aran authenticated routing for ad hoc networks

27
ARAN Authenticated Routing for Ad hoc Networks Master Course Network & Information Security Lab Lee. pung. ho In Journal on Selected Areas in Communication, special issue on Wireless Ad hoc Networks, Volume 23, Number 3, pages 598-610, March 2005. Kimaya Sanzgiri Daniel LaFlamme Bri dget Dahill Brian Neil Levine Clay Shields Eliza beth M. Belding-Royer

Upload: cissy

Post on 22-Jan-2016

71 views

Category:

Documents


0 download

DESCRIPTION

ARAN Authenticated Routing for Ad hoc Networks. Kimaya Sanzgiri Daniel LaFlamme Bridget Dahill Brian Neil Levine Clay Shields Elizabeth M. Belding-Royer. Master Course Network & Information Security Lab Lee. pung. ho. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: ARAN Authenticated Routing for Ad hoc Networks

ARAN

Authenticated Routing for Ad hoc Networks

Master CourseNetwork & Information Security LabLee. pung. ho

In Journal on Selected Areas in Communication, special issue on Wireless Ad hoc Networks, Volume 23, Number 3, pages 598-610, March 2005.

Kimaya Sanzgiri Daniel LaFlamme Bridget Dahill Brian Neil Levine Clay Shields Elizabeth M. Belding-Royer

Page 2: ARAN Authenticated Routing for Ad hoc Networks

2Network & Information Security LabNetwork & Information Security Lab

CONTEXT

1. INTRODUCTION 2. RELATED WORK

21. Ad-Hoc Network 2.1 AODV

3. ARAN(Authenticated Routing for Ad hoc Networks)

4. CONCLUSION

Page 3: ARAN Authenticated Routing for Ad hoc Networks

3Network & Information Security LabNetwork & Information Security Lab

1. INTRODUCTION

Abstract AODV ๊ธฐ๋ฐ˜์œผ๋กœ ๊ธฐ์กด์˜ ์œ ์„  Network ์™€ ์œ ์‚ฌํ•˜๊ฒŒ Certific

ate ๋ฅผ ํ†ตํ•œ ์ธ์ฆ๊ณผ Private key ์™€ Public key ๋ฅผ ์‚ฌ์šฉํ•œ ์„œ๋ช… ๋ฐ ๊ธฐ๋ฐ€์„ฑ , ๋ฌด๊ฒฐ์„ฑ์„ ์ธ์ฆํ•˜๋Š” ๊ธฐ๋ฒ•

AODV Problem AODV ๋Š” packet ์ˆ˜์ • , ๋„์ฒญ , Routing ๋ฐฉํ•ด ๋“ฑ ์•…์˜์ ์ธ U

ser ์˜ ๊ณต๊ฒฉ์— ์ทจ์•ฝํ•จ

Solution Asymmetric key ์˜ ์„œ๋ช… ๋ฐ ๊ธฐ๋ฐ€์„ฑ ๋ณดํ˜ธ์™€ Certificate ๋ฅผ

์ด์šฉํ•œ ์ƒํ˜ธ๊ฐ„์— ์ธ์ฆ์„ ํ†ตํ•ด ๊ฐ๊ฐ์˜ Node ๊ฐ„์— ์ธ์ฆ์„ ์ˆ˜ํ–‰

Page 4: ARAN Authenticated Routing for Ad hoc Networks

4Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.1 Ad-Hoc Network ๊ธฐ์กด์˜ ๋„คํŠธ์›Œํฌ์™€ ๋‹ฌ๋ฆฌ ๋„คํŠธ์›Œํฌ ์ธํ”„๋ผ๊ฐ€ ๊ตฌ์ถ•๋˜์ง€

์•Š์€ ์ƒํƒœ์—์„œ ๋‹จ๋ง๋“ค์ด ์ƒํ˜ธ๊ฐ„์— ๋ฐ์ดํ„ฐ ์†ก / ์ˆ˜์‹ ์„ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ํ˜•ํƒœ์˜ ๋„คํŠธ์›Œํฌ

๊ธฐ์ง€๊ตญ์ด๋‚˜ AP(Access Point) ๊ฐ€ ์กด์žฌํ•˜์ง€ ์•Š์Œ ๊ฐ๊ฐ์˜ ๋‹จ๋ง node ๋“ค์ด Routing ์—ญํ• ์„ ์ˆ˜ํ–‰ ๋™์ ์ธ Topology ๋ฅผ ์†Œ์œ 

Problem ๋ถˆ์•ˆ์ •ํ•œ ๋งํฌ ์†Œ์œ  : ๋ฌด์„ ์„ ์ด์šฉํ•˜๋ฏ€๋กœ ๋Œ€์—ญํญ , ๊ฑฐ๋ฆฌ์˜

์ œํ•œ์„ ๋ฐ›๊ณ  , ๊ฐ„์„ญ / ๋‹ค์ค‘๋งํฌ ๋ฌธ์ œ์ ์ด ์กด์žฌ ๋„์ฒญ์— ์ทจ์•ฝ : ์œ ์„ ๋งค์ฒด๊ฐ€ ์•„๋‹Œ ๋ฌด์„ ๋งค์ฒด๋กœ ์ธํ•œ ํ†ต์‹  ์ด๋ฏ€๋กœ

์ค‘๊ฐ„์— ๋„์ฒญ ๋‹นํ•  ์œ„ํ—˜์„ฑ ์กด์žฌ ํ•œ์ •๋œ ์ž์› : Power, memory, computing ๋Šฅ๋ ฅ ๋“ฑ ๊ธฐ์กด์˜

๋„คํŠธ์›Œํฌ์™€ ๋‹ฌ๋ฆฌ ์ž์›์ด ํ•œ์ •๋จ .

Page 5: ARAN Authenticated Routing for Ad hoc Networks

5Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing) AODV ๊ฐœ์š”

on-demand ๊ธฐ๋ฐ˜์˜ Routing Ad-hoc Network ์—์„œ ๋ณดํŽธ์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” Routing Protocol ์š”์ฒญ์„ ์žˆ์„ ๋•Œ ๋งˆ๋‹ค ๊ฒฝ๋กœํƒ์ƒ‰์„ ์ˆ˜ํ–‰ํ•˜๋Š” Routing Protocol

AODV ๋™์ž‘๊ณผ์ • ๋ชฉ์ ์ง€์— ํ•ด๋‹น๋˜๋Š” ์ •๋ณด๊ฐ€ ์—†์„ ์‹œ ๊ฒฝ๋กœ ํƒ์ƒ‰ ๋ชฉ์ ์ง€ ๊ฒฝ๋กœ๋ฅผ ์ฐพ์„ ๋•Œ๊นŒ์ง€ RREQ ๋ฅผ broadcast ๋ชฉ์ ์ง€์— RREQ ๊ฐ€ ๋„๋‹ฌํ•˜๋ฉด ์—ญ ๋ฐฉํ–ฅ์œผ๋กœ RREP Unicast

Page 6: ARAN Authenticated Routing for Ad hoc Networks

6Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing) AODV ์˜ ๊ตฌ์„ฑ์š”์†Œ

Route Table Entry: Destinationโ€™s address Next hop Sequence number (Destination node ์—์„œ ์ƒ์„ฑ )

Sequence number ์˜ค๋ž˜๋œ Entry ์™€ ์ƒˆ๋กœ์šด Entry ๋ฅผ ๊ตฌ๋ถ„ (Advertisement ํ•  ๋•Œ ๋งˆ๋‹ค s

equence num ์ฆ๊ฐ€ ) Destination ์—์„œ ํ• ๋‹น ( ์ง์ˆ˜ )

Page 7: ARAN Authenticated Routing for Ad hoc Networks

7Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing)

AA

BB

CCDD

EE

FF

II

GG HH

JJ

KK

Node F ๋Š” Source Node ๋Š” E Destination Node

RREQ Packet ๋ฅผ ๋ฐ›์€ ์ด์›ƒ Node ๋“ค์€ ์—ญ๊ฒฝ๋กœ๋ฅผ ๊ธฐ๋กํ•˜๊ณ  ์ด์›ƒ์—๊ฒŒ Broadcast ํ•จ

๊ทธ๋ฆผ 1.

Page 8: ARAN Authenticated Routing for Ad hoc Networks

8Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing)

AA

BB

CCDD

EE

FF

II

GG HH

JJ

KK

Node F ๋Š” Source Node ๋Š” E Destination Node ๊ทธ๋ฆผ 1.

RREQ Packet ๋ฅผ ๋ฐ›์€ Destination Node ์—ญ๊ฒฝ๋กœ๋กœ RREP Packet ๋ฅผ Unicast ํ•จ

Page 9: ARAN Authenticated Routing for Ad hoc Networks

9Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing)

AA

BB

CCDD

EE

FF

II

GG HH

JJ

KK

Node F ๋Š” Source Node ๋Š” E Destination Node ๊ทธ๋ฆผ 1.

ํ˜„ ๊ฒฝ๋กœ๊ฐ€ ์†์ƒ๋˜์–ด ๋๋‹จ Node ๊นŒ์ง€ ๋„๋‹ฌ ํ•  ์ˆ˜ ์—†๋‹ค๊ณ  ๊ฐ€์ •

Page 10: ARAN Authenticated Routing for Ad hoc Networks

10Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing)

AA

BB

CCDD

EE

FF

II

GG HH

JJ

KK

Node F ๋Š” Source Node ๋Š” E Destination Node ๊ทธ๋ฆผ 1.

์†์ƒ์ด ๋ฐœ๊ฒฌ๋œ ์‹œ์ ์—์„œ ์—ญ๊ฒฝ๋กœ๋ฅผ ํ†ตํ•ด RERR packet ์„ ์ „์†กํ•˜์—ฌ ๊ฒฝ๋กœ์˜ ์†์ƒ์„ ์•Œ๋ฆผ

Page 11: ARAN Authenticated Routing for Ad hoc Networks

11Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing)

AA

BB

CCDD

EE

FF

II

GG HH

JJ

KK

Node F ๋Š” Source Node ๋Š” E Destination Node ๊ทธ๋ฆผ 1.

RREQ packet ๋ฅผ broadcast ํ•˜์—ฌ ๋Œ€์ฒด ๊ฒฝ๋กœ๋ฅผ ํ™•๋ณดํ•จ

Page 12: ARAN Authenticated Routing for Ad hoc Networks

12Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing) Routing ์ด ๋ชฉ์ ์ธ AODV ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ทจ์•ฝ์ ์ด

์กด์žฌ

AODV Routing protocol ์˜ ์ทจ์•ฝ์  Modification

๊ณต๊ฒฉ์ž๋Š” routing messages ๋‚˜ control message ์™€ ๊ฐ™์€ ์ค‘์š” packet์„ ์œ„์กฐํ•˜๊ฑฐ๋‚˜ ์ˆ˜์ •ํ•˜์—ฌ Network ์— ์น˜๋ช…์ ์ธ ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ์Œ

Denial-of-service packet header ๋ฅผ ์ž„์˜๋กœ ์ˆ˜์ •ํ•จ์œผ๋กœ์จ , ์„œ๋น„์Šค - ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ์„

์œ ๋ฐœํ•จ , ๋ฌด๊ฒฐ์„ฑ ํ™•์ธ์— ๋Œ€ํ•œ ๋ฌธ์ œ์  ๋ฐœ์ƒ์‹œ ์ด packet ์ด ์ •๋‹นํ•œ packet ์ธ์ง€ ์•Œ ์ˆ˜๊ฐ€ ์—†์Œ

Impersonation MAC ๋‚˜ IP address ๋“ฑ์˜ ๋ณ€๊ฒฝ์„ ํ†ตํ•ด ์ธ์ฆ ๋ฐ›์€ Node ๋กœ ์‚ฌ์นญ ํ•  ์ˆ˜

์žˆ์Œ ์ด ๊ธฐ๋ฒ•์€ ์—ญ์ถ”์ ์ด ๋ถˆ๊ฐ€๋Šฅ

Page 13: ARAN Authenticated Routing for Ad hoc Networks

13Network & Information Security LabNetwork & Information Security Lab

2. RELATED WORK

2.2 AODV(Ad hoc On-Demand Distance Vector Routing) Solution

๊ฐ๊ฐ์˜ Node ๋“ค์€ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ Server ๋ฅผ ํ†ตํ•ด ์ธ์ฆ์„œ๋ฅผ ๋ฐœ๊ธ‰ ๋ฐ›์Œ Asymmetric key ๋ฅผ ํ†ตํ•ด date ์˜ ๊ธฐ๋ฐ€์„ฑ ์œ ์ง€ , ์„œ๋ช…์„ ํ†ตํ•ด ์‚ฌ์นญ์„ ๋ฐฉ์ง€ , ์ธ์ฆ์„œ๋ฅผ ํ†ตํ•ด ๊ฐ๊ฐ์˜ Node ๋“ค์ด ์ •๋‹นํ•˜๋‹ค๋Š” ๊ฒƒ์„ ์ž…์ฆํ•จ ์œ„ ๊ณผ์ •์„ ๋งค hop ๋งˆ๋‹ค ์ˆ˜ํ–‰ํ•˜์—ฌ ๊ฐ€์žฅ ์•ˆ์ „์„ฑ์ด ๋†’์€ ๊ฒฝ๋กœ๋ฅผ ํ™•๋ณด

Page 14: ARAN Authenticated Routing for Ad hoc Networks

14Network & Information Security LabNetwork & Information Security Lab

3. ARAN

ARAN(Authenticated Routing for Ad hoc Networks)

Asymmetric key ๋ฅผ ์ด์šฉํ•œ ์„œ๋ช…๊ณผ ์ธ์ฆ์„œ๋ฅผ ํ†ตํ•ด ๋งค Hop ๋งˆ๋‹ค ์ธ์ฆ๊ณผ์ •์„ ์ˆ˜ํ–‰ํ•ด ๊ฐ๊ฐ์˜ Node ๊ฐ„์— ์ธ์ฆ์„ ํ™•์ธํ•˜๋Š” ๊ธฐ๋ฒ•

ARAN ์˜ ์ˆ˜ํ–‰์š”์†Œ Certification Authenticated route discovery Authenticated route setup Route maintenance Key revocation

Page 15: ARAN Authenticated Routing for Ad hoc Networks

15Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.1 Certification of Authorized Nodes ์‹ ๋ขฐ์„ฑ์ด ์ž…์ฆ๋œ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ Server T ๊ฐ€ ์กด์žฌํ•œ๋‹ค๊ณ  ๊ฐ€์ • ์—ฌ๋Ÿฌ Node ๋“ค ์ค‘ ํ•˜๋‚˜์ธ A ๋Š” Server T ์—๊ฒŒ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰์„

์š”์ฒญํ•จ

Server T ๋Š” Node A ์—๊ฒŒ ์œ„์™€ ๊ฐ™์€ ๋‚ด์šฉ์„ ํฌํ•จํ•˜๋Š” packet ์„ T ์˜ ๊ฐœ์ธํ‚ค๋กœ ์„œ๋ช…ํ•˜์—ฌ ์ „์†ก

Node A ๋Š” ์‚ฌ์ „์— ํš๋“ํ•œ T ์˜ ๊ณต๊ฐœํ‚ค๋กœ T ์˜ ์„œ๋ช…์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Œ

certA A ์˜ ์ธ์ฆ์„œIPA A ์˜ IP

์ฃผ์†ŒKA+ A ์˜ ๊ณต๊ฐœํ‚คt timestemp

e ๋งŒ๋ฃŒ์‹œ๊ฐ„KT- T ์˜ ๊ฐœ์ธํ‚ค

AT

T->A :certA=[IPA ,KA+ ,t ,e] KT-

Page 16: ARAN Authenticated Routing for Ad hoc Networks

16Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.2 Authenticated Route Discover

๊ฐ๊ฐ์˜ Node ๋“ค์ด ์„œ๋กœ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ  , ์œ„์™€ ๊ฐ™์€ ๋ฐฉ๋ฒ•์œผ๋กœ Server T ๋กœ๋ถ€ํ„ฐ ์ธ์ฆ์„œ๋ฅผ ๋ฐœ๊ธ‰ ๋ฐ›์•˜๋‹ค๊ณ  ๊ฐ€์ •ํ•จ ,

Node A ๊ฐ€ Node X ์— ๋Œ€ํ•œ ๊ฒฝ๋กœ๋ฅผ ๊ฒ€์ƒ‰ํ•œ๋‹ค๊ณ  ๊ฐ€์ •ํ•œ๋‹ค๋ฉด

Node A ๋Š” ๋ชฉ์ ์ง€ X ์˜ IP, A ์˜ ์ธ์ฆ์„œ , A ์˜ ๋‚œ์ˆ˜ NA ๋ฅผ A ์˜ ๊ฐœ์ธํ‚ค๋กœ ์„œ๋ช…ํ•˜์—ฌ ์ด์›ƒ Node ๋“ค์—๊ฒŒ broadcast ํ•จ

NA ๋Š” Source Node ๊ฐ€ A ๋ผ๋Š” ๊ฒƒ์„ ์ง€์‹œํ•˜๋Š” ์ž„์‹œ๋ฒˆํ˜ธ์ž„

A B C D X

A->brdcst:[RDP, IPX, certA, NA, t] KA-

Page 17: ARAN Authenticated Routing for Ad hoc Networks

17Network & Information Security LabNetwork & Information Security Lab

3. ARAN

A ์˜ broadcast ๋ฅผ ๋ฐ›์€ Node B ๋Š” A ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ A์˜ ์„œ๋ช…์„ ํ™•์ธํ•œ ํ›„ Node B ๋Š” broadcast ๋œ packet ์˜ ์—ญ๊ฒฝ๋กœ๋ฅผ ์ €์žฅํ•จ

( B ์˜ ์—ญ ๊ฒฝ๋กœ๋Š” A)

Node B ๋Š” packet ์— B ์˜ ๊ฐœ์ธํ‚ค๋ฅผ ์‚ฌ์šฉํ•œ ์„œ๋ช…๊ณผ B ์˜ ์ธ์ฆ์„œ๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์ด์›ƒ Node ์—๊ฒŒ re-broadcast ํ•จ

B ์˜ broadcast ๋ฅผ ๋ฐ›์€ Node C ๋Š” B ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ B ์˜ ์„œ๋ช…์„ ํ™•์ธ

Node C ๋Š” broadcast ๋œ packet ์˜ ์—ญ ๊ฒฝ๋กœ๋ฅผ ์ €์žฅํ•จ (C ์˜ ์—ญ ๊ฒฝ๋กœ๋Š” B)

A B C D X

B->brdcst:[[RDP, IPX, certA, NA, t] KA-] KB-, certB

Page 18: ARAN Authenticated Routing for Ad hoc Networks

18Network & Information Security LabNetwork & Information Security Lab

3. ARAN

Node C ๋Š” packet ์— ์žˆ๋˜ C ์˜ ๊ฐœ์ธํ‚ค๋ฅผ ์‚ฌ์šฉํ•œ ์„œ๋ช…๊ณผ C ์˜ ์ธ์ฆ์„œ๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์ด์›ƒ Node ์—๊ฒŒ re-broadcast ํ•จ

C ์˜ broadcast ๋ฅผ ๋ฐ›์€ Node D ๋Š” C ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ C์˜ ์„œ๋ช…์„ ํ™•์ธ

Node D ๋Š” broadcast ๋œ packet ์˜ ์—ญ ๊ฒฝ๋กœ๋ฅผ ์ €์žฅํ•จ (D ์˜ ์—ญ ๊ฒฝ๋กœ๋Š” C)

A B C D X

C->brdcst:[[RDP, IPX, certA, NA, t] KA-] KC-,certC

Page 19: ARAN Authenticated Routing for Ad hoc Networks

19Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.3 Authenticated Route Setup Node A ๊ฐ€ ์ „์†กํ•œ RDP packet ์ด ๋ชฉ์ ์ง€์ธ Node X ์— ๋„๋‹ฌํ•˜๊ฒŒ

๋˜๋ฉด X ๋Š” REP packet ๋กœ Node ์—๊ฒŒ ์‘๋‹ตํ•จ RDP ์™€ ๋‹ฌ๋ฆฌ REP ๋Š” ์—ญ ๊ฒฝ๋กœ๋กœ Unicast ๋จ

Node A ์˜ IP, X ์˜ ์ธ์ฆ์„œ์™€ A ์˜ ๋‚œ์ˆ˜์— X ์˜ ๊ฐœ์ธํ‚ค ์„œ๋ช…๊ณผ ์ธ์ฆ์„œ๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์—ญ ๊ฒฝ๋กœ๋กœ Unicast ํ•จ

X ์˜ ์—ญ๊ฒฝ๋กœ๋Š” D

A B C D X

X->D:[REP,IPa,certX,Na,t] Kx-

Page 20: ARAN Authenticated Routing for Ad hoc Networks

20Network & Information Security LabNetwork & Information Security Lab

3. ARAN

Node D ๋Š” Node X ๊ฐ€ ์ „์†กํ•œ REP packet ์— X ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ X ์˜ ์„œ๋ช…์„ ํ™•์ธ

D ๋Š” packet ์— D ์˜ ๊ณต๊ฐœํ‚ค ์„œ๋ช…๊ณผ ์ธ์ฆ์„œ๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์—ญ ๊ฒฝ๋กœ๋กœ Unicast ํ•จ

D ์˜ ์—ญ ๊ฒฝ๋กœ๋Š” C

A B C D X

D->C:[[REP,IPa,certX,Na,t]Kx-]Kd,certD

Page 21: ARAN Authenticated Routing for Ad hoc Networks

21Network & Information Security LabNetwork & Information Security Lab

3. ARAN

Node C ๋Š” Node D ๊ฐ€ ์ „์†กํ•œ REP packet ์— D ์˜ ๊ณต๊ฐœํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ D ์˜ ์„œ๋ช…์„ ํ™•์ธ

C ๋Š” packet ์— C ์˜ ๊ณต๊ฐœํ‚ค ์„œ๋ช…๊ณผ ์ธ์ฆ์„œ๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์—ญ ๊ฒฝ๋กœ๋กœ Unicast ํ•จ

C ์˜ ์—ญ ๊ฒฝ๋กœ๋Š” B

์œ„์™€ ๊ฐ™์€ ๊ณผ์ •์„ ๋ฐ˜๋ณตํ•˜์—ฌ Node A ์— ๋„๋‹ฌํ•˜๋ฉด ๊ฒฝ๋กœ ํ™•๋ณด ์™„๋ฃŒ

A B C D X

C->B:[[REP,Ipa,certX,Na,t]Kx-]Kc-,certC

Page 22: ARAN Authenticated Routing for Ad hoc Networks

22Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.4 Route Maintenance ๊ฒฝ๋กœ ์œ ์ง€ ๋ฐ ์†์‹ค์— ๋Œ€ํ•œ ๊ธฐ๋ฒ•์€ ๊ธฐ์กด์˜ AOVD ์™€ ์œ ์‚ฌํ•œ

๊ณผ์ •์„ ์ˆ˜ํ–‰ํ•˜์ง€๋งŒ , ๊ฐœ์ธํ‚ค ์„œ๋ช…๊ณผ ์ธ์ฆ์„œ ๊ธฐ๋ฒ•์„ ํ•จ๊ป˜ ์‚ฌ์šฉ A ์™€ X ๊ฐ„์— date ์ „์†ก ์ค‘ ๊ทธ๋ฆผ๊ณผ ๊ฐ™์ด ๊ฒฝ๋กœ ์†์ƒ์ด ๋ฐœ์ƒํ–ˆ๋‹ค๊ณ 

๊ฐ€์ •

AODV ์ฒ˜๋Ÿผ ERR packet ๋ฅผ ๊ฐ๊ฐ์˜ ์—ญ ๊ฒฝ๋กœ Node ์—๊ฒŒ Unicastํ•˜์—ฌ ๊ฒฝ๋กœ๊ฐ€ ์†์ƒ๋œ ๊ฒƒ์„ ์•Œ๋ฆผ

A B C D X

Page 23: ARAN Authenticated Routing for Ad hoc Networks

23Network & Information Security LabNetwork & Information Security Lab

3. ARAN

Node C ๋Š” A ์™€ X ๊ฐ„์˜ ๊ฒฝ๋กœ๊ฐ€ ์†์ƒ๋˜์—ˆ๋‹ค๋Š” ๊ฒƒ์„ ์ง€์‹œํ•˜๋Š” ERR packet ์— C ์˜ ๋‚œ์ˆ˜ NC, ๊ณต๊ฐœํ‚ค ์„œ๋ช… , ์ธ์ฆ์„œ๋ฅผ ํฌํ•จํ•˜์—ฌ ์—ญ ๊ฒฝ๋กœ์ธ B ์—๊ฒŒ Unicast ํ•จ

Node B ๋Š” C ์˜ ๊ณต๊ฐœํ‚ค๋กœ ์„œ๋ช…์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Œ ์ฐจํ›„ ์œ„ ๊ณผ์ •๊ณผ ๊ฒฝ๋กœํƒ์ƒ‰ ๊ณผ์ •์„ ๊ฑฐ์ณ ๋Œ€์ฒด ๊ฒฝ๋กœ๋ฅผ ํƒ์ƒ‰ํ•จ

A B C D X

C->B:[ERR,IPa,IPx,certC,NC,t]KC-

Page 24: ARAN Authenticated Routing for Ad hoc Networks

24Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.5 Key Revocation ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ Server ์ธ T ๋Š” ๊ณต๊ฐœํ‚ค์˜ ๊ต์ฒด๋‚˜ ์ธ์ฆ์„œ์˜

์œ ํšจ๊ธฐ๊ฐ„ ๋งŒ๋ฃŒ์— ์˜ํ•ด Network ์ƒ์˜ Node ๋“ค์—๊ฒŒ revoke packet์„ broadcast

revoke packet ์€ Server T ์˜ ๊ฐœ์ธํ‚ค๋กœ ์„œ๋ช…

broadcast ๋ฅผ ๋ฐ›์€ Node ๋Š” T ์˜ ๊ณต๊ฐœํ‚ค๋กœ ์„œ๋ช…์„ ํ™•์ธ ์ฃผ๋ณ€ ์ด์›ƒ Node ๋“ค์—๊ฒŒ re-broadcast ํ•˜์—ฌ revoke packet ๋ฅผ ์ „์†ก ์ธ์ฆ์„œ์™€ ๊ณต๊ฐœ / ๊ฐœ์ธ ํ‚ค์˜ revoke

TT

T-> brdcst : [revoke,certR] Kt-

Page 25: ARAN Authenticated Routing for Ad hoc Networks

25Network & Information Security LabNetwork & Information Security Lab

3. ARAN

3.6 Potential Optimizations ARAN ์€ ๋ฐ˜๋ณต์ ์ธ Asymmetric key ๋ฅผ ์‚ฌ์šฉํ•œ secure routing ์„

์ˆ˜ํ–‰ํ•˜๋ฏ€๋กœ computational overhead, power consumption ๋ฅผ ์œ ๋ฐœ

session key ๋ฅผ ์ด์šฉํ•œ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉ ์ผ๋ฐ˜์ ์œผ๋กœ symmetric key ๋ฅผ ์‚ฌ์šฉ ๊ฐ๊ฐ์˜ Node ๊ฐ„์˜ ์ธ์ฆ ์ดํ›„ Node ๊ฐ„ session key ๋ฅผ ๊ณต์œ  ๋ฌด๊ฒฐ์„ฑ ์ธ์ฆ์ผ ์œ„ํ•ด hash chain ๊ธฐ๋ฒ•์„ ๋ณ‘ํ–‰ํ•  ์ˆ˜ ์žˆ์Œ

Page 26: ARAN Authenticated Routing for Ad hoc Networks

26Network & Information Security LabNetwork & Information Security Lab

4. CONCLUSION

์žฅ์  ๊ธฐ๋ฐ€์„ฑ ํ™•๋ณด ์ธ์ฆ์„œ๋ฅผ ์ด์šฉํ•œ ์ƒํ˜ธ๊ฐ„์˜ ์ธ์ฆ Asymmetric key ์˜ ๊ฐœ์ธํ‚ค๋ฅผ ์ด์šฉํ•œ ์„œ๋ช…

๋‹จ์  Asymmetric key ๋ฅผ ์ด์šฉํ•œ ์•”ํ˜ธํ™”๋กœ ์ธํ•ด ์ž์›์†Œ๋ชจ ์ฆ๊ฐ€ ์ถฉ๋ถ„ํ•œ ์ˆ˜์˜ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ ์„œ๋ฒ„๊ฐ€ ํ•„์š”

Page 27: ARAN Authenticated Routing for Ad hoc Networks

27Network & Information Security LabNetwork & Information Security Lab

์ฐธ๊ณ ๋ฌธํ—Œ A Secure Routing Protocol for Ad Hoc Networks A Secure Protocol for Ad hoc Networks Ad hoc On-Demand Distance Vector Routing