18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

data, such as the no<strong>de</strong>s’ secret parameters, which are encrypted with the gateway’s public<br />

key. Finally, since we assume computer-boun<strong>de</strong>d adversaries, and thus cannot break<br />

into symmetric or asymmetric cryptosystems, it can be claimed that data confi<strong>de</strong>ntiality<br />

is secure.<br />

In or<strong>de</strong>r to enhance anonymity, we enforce the use of non-<strong>de</strong>terministic routes<br />

for packet routing. In the access and uplink phases, each mesh no<strong>de</strong> randomly forwards<br />

carriers to one of the hops in its range. After r hops, carriers have travelled through a<br />

random route. Any attempt of manipulating the route part of the carrier is easily verified<br />

by the gateway by checking the no<strong>de</strong>s’ shared key against the onioned data. Having non<strong>de</strong>terministic<br />

route make it difficulty for an adversary, even for a global one, to target<br />

specific no<strong>de</strong>s in privacy attacks In the downlink phase, routes for message <strong>de</strong>livery are<br />

properly selected by the gateway, so that they are different for each downlink session.This<br />

approach makes the downlink route also non-<strong>de</strong>terministic, in the sense that no one, but<br />

the gateway, knows the entire route; no<strong>de</strong>s only know their previous and next hops. Non<strong>de</strong>terministic<br />

routes approach also turns infeasible the so-called intersection attack, the<br />

main problem of WuLi’s protocol. WuLi’s solution reveals the ring’s ID inclu<strong>de</strong>d in<br />

every packets. As their topology is fixed, the intersection attack becomes viable. In our<br />

protocol, is difficulty to correlate the web activities observed at the gateway with specific<br />

mesh no<strong>de</strong>s, since they are not inclu<strong>de</strong> in <strong>de</strong>terministic routing paths.<br />

The protocol is secure against a global outsi<strong>de</strong>r which may cooperate with a small<br />

number of insi<strong>de</strong>rs. In this context, a number of attacks could be launched aiming at<br />

breaching mesh user’s privacy. An attacker could, for example, record the no<strong>de</strong>s’ encrypted<br />

secret parameters from previous access or uplink sessions. Then the attacker may<br />

then try to reuse them in a replay attack. This would allow the adversary to control the<br />

length of the route and thus weakening the anonymous communication protocol. The adversary<br />

could, in<strong>de</strong>ed, perform this. However the attack will not be successful, as the first<br />

part of the data carrier(the onioned data) requires encryption which requires the knowledge<br />

of the no<strong>de</strong>’s shared key. When the carrier returns to the gateway, a broken carrier<br />

can be easily verified, by checking each onion layer. This kind of attack may only be<br />

successful if the attacker controls at least r − 1 no<strong>de</strong>s in the network, where r is the previously<br />

<strong>de</strong>fined length of the route. In this scenario, the attacker could intentionally forward<br />

the carrier to the compromised no<strong>de</strong>s and lastly forward to a target no<strong>de</strong>. Hence r should<br />

be large enough to avoid this kind of attack, but shall not be so large, as the carrier’s size<br />

increases along the route.<br />

4. Related Work<br />

Anonymity in Wireless Mesh Networks has gained attention in the literature. Wu<br />

and Li <strong>de</strong>signed a robust protocol to protect against aggressive global adversaries<br />

[Wu and Li 2006]. They employ both cryptography and redundancy to protect against<br />

traffic analysis and flow tracing attacks. However, their Private Onion Ring protocol<br />

is mainly vulnerable to the so-called intersection attack. To overcome this problem,<br />

[Li et al. 2009] proposed a new protocol based on a multilayer onion ring approach. In<br />

[Wu et al. 2006], the authors propose the use of multi-path communication to achieve privacy.<br />

However, the protocol cannot <strong>de</strong>fend against a powerful global attacker who is able<br />

to observe most traffic in the network.<br />

Another solution related to ours is the one proposed in [Islam et al. 2008], where<br />

347

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!