lec-11-LHAP-Zhu

lec-11-LHAP-Zhu - AdHocNetworksNetwork AccessControl...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Shambhu Upadhyaya 1 Ad Hoc Networks – Network  Ad Hoc Networks – Network  Access Control  Access Control  Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 11)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 2 Introduction Ad hoc networks do not implement any network access control Network becomes vulnerable to resource consumption attacks It may be a common attack in adversarial environment Most routing protocols do not address this type of attack – a  node trusts its neighbors Some solutions talk about authenticating control packets Need to provide access control for both control and data  packets 
Background image of page 2
Shambhu Upadhyaya 3 Naïve Solution Employ a network-wide key so every node can use it to  compute a MAC on the packets it sends and verifies packets  from neighbors Disadvantage - Attacker needs to compromise one node - If global key is divulged, difficult to identify the compromised  node (lack of source authentication) - Expensive to recover from compromise since group key update  is involved Digital signature for packet source authentication - Forbiddingly expense  Need a lightweight authentication protocol in ad hoc networks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 4 Proposed Solution Hop-by-hop authentication Node joining ad hoc network needs to perform only  some inexpensive operations to bootstrap a trust  relationship Then switch to a very lightweight protocol for traffic  authentication Transparent and resides in between the data link layer  and the network layer Based on one-way hash chains and TESLA for  broadcast source authentication
Background image of page 4
Shambhu Upadhyaya 5 Assumptions Links are bidirectional Large networks (may be disjoint or  mergeable) Nodes are relatively underpowered Loose time synchronization Physical layer uses techniques such as  spread spectrum to prevent jamming attacks
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 6 More Assumptions Security Assumptions - Each node possesses a public key certificate  issued by a trusted CA (such as in a university) - Triangular inequality in receiving packets
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 19

lec-11-LHAP-Zhu - AdHocNetworksNetwork AccessControl...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online