1 / 21

Security Issues in Mobile Ad-Hoc Network

Security Issues in Mobile Ad-Hoc Network. Mukul A. Khairatkar. Agenda. Introduction to MANET Various Security Model Operations Introduction to IPSec IPSec Operation Simulation Details Conclusion. Mobile Ad-Hoc Network. No Infrastructure No Server  Nothing

sierra-king
Download Presentation

Security Issues in Mobile Ad-Hoc Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Issues in Mobile Ad-Hoc Network Mukul A. Khairatkar

  2. Agenda • Introduction to MANET • Various Security Model • Operations • Introduction to IPSec • IPSec Operation • Simulation Details • Conclusion

  3. Mobile Ad-Hoc Network • No Infrastructure No Server  Nothing • Everybody acts like a Router • Security Problem • Network Resources • Source Spoofing • Eavesdropping • Data Transformation

  4. Security • Key Pre-Distribution Scheme • Web of Trust • Public Key Certification • IPSec

  5. Some Security Terms • Public Key • Private Key • Digital Signature • Certificate • Digital Signature • Certificate Of Authority • Certificates • Public Key Infrastructure • X.509

  6. Key Pre-distribution Scheme Node 2 Node 1 Key Key Key Key Key Node 3 Key Node 4

  7. Web Of Trust Public Key Node 1 Node 2 PGP PGP Public Key Node 3 PGP

  8. Public Key Infrastructure • X.509 • Certificate Authority CA • CA  CA Root Certificate • Root certificate • Distributed with Web Browser ..etc • SSL/TLS web pages

  9. IPSec • Why IPSec? • Open Standard Freely Available • Modular • Integrates in Existing IP structure • Transparent to application layer entities • For IPv6

  10. Security Architecture

  11. Modes • Transport Mode • Payload Encrypted • IP header is Intact • Routing is Intact • Tunnel Mode • New IP packet • New Routing • NW-NW Communication (tunnel)

  12. IPSec Packet

  13. Network Model

  14. IP tunnel

  15. Performance

  16. For Ad-Hoc Network

  17. IPSec for Ad-Hoc IP Cloud Subnet 1 Subnet 2

  18. Security

  19. Problems • Latency Increases • Overhead Increases • Throughput Decreases • Complexity Increases

  20. Conclusion • Ad-hoc Network uses various security methods • Do not violate existing protocol • IPSec is a new approach to secure IPv4 and IPv6 packets • Better approach can be used than IPSec

  21. References • [1] Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks, Edith C. H. Ngai and Michael R. Lyu ,Department of Computer Science and Engineering ,The Chinese University of Hong Kong, IEEE 2004. • [2] Secure Ad Hoc Networking, PanagiotisPapadimitratos, Virginia Polytechnic Institute and State University, IEEE 2006. • [3] Data Security in Ad hoc Networks Using MultiPath Routing, Souheila BOUAM. Jalel HEN-O rlIMANLaboratoirc CNRS-PRiSM. University of Versailles. • [4]Securing Ad-Hoc Networks by IPSEC, AbhrajitGhosh, Telcordia Technologies Applied Research Piscataway, NJ, IEEE paper 2004. • [5] Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas Cornell University, IEEE 1999. • [6] C. Adams and S. Farrell “Internet X.509 Public Key Infrastructure Certificate Management Protocols”, RFC 2510, Mar 1999 • [7] K. Young et. al. “Ad Hoc Mobility Protocol Suite for the MOSAIC ATD”, Milcom 2003. • [8] D. Boneh and M. Franklin “Identity based encryption from the Weil pairing”, SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.

More Related