SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

20
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani

Transcript of SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Page 1: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

SAODV and Distributed Key Management

Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani

Page 2: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Agenda SAODV

AODV Authentication and Integrity

Distributed Key Management Overview Advantages Disadvantages

Page 3: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

AODV Ad-Hoc On-Demand Distance Vector

Routing Reactive route discovery Contains no security (no authentication

of source nodes, no data integrity checking)

Page 4: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

AODV RREQ, RREP, RERR Each node maintains a routing table of

destination nodes Each node uses sequence numbers to

check ‘freshness’ of routes

Page 5: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

AODV

Page 6: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

SAODV Secure Ad-Hoc On-Demand Distance

Vector Routing Authentication

- must verify source node’s identity Data integrity

- information passed through routing packets must not be tampered with

Page 7: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Authentication Digital signatures (asymmetric, one

public and private key per node) No specific key distribution system Possibility of certificates

Page 8: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Integrity Mutable (hop count) vs. immutable

(source and destination IP addresses) information

Use Hash Chains to help secure the hop count

Digital Signatures prevent tampering of immutable data

Page 9: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Issues High cost of using digital signatures Nothing to prevent some kinds of

tampering of the hop count No exact key distribution system Man in the middle and tunneling attacks

not prevented No mention of how to secure the

process of joining group

Page 10: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Distributed Key Mangement Simple and Fault-Tolerant Key

Agreement for Dynamic Collaborative Groups

Page 11: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Overview Efficient Key Management required to

provide secure and reliable group communication

Problem domain Dynamic Membership Distributed and Collaborative System

Page 12: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Key Management Solution Group Diffie-Hellman

Secured Key exchanged between nodes Key Tree

Efficient Key calculation

Page 13: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Key Trees Efficiency

Tree Balancing Private and Public (blinded) Keys

Page 14: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Communication Group Key Agreement View Synchrony

Guarantees group members receive same set of messages

Sender’s requested message order preserved

Page 15: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Group Membership Events JOIN LEAVE MERGE PARTITION

Page 16: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

JOIN Role of sponsor

Page 17: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Cascaded Events Event A occurs, and during its

processing event B occurs. This is handled using re-entrance. Partially mitigated by VS usage

Page 18: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Security Cryptographic Requirements

Group Key Secrecy Forward Secrecy Backward Secrecy Key Independence

Page 19: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Security cont. Security features of the protocol

Each node contributes to group key Node’s shares are secret Group membership fluctuation handled All messages are signed by senders

Page 20: SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.

Complexity Broadcast Tree Calculation