TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi
Download
Report
Transcript TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi
TAODV: A Trusted
AODV Routing
Protocol for MANET
Li Xiaoqi, GiGi
Term Presentation
2004-4-27
Outline
Introduction
Framework of TAODV
Trust model for TAODV
Routing operations in TAODV
Analyses and simulations
Conclusion
2
Now Comes to:
Introduction
Framework of TAODV
Trust model for TAODV
Routing Operations in TAODV
Analyses and Simulations
Conclusion
3
Introduction
Mobile Ad Hoc Network (MANET)
No
fixed infrastructure
Multi-hop routing by cooperation of nodes in a
self-organized way
Nodes has high mobility
Underlying medium is wireless
Frequent link layer errors
Vulnerable to kinds of attacks
4
Routing Protocols for MANET
DSR:
The
Dynamic Source Routing Protocol
DSDV:
Destination-Sequenced
Distance Vector Protocol
AODV:
Ad
Hoc On-Demand Distance Vector Protocol
Two main routing messages:
RREQ: Routing REQuest
RREP: Routing REPly
5
Applications of MANET
Personal area networking
Meeting rooms
Disaster relief
Battlefield operations
High Security Requirements
6
Previous Security Solutions for
MANET
Secure routing protocol
may
perform digital signature authentication
at each routing message
huge overhead
Key management mechanism
usually
need a super-trusted third-party to
issue certificates
destroy the self-organization nature of
MANET
7
Previous Security Solutions for
MANET (con’d)
Intrusion detection mechanism
Listen,
collect and analyze all traffics on each
node
Huge process overhead
Our aim is to design a secure routing protocol,
called TAODV (Trusted AODV Routing Protocol),
without introducing huge overhead or destroying
the self-organization nature of MANET
8
Now Comes to:
Introduction
Framework of TAODV
Trust model for TAODV
Routing Operations in TAODV
Analyses and Simulations
Conclusion
9
Main Ideas of TAODV
A secure routing protocol for MANET
Use trust relationships among nodes for routing
Employ
a trust model derived from subjective logic
Trust calculation is not very time-consuming
Need not sign and verify digital signature at each
routing message
Cooperate with a self-organized key
management mechanism
such
as some threshold solutions
We take AODV for example to illustrate our idea
10
Four Modules of TAODV
Basic routing protocol (AODV in this work)
Trust model
Define
the algorithms or rules to combine, judge, and
update trust information based on subjective logic
Trusted routing protocol
Self-organized key management mechanism
generate
a {secret, public} key pair for each node and
distribute public keys in a secure self-organized way
A pre-requisition, will not discuss it in this presentation
11
Module of Trusted Routing Protocol
Include operations of
trust
recommendation
trust combination
trust judgement
trust update
signature authentication
trust authentication
12
Framework of TAODV
Self-organized Key Management Mechanism
Signature
Authentication
Trust
Recommendation
Trust
Combination
Trust
Update
Trust
Judgement
Trust
Authentication
Basic Routing Protocol
Trust Model
13
Now Comes to:
Introduction
Framework of TAODV
Trust model for TAODV
Routing Operations in TAODV
Analyses and Simulations
Conclusion
14
Representation of Trust
Use Opinion to represent trust:
A two-dimensional,
but three-element metric
A
A
A
A
(
b
,
d
,
u
B
B
B)
B
We
bBA --
Probability of node A believing in node B
d BA -- Probability of node A disbelieving in node B
u BA-- Probability of node A’s uncertainty about B
define that
bBA d BA u BA 1
15
Combination of Trust
Discounting Combination:
Combine
trusts along one path
Combine
Equation:
B
A
C
( A B)
( A C)
( B C )
Let
CAB (bCAB , d CAB , uCAB )
bCAB bBAbCB
AB
A B
d
b
C
B dC
u AB d A u A b Au B
B
B
B C
C
16
Combination of Trust (con’d)
A
Consensus Combination:
Combine
Combine
C
trusts from several paths
B
( A C)
( A, B C )
( B C )
A, B
A, B
A, B
A, B
Equation: Let C (bC , d C , uC )
bCA, B (bCAuCB bCB uCA ) / k
A, B
A B
B A
d
(
d
u
d
C
C C
C uC ) / k , where k
u A, B (u Au B ) / k
C C
C
A
B
A
B
u C u C 2u C u C
17
Mapping Between Evidence and
Opinion space
Mapping from evidence space to opinion space:
bBA p np
A
A
n
d
,
where
u
B p n
B 0, 0
u A
B p n
p : positive evidences
n : negative evidences
α is a parameter
imply the change rate of b, d, and u
we can adjust it to meet our application
18
Mapping Between Evidence and
Opinion space (con’d)
Mapping from opinion space to evidence space:
p b / u
n d / u
, where u 0
We can update trust information from evidence
space mapping to opinion space, or vice versa
19
Now Comes to
Introduction
Framework of TAODV
Trust model for TAODV
Routing Operations in TAODV
Analyses and Simulations
Conclusion
20
Trust Recommendation
Exchange trust information
Three types of message:
TREQ:
Trust REQuest
TREP: Trust REPly
TWARN: Trust WARNing
Broadcast TWARN when a node’s disbelief value
is zero
21
Trust Recommendation (con’d)
Message Structure
TREQ
TREP
22
Trust Judgement
Predefined trust judging rules
b
d
u
>h
>h
Request and verify digital signature
Distrust a node till next certificate renewal
>h
≤h
Actions
Trust a node and continue routing
≤h
≤h
Request and verify digital signature
b – belief
d – disbelief
u – uncertainty
h – threshold which can be adjusted to meet different security level
(default h=0.5)
23
Trust Update
Update of Evidences
Communication Positive events: p++
Failed Communication Negative events: n++
Successful
Mapping
from opinion space
Update of opinion
Combination
from different recommendations
Mapping from evidence space
24
Routing Table Extension
Add three fields into original routing table
Positive
events
Negative events
Opinion
New routing table format
DestIP DestSeq ... HopCount ... Lifetime
Positive
Events
Negative
Events
Opinion
25
Routing Message Extension
Add such fields into original routing messages
Trust
information, or
Digital signature information
RREQ TRREQ
RREP TRREP
Message structure:
original routing information
…
trust information or signature information
26
General Process of TAODV
On initialization, each node’s opinion towards others is
(0,0,1), which means total uncertainty of other nodes’
trustworthiness.
Nodes perform signature authentication during the
initialization period.
After some trust exchanges and data communications,
thus with the increase of either positive or negative
events, the uncertainty will be decreased and the trust
relationship among nodes are forming.
When the trust relationship in the network has been
established, the authentication of nodes will mainly use
trust authentication.
27
Trusted Routing Discovery
S
C
P
D
N
S originated a routing request to D
C is the current node
P is C’s precursor, N is the next hop
Suppose threshold=0.5
28
Routing Process at Current Node
step1:
Trust exchange
step2:
Authenticate P
step3:
Authenticate S
step4:
Authenticate D
29
Routing Process at Current Node
Trust exchange for opinions to S, D, P
Combine opinion(C,P)
d>0.5
Judge opinion(C,P)
U>0.5 or b,d,u<=0.5
b>0.5
Combine opinion(C,S)
U>0.5 or b,d,u<=0.5
d>0.5
Judge opinion(C,S)
b>0.5
Combine opinion(C, D)
d>0.5
Y
U>0.5 or b,d,u<=0.5
Judge opinion(C, D)
Have route?
b>0.5
Have route?
Signature authentication
N
enqueue
N
Y
Correct?
Y
Deny
TRREP
Re-TRREQ Wait for RREQ
TRREP
N
Deny
30
Now Comes to:
Introduction
Framework of TAODV
Trust model for TAODV
Routing operations in TAODV
Analyses and simulations
Conclusion
31
Performance Analysis
Communication overheads can be sharply
reduced by avoiding signature generation
and verification at each routing message.
Bandwidth overheads can be largely
reduced because of replacing 1024/2048
bit signatures to simple trust values.
32
Security Analysis
If no misbehavior, trust value will keep
increasing.
If an external malicious node, it will at once be
denied due to not providing valid signature.
We only consider to prevent external attacks.
Internal attacks can be eased through
certificates renewal.
33
Simulation Environment
Simulator: ns-2
Number of Nodes
30
Source-Destination Pairs
12
Simulation Fields
670*670m
Simulation Time
360s
Node Velocity Range
0-10m/s
Source Packet Rate
4pkts/s
Source Data Packet Size
512 bytes
Physical Link Bandwidth
2Mbps
Nominal Radio Range
250m
34
Selected Simulation Results
Throughput of receiving bits VS Average End2End delay (pause time: 10s)
35
Conclusion
TAODV is a trusted routing protocol which
cooperates with a self-organized key
management mechanism.
It introduces less computation overheads
than previous secure routing protocol
solutions and also guarantee a certain
security level.
It performs trusted routing in a selforganized way.
36
Q&A
Thank You!