05.05.2014 Views

On the Implementation Code of the Secure Mesh Routing Protocol ...

On the Implementation Code of the Secure Mesh Routing Protocol ...

On the Implementation Code of the Secure Mesh Routing Protocol ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Workshop on OMNeT++<br />

<strong>Code</strong> Contribution<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong><br />

<strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Mohamad Sbeiti and Christian Wietfeld<br />

05.03.2013<br />

Faculty <strong>of</strong> Electrical and Computing Engineering<br />

Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. Christian Wietfeld


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Sample Use Case <strong>of</strong> Wireless <strong>Mesh</strong> Networks<br />

Toxic and<br />

Explosive Gas<br />

Burning Hall<br />

<strong>Mesh</strong> Router<br />

Unmanned Aerial Vehicle<br />

Rescue Van –<br />

<strong>Mesh</strong> Gateway<br />

Flight Trajectory<br />

Fire Fighter<br />

<strong>Mesh</strong> Link<br />

Malicious Node<br />

Incident Scene<br />

Wormhole Tunnel<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 2


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Sample Use Case <strong>of</strong> Wireless <strong>Mesh</strong> Networks<br />

o<br />

o<br />

<strong>Mesh</strong> Router<br />

Toxic and<br />

Explosive Gas<br />

Lack <strong>of</strong> efficient security Burning Hall mechanisms in wireless mesh<br />

networks especially with respect Unmanned to routing Aerial attacks Vehicle such<br />

as wormhole<br />

à Design <strong>of</strong> PASER<br />

Lack <strong>of</strong> implementations <strong>of</strong> security mechanisms in<br />

OMNeT++<br />

Flight Trajectory<br />

Fire Fighter<br />

à Contribution <strong>of</strong> <strong>the</strong> PASER code<br />

<strong>Mesh</strong> Link<br />

Rescue Van –<br />

<strong>Mesh</strong> Gateway<br />

PASER:= Position Aware <strong>Secure</strong> and Efficient <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> Malicious Node<br />

Incident Scene<br />

Wormhole Tunnel<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 3


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Overview <strong>of</strong> <strong>the</strong> <strong>Implementation</strong> Design <strong>of</strong> PASER in<br />

OMNeT++<br />

<strong>Implementation</strong> Goals<br />

o Performance evaluation<br />

o Low-effort optimization<br />

o Verfication <strong>of</strong> <strong>the</strong><br />

protocol robustness<br />

against well-known<br />

attacks<br />

o Portable code:<br />

External Support Library<br />

Cryptographic<br />

Operations<br />

Route Discovery<br />

Add Route /<br />

Release Packets<br />

OpenSSL API<br />

Sign / Encrypt / Hash<br />

PASER Data Structures and Support Library<br />

Configuration<br />

Route Request /<br />

Route Reply /<br />

Key Block Req. /<br />

Rep.<br />

Message<br />

Structure<br />

<strong>Routing</strong> and Neighbour Tables<br />

PASER Logic<br />

Update Timeouts<br />

Timer Management<br />

Hello<br />

Delete Route<br />

Socket<br />

Key Distribution Center (KDC)<br />

Module<br />

Message<br />

Buffer<br />

KDC Server<br />

Socket<br />

Message<br />

Processing<br />

Support Functions<br />

Route Maintenance<br />

Add Route /<br />

Delete Route /<br />

Release Packets<br />

Route Error /<br />

Route Refresh<br />

Key Block Request / Reply<br />

Route Request /<br />

Route Error /<br />

Route Refresh /<br />

PASER Messages<br />

Add Route /<br />

Delete Route /<br />

PASER Messages /<br />

Released Packets<br />

IP Networking Subsystem<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 4


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Validation Setup – Static Scenario<br />

Malicious Node<br />

Wormhole tunnel<br />

Simulation: 209 m<br />

Indoor:-49 dBm<br />

Simulation: 204 m<br />

Indoor:-46 dBm<br />

1 Source<br />

2 Destination 3<br />

Simulation<br />

WLAN Type Application Data Rates<br />

[Mbit/s]<br />

Experimental<br />

RoBoard RB-110 (1GHz<br />

CPU, 256MB RAM) - Iperf<br />

IEEE 802.11 g<br />

IBSS<br />

UDP-CBR 5<br />

Channel Model<br />

Simulation Time<br />

[s]<br />

# Runs<br />

Nakagami<br />

m= 9<br />

100 10<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 5


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Validation Results<br />

Malicious Node<br />

Wormhole tunnel<br />

Simulation: 209 m<br />

Indoor:-49 dBm<br />

Simulation: 204 m<br />

Indoor:-46 dBm<br />

1 Source<br />

2 Destination 3<br />

Goodput<br />

Goodput<br />

Without wormhole attack<br />

With wormhole attack<br />

è Experimental measurements validate to a large extent simulation results<br />

è PASER is robust against wormhole attack<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 6


Communication Networks Institute<br />

Pr<strong>of</strong>. Dr.-Ing. C. Wietfeld<br />

Thank you for your attention<br />

JOIN US: www.PASER.info<br />

“Good and (secure) communication is as stimulating as black c<strong>of</strong>fee,<br />

and just as hard to sleep after."<br />

- Anne Morrow Lindbergh -<br />

Mohamad Sbeiti<br />

<strong>On</strong> <strong>the</strong> <strong>Implementation</strong> <strong>Code</strong> <strong>of</strong> <strong>the</strong> <strong>Secure</strong> <strong>Mesh</strong> <strong>Routing</strong> <strong>Protocol</strong> PASER in OMNeT++: The Big Picture<br />

Slide 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!