voip mobility prakash kolan university of north texas

48
VoIP Mobility Prakash Kolan University of North Texas

Upload: rudolf-lawrence

Post on 30-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VoIP Mobility Prakash Kolan University of North Texas

VoIP Mobility

Prakash KolanUniversity of North Texas

Page 2: VoIP Mobility Prakash Kolan University of North Texas

Agenda

Mobile Ad-hoc Networks

VoIP in VoIP Ad-hoc Networks

Trust in VoIP Ad-hoc Networks

Issues for trust calculation in VoIP mobile Ad-hoc Networks

and probable solutions

Trust and Mobility Trust during Micro-Mobility

Trust during Macro-Mobility

Inferring a secure routing path in presence of malicious nodes

Authenticating strangers in an ad-hoc network

Page 3: VoIP Mobility Prakash Kolan University of North Texas

Mobile Ad-hoc Networks (MANETs)

Self configuring and adaptive networks

Do not need any infrastructure to deploy these networks

Deployed in areas deprived of any existing network

infrastructure

e.g., Battle zones, Villages, Areas suffering with natural

calamities

Every node can act as a router or a relay for forwarding data

from other nodes in the MANET

Page 4: VoIP Mobility Prakash Kolan University of North Texas

VoIP Mobile Ad-hoc Networks (VoIP MANETs)

VoIP devices can form a VoIP MANET on the fly New VoIP nodes can join and leave the VoIP MANETS Each VoIP node interacts with other VoIP nodes in the

ad-hoc network either for requesting or serving VoIP services

An Ad-hoc VoIP node can forward data between two other VoIP nodes

In context of these high and anonymous interactions, it is imperative to understand the trust of the communicating nodes

Page 5: VoIP Mobility Prakash Kolan University of North Texas

Need for Trust in VoIP MANETs

Open and Anonymous

Lack of Accountability

A central authority for maintaining the authentication information of each and every VoIP device is next to impossible particularly when end devices change their identity and location

PKI – Public Key Infrastructure is not enoughCryptographic algorithms, for instance cannot say if a piece of digitally signed code has been authored by competent programmers and a signed public key certificate does not tell you if the owner is an industrial spy

Page 6: VoIP Mobility Prakash Kolan University of North Texas

Trust in VoIP MANETs

Every node learns the behavior of other VoIP nodes in

the VoIP MANET using trust inference

Every node can infer trust of other nodes for

forwarding routing and secure trust information

The nodes can co-operate with each other to know the trustworthiness of other nodes if they do not have first hand information about the possible forwarding nodes

Page 7: VoIP Mobility Prakash Kolan University of North Texas

Trust in VoIP MANETs

Issues Trust and mobility in VoIP MANETs Secure Routing in VoIP MANETs Authenticating Strangers in VoIP MANETs

Page 8: VoIP Mobility Prakash Kolan University of North Texas

Trust & Mobility

Page 9: VoIP Mobility Prakash Kolan University of North Texas

Trust & Mobility

One of the biggest advantages of using VoIP is the ability to function and operate independent of the location

On the other end, rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere, anytime

Location independent VoIP services can be deployed on top of wireless networks like cellular, WLAN etc.

Page 10: VoIP Mobility Prakash Kolan University of North Texas

Trust & Mobility

Wireless handheld devices equipped with VoIP capabilities can roam from one network to another network

Ability to connect to other devices in an ad-hoc fashion

Necessity in understanding the inherent trust issues involved in mobility of these devices

PKI infrastructure is a solution for authentication, authorization and message integrity issues however it does not address the involved trust issues

Page 11: VoIP Mobility Prakash Kolan University of North Texas

Trust and Mobility

Trust in mobility can be divided into

Trust in Micro-mobility Refers to the scenario where the VoIP mobile device moves in the

coverage area of same access point Trust associations are local

Trust in Macro-mobility Refers to the scenario where the VoIP mobile device moves from

coverage area of one access point to another Need a global trust framework for inferring trust A trust information protocol is needed which advocates the trust

information exchange when devices change access networks

Page 12: VoIP Mobility Prakash Kolan University of North Texas

Principles of Trust

Trust is Subjective: It is the degree of belief about the behavior of other entities (agents) upon which we depend (for example, to have a service delivered)

Trust is Asymmetric: Two agents need not have similar trust in each other

Trust is Context Dependent: Trust in a specific environment does not necessarily transfer to another

Trust is Dynamic: Tends to be reduced if entities are misbehaving and vice versa

Page 13: VoIP Mobility Prakash Kolan University of North Texas

hTrust : A human trust model

Trust Formation: How trust is computed

Trust Dissemination: How trust is propagated

Trust evolution: How trust is evolved or updated based on an observed evidence

Page 14: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation

Whenever an agent ‘a’ (trustor) has to decide whether to trust another agent ‘b’ (trustee), trust information about ‘b’ has to be collected

Sources of trust information Direct experiences: Represents an agent history of interaction

(past interaction b/w trustor & trustee. They are kept in the trustor’s local environment by the TMF

Credentials: Represents what other agents thought of us in previous interactions (e.g., what agent x thought about trustee ‘b’. They are kept in the trustee’s local environment by TMF

Recommendations: Trust information coming from other agents in the social context

Page 15: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation

The process that enables a trustor agent to predict a trustee’s trustworthiness before the interaction

Trust data model: A trustor ‘a’ forms a trust opinion about a trustee ‘b’ based on a’s direct experience b’s credentials recommendations coming from social context

Page 16: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation: Direct Experiences

Single aggregated trust information tuple

[a, b, l, s, c, k, t] i.e, agent ‘a’ trusts agent ‘b’ at level ‘l’ to carry on services ‘s’ in context ‘c’

The trust ‘l’ varies in range [-1 1] with -1 meaning complete distrust and 1 meaning blind trust

‘k’ is defined as degree of knowledge to distinguish ‘don’t trust’ from ‘don’t know’ (lack of evidence) at time ‘t’ Higher the number of direct experiences between trustor and

trustee, higher the degree of knowledge ‘k’ decays with time – i.e, trustor knowledge decays with time

Page 17: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation: Recommendations

When there’s no previous direct experience, the trustor may

ask other agents in the social context to provide him with

recommendations

A recommendation tuple sent by agent ‘x’ regarding trustee ‘b’

is

[x, b, l, s, c, k, t] SKX Є R (R being set of all recommendations)

Each recommendation is signed using the public key of the

recommender

Page 18: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation: Credentials

Each agent ‘b’ carries with him (i.e, in his local environment) a portfolio of credentials i.e, a set of letters of presentation detailing how trustworthy ‘b’ has been in one or more previous interactions. Each credential looks like

[x, b, l, s, c, nfrom, nto, t] SKx

Agent ‘x’ considers ‘b’ trustworthy at level ‘l’ to carry on service ‘s’

in context ‘c’ after series of transaction from nfrom to nto

This trust refers to a set of transactions happened in the past between ‘x’ and ‘b’

Page 19: VoIP Mobility Prakash Kolan University of North Texas

Trust Formation

Page 20: VoIP Mobility Prakash Kolan University of North Texas

Trust Dissemination

Trust information is disseminated upon request from the trustor Step 1: a -> b : req-for-credentials(m) : A request from ‘a’ to ‘b’ to see his

credentials.

‘m’ indicates the maximum no. of letters ‘a’ is willing to accept

Step 2: b -> a : Cti , i Є [1, m] – The trustee ‘b’ replies with a set of utmost ‘m’

letters of presentation (the one he considers to be the best for his own reputation) Step 3: TMF decrypts the letters of presentation and checks the validity of public

keys of all agents who recommended the trustee ‘b’ with an identity management system

Step 4: If ‘a’ then decides to communicate with ‘b’, then after communication ‘a’ and ‘b’ exchange a letter of presentation

a -> b : [a, b, l’, n, n, t]SKa

b -> a : [b, a, l”, n, n, t]SKb

Page 21: VoIP Mobility Prakash Kolan University of North Texas

Trust EvolutionContinuous self-adaptation of trust information kept in agents local environment

Updating trust based on the just finished transaction

Updating trust based on the credentials it has received from the trustee

h3 (l1, l2) = w1xl1 + w2xl2 with

w1+w2=1 0<wi<1

l1 -> newly perceived

trustworthiness

l2 -> old opinion

h4(l1, l2, l3) = w1xl1 + w2xl2 + w3xl3 w1+w2+w3=1 0<wi<1l1 -> b’s trust worthiness as perceived by al2 -> opinion previously held by ‘a’ about ‘b’l3 -> b’s expected trustworthiness based on received credentials

Page 22: VoIP Mobility Prakash Kolan University of North Texas

Secure Routing in VoIP MANETs

Page 23: VoIP Mobility Prakash Kolan University of North Texas

Routing in MANET’s

Nodes communicate among themselves

No central authority in supervising behavior of nodes in MANET’s

Nodes themselves act as routers and relays for forwarding data and control packets

Multi-hop support makes communication possible with nodes outside of coverage area

Page 24: VoIP Mobility Prakash Kolan University of North Texas

Secure Routing

Current research assumes that all the nodes in the network share similar goals and would co-operate with each other

Presence of compromised nodes Become antagonistic to other uncompromised nodes Not reliable for retrieving routing information for actual

routing

Nodes with disparate goals Need external co-operation for communication Limiting factors such as power conservation etc.

Page 25: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Reputation of nodes can be used for instilling the motivation to co-operate

It establishes trust and confidence among the nodes

Motivates to act in a trustworthy fashion and not to maliciously tamper with any data packet

If a node becomes indifferent to its reputation and continues to act maliciously, it is weeded out of the network

Page 26: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

The malicious behavior of the node can be estimated

based on

Frames received

Data packets forwarded

Control packets forwarded

Data packets received

Control packets received

Streams established

Page 27: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Message from A -> C. ABC is

the only path from A to C. To

send a message to C, A

sends the message to B. If C

acknowledges receiving the

message RepAB=+1

Reputation is the means of recommendations from all nodes

E

D

CBA

Page 28: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Every node needs to identify the next node in the routing path

Polls all its neighbors for the reputation of all its probable next nodes

Chooses the next node with the highest reputation value

Page 29: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Page 30: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Finding Trusted Routers - Deciding Next Hop

Shortest path to destination - Sorts all the available paths

based on no. of hops

Using only the reputations - Choose the next hop based

on highest reputed neighbor

Shortest path to destination along with the reputation of the neighbors - Sorts all the available paths based on

distance and reputation of next.

Page 31: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Using the Reputation Value

Advantages: Increase in throughput Non co-operative nodes are ostracized

Disadvantage: Poor nodes are penalized

Solution: Using resource availability information along with reputation value

Achieved equilibrium in traffic management Good nodes receive more traffic, becomes overloaded, drops

some packets and decreases their reputation Source nodes use 2nd rank nodes and the system equilibrium is

established

Page 32: VoIP Mobility Prakash Kolan University of North Texas

Reputation for Secure Routing

Page 33: VoIP Mobility Prakash Kolan University of North Texas

Authenticating Strangers in VoIP MANETs

Page 34: VoIP Mobility Prakash Kolan University of North Texas

Authenticating Strangers

One of the primary requirements of ad-hoc networks is that nodes can join and leave the network on the fly

New nodes express their willingness in joining the network

No previous history with any nodes in the network

Need to infer the behavior or trust of new nodes

Page 35: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Provides a security mechanism for wireless communications via pre-authentication over a location limited channel

Devices exchange a limited amount of public information

over a privileged side-channel

The pre-authentication is used for authenticating one

another on the unsecured wireless link

Provides secure authentication using almost any standard

public key based key exchange protocol

Page 36: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Properties of Location Limited Channel

Demonstrative Identification: Identification based on physical context Audio (both in audible and ultrasonic range) which has limited

transmission range and broadcast characteristics, can be used by a group of PDA’s in a room to demonstratively identify each other

For a single communication end point (e.g., printer across the room), Channels with directionality such as infrared

Authenticity: That it is impossible (or difficult) for an attacker to transmit in that channel, or at least to transmit within being detected by legitimate participants

Page 37: VoIP Mobility Prakash Kolan University of North Texas

The participants use the location limited channel for exchanging small cryptographic material for authenticating one another during wireless data transfer

Secure because the pre-authentication data exchanged over a channel with inherent physical limitations

The location limited channel is therefore resistant to eavesdropping

It is difficult for the attackers to mount an attack because of inherent limitations in the chosen location limited channel

Pre-Authentication over location-limited channel

Page 38: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Standard public key exchange protocols can be used for bootstrapping this authentication

The participants can exchange their public keys during this pre-authentication phase

Even if the attacker manages to eavesdrop the communication over wireless channel, it would be difficult for him to impersonate as the participants already have their keys exchanged

Page 39: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Basic scheme for pre-authentication

Pre-authentication, taking place over the location-limited channel:

1. A -> B: addrA , h(PKA)

2. B -> A: addrB , h(PKB)

Authentication continues over the wireless channel with any standard key exchange

protocol, e.g., SSL/TLS:

1. A -> B: TLS_CLIENT_HELLO ...and so on.

The various symbols denote:

addrA, addrB: A’s (resp. B’s) address in wireless space, provided strictly for

convenience

PKA, PKB : the public key belonging to A (resp. B), either a long-lived key or an

ephemeral key used only in this exchange

h(PKA) : a commitment to PKA, e.g., a one-way hash of an encoding of the key

Page 40: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Pre-authentication must be mutual – both parties must send and receive pre-authentication data on an ad-hoc node

In some cases e.g., a server on an ad-hoc node providing a service to another ad-hoc node, the pre-authentication is only in one direction

Depending upon the location limited channel and the public key based protocol during normal wireless data transfer during the pre-authentication phase, a decision can be made to Exchange public keys Certificates Secure digests of the keys using cryptographic hash functions

Page 41: VoIP Mobility Prakash Kolan University of North Texas

Pre-Authentication over location-limited channel

Page 42: VoIP Mobility Prakash Kolan University of North Texas

Group authentication - Multicast

Some of location limited channels have broadcast capability – they can reach more than one target simultaneously. e.g., audio

Many applications can benefit from the ability to designate a group of users in a secured network. e.g. Networked games, Meeting support conferencing

Pre-authentication can be used with two major families of group key exchange protocols

Centrally managed group by designating a specially trusted group member as group manager

Unmanaged groups with no group manager

Page 43: VoIP Mobility Prakash Kolan University of North Texas

Centrally Managed Groups

One participant is designated to become the group manager (first one to start)

The group manager establishes point to point links with every other group participant based on pre-authentication

The group manager will then exchange the group shared key with the new participant

When a member leaves a group, the group manager distributes a new group shared key with the remaining participants

Page 44: VoIP Mobility Prakash Kolan University of North Texas

Problems with Centrally Managed Groups

Group manager presents a single point of attack

Group manager is trusted to generate and distribute all group keys. Many applications are not compatible with such a distinguished trusted party

The group manager cannot easily leave the group

Page 45: VoIP Mobility Prakash Kolan University of North Texas

Unmanaged Groups

By using pre-authentication over a location limited channel, all participants do not need public keys as in case of Diffie-Hellman

Every group member commit their public keys or shared secrets to the group and a random existing group member can respond, thus ensuring mutual authentication

Group members can then proceed with their chosen group key exchange protocol over the wireless link

Page 46: VoIP Mobility Prakash Kolan University of North Texas

Unmanaged Groups

Page 47: VoIP Mobility Prakash Kolan University of North Texas

References

1. C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas, “A quantitative trust establishment framework for reliable data packet delivery in MANETs”, SASN 2005: 1-10

2. D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Symp. on Network and Distributed Systems Security (NDSS), 2002.

3. L. Capra, "Engineering Human Trust in Mobile System Collaborations", In Proc. of the 12th International Symposium on the Foundations of Software Engineering (SIGSOFT 2004/FSE-12), pages 107-116. November 2004, Newport Beach, CA, USA. [PDF]

4. Marsh, S. P. (1994), “Formalizing Trust as a Computational Concept”. Ph.D. Thesis. Department of Mathematics and Computer Science, University of Stirling

5. P. Dewan et al, “Trusting Routers and Relays in Ad hoc Networks”, In the International Conference in Parallel Processing Workshops, Kaohsiung, Taiwan, October 06-09, 2003

Page 48: VoIP Mobility Prakash Kolan University of North Texas

References

6. F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172–194, Cambridge, United Kingdom, 1999. Springer-Verlag, Berlin Germany.

7. M. Carbone, M. Nielsen, V. Sassone, “A formal model for trust in dynamic networks”. BRICS

8. G. Theodorakopoulos, J. S. Baras, “Trust Evaluation in Ad-Hoc Networks”, ACMWorkshop on Wireless Security (WiSe’04), Oct. 2004

9. S. Ganeriwal, M. B. Srivastava: Reputation-based framework for high integrity sensor networks. SASN 2004: 66-77

10. S. Buchegger and J.-Y. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proc. 2nd Workshop on Economics of Peer-to-Peer Systems, June 2004

11. W. K. Wiechers, S. Daskapan, W. G. Vree, “Simulating the Establishment of Trust Infrastructures in Multi-Agent Systems”, In Marijn Janssen, Henk Sol & René Wagenaar (Eds.), Sixth International Conference on Electronic Commerce ICEC04 (pp. 255-264). AM (ISBN 1-58113-930-6).