressing
secure distance vector/ path vector routing.
Computer Science
2
Roadmap
•
•
•
Distance vector routing and attacks
Previous work - SEAD
Four mechanisms based on symmetric cryptography
–
Securing distance vector protocols
• Hash tree chain
• Tree-authenticated one-way chains
• Skiplists
– Securing path vector protocols
• Cumulative authentication
•
Conclusion and future work
Computer Science
3
Distance vector routing
• Finds shortest paths between nodes in the
network
• Each router maintains a routing table list for all
possible destinations
address / distance (metric) / first hop
• Periodically transmits a routing update to each
of its neighbor routers
sequence / distance (metric)
Computer Science
4
Attacks to Distance Vector Routing
•
•
•
•
Advertising short distances (blackhole)
Claim longer distances
Injecting routing loops
Inject a large number of route updates
Computer Science
5
Previous work: SEAD
• SEAD (k=5, n=3)
• Attacks
– Same distance fraud
– Hash chain verification as long as O(ks)
– DoS attack for the nodes missing several routing updates
Computer Science
6
Review: Merkle hash tree
•
To verify v2, need v3’, m01, m47, and verify
Computer Science
7
Mechanism I: Hash Tree Chains
• Prevent same-distance fraud
• A hybrid between a hash tree and a one-way chain
– One-way chain property enforce that nodes cannot decrease the
distance metric (as in SEAD)
– Hash tree property is used to authenticate the node id.
Computer Science
8
Hash Tree Chains (cont..)
Computer Science
9
Mechanism II: Tree-authenticated one-way chains
• Speed up authentication of revived routing update
– O(ks)  O (k +log(s))
Computer Science
10
Tree-authenticated one-way chains (cont..)
• Tree-authenticated one-way chains
– Use a new hash chain for each sequence
number
– All the hash chains are organized as a
merkle hash tree
– To authenticate anchor, following the path to
the root of the hash tree
– To authenticate update, using the anchor
Computer Science
11
MW-chains (prepare for skiplists)
• Provides instant authentication and low storage
overhead for signatures
– This one-way chain contains a list of values-heads
– Between any two heads are a set of signature branches and a
set of checksum branches
– Sender uses a checksum chain that moves in the opposite
direction of the signature chains, to prevent an attacker from
forging an earlier message
Computer Science
12
MW-chains (cont..)
Computer Science
13
Mechanism III: Skiplists
• Goal: Prevent DoS attacks, speed up hash
chain authentication
• Method:
– Skip many steps in a virtual hash chain
– Skipchains can be embedded inside skiplists
– Represented by a MW-chain capable of signing
enough bits to ensure security
• A new head is chosen by hashing the head of this step
• Anchor of this skipchain is computed
• Sign this new anchor
Computer Science
14
Skipchains
Computer Science
15
Path vector routing
• Each routing update includes a list of routers
on the route
• Choose a route with the shortest recorded route
• Authenticate each hop the routing update has
traversed as recorded in the path
• Assure no hops were removed from that
recorded path
Computer Science
16
Path vector routing (cont..)
• Traditional way of authentication:
– Each node inserts an authenticator in the packet,
recipient individually verify each authenticator
– Network overhead of carrying a MAC for each
node in the path
• Cumulative authentication
– A single MAC together with an ordered list of
nodes traversed by the packet
Computer Science
17
Mechanism IV: Cumulative Authentication
• Each packet maintains a path authenticator
and an address list
• When packet traverses a node, the node append
its address to the address list
• Authenticate its position by replacing the path
authenticator with a MAC computed over the
received path authenticator and the packet’s
immutable fields
Computer Science
18
Cumulative Authentication (cont..)
Example: to authenticate packet p, each node authenticate
using a MAC shared with target T
Computer Science
19
Conclusions and future work
• Summary
– Presented four new mechanisms for secure
distance vector and path vector routing protocols
– Based on symmetric cryptography
– Use Merkle hash tree and M-W chain
• Future Work
– Decrease the overhead
Computer Science
20
Computer Science
Thank you!
Q&A
Download