Collaborative Attacks in Wireless Ad Hoc Networks*
Prof. Bharat Bhargava
Department of Computer Sciences
Center for Education and Research in Information Assurance and Security (CERIAS )
Purdue University
www.cs.purdue.edu/people/bb
* Supported in part by NSF grant IIS 0209059, 0242840
Outline
2
Collaborative Attacks
Informal definition:
“Collaborative attacks (CA) occur when more than one attacker or running process synchronize their actions to disturb a target network”
3
Collaborative Attacks (cont’d)
4
Collaborative Attacks (cont’d)
5
Collaborative Attacks (cont’d)
6
Examples of Attacks that can Collaborate
7
We are investigating the interactions among these forms of attacks
Example of probably
incompatible attacks:
Wormhole attacks need fast connections, but DoM attacks reduce bandwidth!
Examples of Attacks that can Collaborate (cont’d)
8
Examples of Attacks that can Collaborate (cont’d)
9
Examples of Attacks that can Collaborate (cont’d)
10
Current Proposed Solutions
11
Blackhole attack detection: Reverse Labeling Restriction (RLR)
12
RLR (cont’d)
13
D
S
S1
S2
M
S3
S4
RREQ(D, 21)
(1). S broadcasts a request that carries the old sequence + 1 = 21
(2) D receives the RREQ. Local sequence is 5, but the sequence in RREQ is 21. D detects the false destination sequence number attack.
Propagation of RREQ
Detecting false destination sequence attack by destination host during route rediscovery
RLR (cont’d)
14
D
S
S1
S2
M
S3
S4
BL {}
BL {S2}
BL {}
BL {M}
BL {S1}
BL {}
INVALID ( D, 5, 21, BL{}, Signature )
S4
BL {}
RLR (cont’d)
15
D4
D1
S3
S1
M
D3
S4
S2
D2
[M]
[M]
[M]
[M]
M attacks 4 routes (S1-D1, S2-D2, S3-D3, and S4-D4). When the first two false routes are detected, D3 and D4 add M into their blacklists. When later D3 and D4 become victim destinations, they will broadcast their blacklists, and every host will get two votes that M is malicious host
RLR (cont’d)
Acceleration in Intruder Identification
Multiple attackers trigger more blacklists to be broadcasted by D1, D2, D3
16
D3
M1
S1
D1
Coordinated attacks by M1, M2, and M3
D2
M2
M3
S2
S3
RLR (cont’d)
17
RLR: Deal With Hosts in Blacklist
18
Attacks of Malicious Hosts on RLR
19
Attacks on RLR (cont’d)
20
Attacks on RLR (cont’d)
21
Two Attacks in Collaboration: blackhole & replication
22
D4
D1
S3
S1
M
D3
S4
S2
D2
[M]
[M]
[M]
[M]
Replicated nodes
Regular nodes
Wormhole Attacks defense
23
Wormhole Attacks: �proposed defense mechanism
24
Wormhole Attacks: �proposed defense mechanism (cont’d)
25
Wormhole Attacks: �proposed defense mechanism (cont’d)
26
Wormhole Attacks: �proposed defense mechanism (cont’d)
27
Wormhole Attacks: �proposed defense mechanism (cont’d)
28
Sybil Attack Detection
A Hierarchical Architecture for Sybil Attack Detection
29
Sybil Attack Detection: Proposed Method
30
Sybil Attack Detection: System Assumption
31
Identity Certificate Generation for Level-0 Nodes
commitment
32
= Kg,l + f
,
, …,
Kg,l
Identity Certificate Generation for Level-0 Nodes (cont’d)
33
An example of Two Levels of Merkle Hash Trees
34
IDCert4 = <v4, AuthPath4>
AuthPath4={v3, u3, u2}
Identity Certificate Generation for Level-1 Nodes
35
Identity Verification
36
Secure Communication
37
Intra-group exchanges
Secure Communication (cont’d)
38
Inter-group exchanges
Performance Evaluation
39
Identity Certificate Generation for Level-1 Nodes (cont’d)
40
Modeling Collaborative Attacks
41
Causal model
Purposes:
42
Causal model (cont’d)
43
Causal model (cont’d)
<Sn, En, Mn, Ln>
44
Causal model (cont’d)
45
Conclusions
46
Future work
47
References (1)
[BC03] P. Brutch and C. Ko, “Challenges in Intrusion Detection for Ad Hoc Networks,” Proc. IEEE Workshop on Security and Assurance in Ad hoc Networks, Jan. 2003.
[BH83] B. Bhargava and C. Hua, “A Causal Model for Analyzing Distributed Concurrency Control Algorithms,” IEEE Transactions on Software Engineering, 1983.
[CT04] B. Culpepper, H. Tseng, “Sinkhole Intrusion Indicators in DSR MANETs,” Proc. Broadnet, 2004.
[DB05] S. Desilva and RV. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Communications and Networking Conference, 2005.
[DETER] DETER: A Laboratory for Security Research, http://www.isi.edu/deter/.
[Do02] J. Douceur, “The Sybil Attack,” Proc. IPTPS, Feb. 2002.
[FQL06] H. Fu , S. Kawamura, and C. Li, “ Blom-based Q-composite: A Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks,” Proc. IEEE International Conference on Intelligent Robots and Systems, Oct. 2006.
[HPJ03] Y.-C. Hu, A. Perrig and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proc. INFOCOM, Apr 2003.
[HPJ03a] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” ACM Workshop on Wireless Security (WiSe), Sep 2003.
[HL03] Y. Huang, W. Lee, “A cooperative intrusion detection system for ad hoc networks,” Proc. SASN, 2003.
[HPJ03] Y. Hu, A. Perrig, and D. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proc. ACM workshop on Wireless Security (WiSe), 2003.
48
References (2)
[La78] L. Lamport, Time clocks, and the ordering of events in a distributed, system, Communication of ACM, vol.21, pp.558-564, July 1978.
[MGLB00] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proc. ACM/IEEE Internatl. Conference on Mobile Computing and Networking., 2000.
[MSPR05] J. M. McCune, E. Shi, A. Perrig and M. K.Reiter, “Detection of Denial-of-Message Attacks on Sensor Network Broadcasts,” Proc. IEEE Symposium on Security and Privacy, May 2005.
[MFMG05] K. Mandalas, D. Flitzanis, G. F. Marias, and P. Georgiadis, "A Survey of Several Cooperation Enforcement Schemes for MANETs," Proc. IEEE ISSPIT2005, Symposium on "Security and Privacy in Mobile and Wireless Computing, Dec. 2005,
[NM04] K. Nadkarni and A. Mishra, "A novel intrusion detection scheme for wireless ad hoc. networks,” Proc. IEEE WCNC’04, Mar., 2004.
[PPJK+05] A. Patwardhan, J. Parker, A. Joshi, A. Karygiannis and M. Iorga. "Secure Routing and Intrusion Detection in Ad Hoc Networks," Proc. third IEEE International Conference on Pervasive Computing and Communications, Mar. 2005.
[PM03] A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” Proc. Radio and Wireless Conference RAWCON, Aug. 2003.
[QSL05] L. Qian, N. Song and X. Li, “Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path,” IEEE Wireless Communications and Networking Conference (WCNC), Mar. 2005.
49
References (3)
[RB05] R. Oliveira and T. Braun, "A Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks," Proc. IEEE INFOCOM, Mar.2005.
[RB07] R. Oliveira and T. Braun, "A Smart TCP Acknowledgment Approach for Multihop Wireless Networks," IEEE Transactions on Mobile Computing, Vol. 6, No. 2, pp. 192-205, Feb. 2007.
[RFKN05] S. Ramaswamy, H. Fu, and K. Nygard, “Effect of Cooperative Black Hole Attack on Mobile Ad Hoc Networks,” Proc. ICWN, Jun. 2005.
[SBCW05] D. Sterne, et al.,”A General Cooperative Intrusion Detection Architecture for MANETs,” Proc. Third IEEE IWIA’05, Mar. 2005.
[SLDL+05] K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated Routing for Ad hoc Networks," IEEE Journal on Selected Areas in Commun., pp. 598-610, 2005.
[Yi06] J. Yin, “Poblems and Solutions for Handling Attacks in Sensor Networks,” Ph.D. thesis, University of Missouri-Rolla, Dez. 2006.
[YML02] H. Yang, X. Meng, and S. Lu, “Self-organized network-layer security in mobile ad hoc networks,” Proc. ACM Workshop on Wireless Security (WiSe), 2002.
[WBLW06] W. Wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against Wormhole Attacks in Mobile Ad Hoc Networks,” WCMC, vol. 6, issue 4, pp. 483-503, Jun. 2006.
50