Professional Documents
Culture Documents
SPROUT:
Security & Privacy Research Outfit
UC Irvine
http://sprout.ics.uci.edu
Outline
Suspicious MANETS
Goals
ALARM
- Security
- Future Work
PRISM
- Security
- Comparison
Summary, Future Work, etc.
1
9/20/10
“Normal” MANETS
No infrastructure
Multi-hop
Set of peer nodes
Nodes move (but not too much)
Nodes have unique names/addresses/IDs
Routing protocols enable
communication between a pair
(or group) of explicitly
named nodes
9/20/10 4
“Suspicious” MANETs
Environment is “hostile” and “suspicious”
Military/battlefield
Law enforcement
Mobile WSN (with self-locomotion)
2
9/20/10
9/20/10 5
9/20/10 6
3
9/20/10
9/20/10 7
Privacy in MANETs
Goal:
Tracking resistance no long-term IDs for nodes
Escrowed Anonymity only special authorized entities
(e.g., court) can learn long-term IDs
Challenges:
How to authenticate without long-term IDs?
How to achieve accountability in case of misbehavior?
Malicious insiders become harder to combat
9/20/10 8
Security in MANETs
- Confidentiality
- Integrity
- Authentication
- Accountability and non-repudiation
4
9/20/10
9/20/10 9
Related Work
Secure routing protocols: Ariadne, SRDP,
SEAD, EndairA, SRP… (no privacy)
Not location-based
More later…
9/20/10 10
Our Results
Location-centric communication instead of identity-centric
Well-suited for suspicious MANET/VANET settings.
5
9/20/10
11
Location-based Communication
Decisions
12
Assumptions
[LOCATION] each node is equipped with a GPS or
similar device
[PRIVACY] no public node identities / addresses
[MOBILITY] some min. number (k) of nodes move
periodically
- tracking a node require discerning it among a subset of nodes
that moved in the interim
[SYNCHRONY]: common (leap-frog) mobility followed by
common rest
[SECURITY]
- all outsider attacks
- passive (honest-but-curious) insiders
6
9/20/10
13
Auxiliary Assumptions
14
7
9/20/10
15
ALARM
16
8
9/20/10
17
18
9
9/20/10
19
20
10
9/20/10
21
22
11
9/20/10
23
TempID=(Location_4||GSIG)
TempID=(Location_1||GSIG)
TempKey=Key_4 TempID=(Location_2||GSIG)
TempKey=Key_1
TempKey=Key_2
TempID=(Location_3||GSIG)
TempKey=Key_3
TempID=(Location_5||GSIG)
TempKey=Key_5
TempID=(Location_6||GSIG)
TempKey=Key_6
24
TempID=(Location_4||GSIG)
TempID=(Location_1||GSIG)
TempKey=Key_4 TempID=(Location_2||GSIG)
TempKey=Key_1
TempKey=Key_2
TempID=(Location_3||GSIG)
TempKey=Key_3
TempID=(Location_5||GSIG)
TempKey=Key_5
TempID=(Location_6||GSIG)
•Want to send to Node at Location_1
TempKey=Key_6
•Encrypt message with Key_1 and
send to TempID=(Location_1||GSIG)
12
9/20/10
25
Active/Passive Outsider:
26
13
9/20/10
27
28
14
9/20/10
29
30
15
9/20/10
31
Security (3)
Active Insider:
32
Future Work
To Do:
Better (more precise) analytical privacy model
Better evaluation with “real” MANET traces
- Unsurprisingly, military traces are hard to come by…
- But, VANET traces are easier to obtain
16
9/20/10
33
PRISM: Motivation
34
PRISM: Motivation
17
9/20/10
35
PRISM Operation
9/20/10 36
18
9/20/10
9/20/10 37
9/20/10 38
19
9/20/10
9/20/10 39
9/20/10 40
20
9/20/10
9/20/10 41
9/20/10 42
21
9/20/10
43
ALARM vs PRISM
ALARM: communication decision depends on current topology (link state)
9/20/10 44
Proactive Reactive
22
9/20/10
9/20/10 45
Active/Passive Outsiders:
9/20/10 46
23
9/20/10
9/20/10 47
Active Insiders:
9/20/10 48
24
9/20/10
9/20/10 49
Details of Routing Messages vs Time
(RPGM)
9/20/10 50
Routing Messages / Time
(Random Waypoint)
25
9/20/10
9/20/10 51
52
Related Work
SPAAR and AO2P require on-line location servers.
26
9/20/10
9/20/10 53
Future Work
54
Conclusions
27
9/20/10
55
End
Questions?
Comments?
Complaints?
28