A Survey of SecureWireless Ad Hoc Routing.ppt
《A Survey of SecureWireless Ad Hoc Routing.ppt》由会员分享,可在线阅读,更多相关《A Survey of SecureWireless Ad Hoc Routing.ppt(25页珍藏版)》请在麦多课文档分享上搜索。
1、A Survey of Secure Wireless Ad Hoc Routing,Article by: YIH-CHUN HU, ADRIAN PERRIGIEEE Security and Privacy special issue on Making Wireless Work, 2(3):28-39, 2004. Presented by: Devendra Salvi 04-17-2007,Multihop Ad Hoc network,Access Point,Network boundary,Ad Hoc N/W,Outline,Attacks on Ad hoc netwo
2、rks Key setup in Ad hoc networks SEAD in mobile wireless Ad Hoc network A secure on-demand routing protocol for ad hoc networks Securing AODV Review Questions,Attacks on Ad hoc networks,Attacks on ad hoc network routing protocols are mainly Routing disruption attack Wherein the attacker causes legit
3、imate data packets to be routed in dysfunctional ways.Resource consumption attack Wherein the attacker injects packets into the network to consume network resources such as bandwidth or to consume node resources such as memory/computational power.,Attacks on ad hoc network routing protocols,Routing
4、disruption attack,Insert forged routing packets,Source,Destination,Blackhole / Grayhole,Drop packets,Shortest path,Attacks on ad hoc network routing protocols,Wormhole,Node A,Node B,Xmission range of A,Xmission range of B,Intruder Node X,Intruder Node X,Records Traffic for network A & replays it in
5、network B,Attacks on ad hoc network routing protocols,Solution for wormhole attacks Packet Leashes is keeping constraints on packet in either of two ways Temporal Temporal leashes rely on extremely precise time synchronization and timestamps in each packet. A packets travel time is approximated as t
6、he difference between the receive time and the timestamp.Geographical,Attacks on ad hoc network routing protocols,Solution for wormhole attacks Packet Leashes is keeping constraints on packet in either of two ways TemporalGeographical Where in location information and loosely synchronized clocks is
7、used to create a leash The distance between the sender and receiver is calculated nodes velocity and timestamps.,Key setup in Ad hoc networks,To authenticate a legitimate node Establishing private keys Share private keys between each pair of nodes before deployment. Pitfall: when new nodes join netw
8、ork later Solution: 1. Establishing trust and keys between two nodes in an ad hoc network; Master-slave nodes.,Key setup in Ad hoc networks,SUCV addresses (statistically unique cryptographically verifiable) Each node generates a public- and private-key pair, and then chooses its address based on a c
9、ryptographic hash function of the public key E.g. 1. A nodes entire IPv6 address is the hash functions output,Key setup in Ad hoc networks,Certificates from a certificate authority,node address, node public key, and a signature from the CA (s).,Key setup in Ad hoc networks,Transitive trust and PGP t
10、rust graphs,node address, node public key, and a signature from the CA.,Node A,Node B,Node C,SEAD in mobile wireless Ad Hoc network,To support use of SEAD with nodes of limited CPU processing capability, and to guard against DoS attacks in which an attacker attempts to cause other nodes to consume e
11、xcess network bandwidth or processing time, efficient one-way hash functions are used while asymmetric cryptographic operations in the protocol are not used.,SEAD: Secure efficient Ad hoc Distance vector routing protocol.,SEAD in mobile wireless Ad Hoc network,Destination-Sequenced Distance-Vector a
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASURVEYOFSECUREWIRELESSADHOCROUTINGPPT
