Upload
grant-mcfarland
View
40
Download
2
Embed Size (px)
DESCRIPTION
Anonymity in MANETs Threats and Mitigations. Roy Friedman, Neer Roggel Technion, Israel Institute of Technology Computer Science Department {roy,nroggel}@cs.technion.ac.il. Outline. What are MANETs? Anonymity scenarios Attackers and threats Our approach: IP hopping - PowerPoint PPT Presentation
Citation preview
1
Anonymity in MANETs Threats and Mitigations
Roy Friedman, Neer RoggelTechnion, Israel Institute of Technology
Computer Science Department{roy,nroggel}@cs.technion.ac.il
2
Outline
• What are MANETs?
• Anonymity scenarios
• Attackers and threats
• Our approach: IP hopping
• Limitations and future work
• Open discussion
8
Anonymity Scenarios
• Battlefield– Units in motion– Sensor network
• Content sharing– Oppressive regime– Rights protected content
9
Attacker Capabilities
• Eavesdropping• Geolocating a node• Device fingerprinting• Generating traffic• Man in the middle• Node compromise• Worm holes
10
Threats to Anonymity
• Irrefutably implicating a node• Distorting route construction• “Chattering laptops”• Attacks on timing• Traffic analysis
15
IP Hopping
• Step 1: agree on shared information
A B M D E
Axg A Bx xg A B Mx x xg A B M Dx x x xg
E D M B A
Exg E Dx xg E D Mx x xg E D M Bx x x xg
16
IP Hopping
• Step 2: derive temporary addresses
A B M D E E D M B Ax x x x x x x x x xg K g
(2 )iA KIP E i (2 1)i
E KIP E i
17
IP Hopping
• Step 3: use temporary addresses
A
B
M
D
E
[Ai,B,M,D,Ei]
[Ai,B,M,D,Ei]
[Ai,B,M,D,Ei]
[Ai,B,M,D,Ei]
19
Limitations
• Routing efficiency– Discovery, maintenance
• In-band agreement
• Network services– Authentication, service discovery, address
binding, address assignment
20
Future Research Directions
• More IP information leaks
• Better routing mechanisms
• TCP stream information leaks