Physical Layer Security

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

A Mobility Model for Studying Wireless Communication Raymond Greenlaw Armstrong Atlantic State University Savannah, GA, USA Sanpawat Kantabutra Chiang.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
The Year 5/6 Science Quiz Part Two.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
HW for Chapter 3 Exercises: 38, 45, 47, 48.
(Data and Signals - cont)
CP2073 Networking Lecture 5.
Spoofing State Estimation
It all started simple…. One Alternator One Battery One Starter Motor.
Solid level measurement
IST 126 Transmission Media. Characteristics of Transmission Media Cost Ease of installation Bandwidth capacity – the amount of data that can be sent in.
Chapter 7 Transmission Media
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Conducted and Wireless Media (Part I) School of Business Eastern Illinois University © Abdou Illia, Spring 2014 (February 26, 2014)
Introduction to Network
Copyright © NDSL, Chang Gung University. Permission required for reproduction or display. Chapter 7 Transmission Media Tel: (03) Ext:
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 6 Introduction to Networks and the Internet.
Transmission Media T.Najah Al-Subaie Kingdom of Saudi Arabia
Computer Communication & Networks
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Fundamentals of Audio Production. Chapter 6. 1 Fundamentals of Audio Production Chapter Six: Recording, Storing, and Playback of Sound.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 3 Networking Media.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 7 Ethernet Technologies.
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu Wenbo Shen, Haojin Zhu 1.
IKCO Samand ABS System Presentation.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Introduction to Network (c) Nouf Aljaffan
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
1 Part II: Data Transmission The basics of media, signals, bits, carriers, and modems Fall 2005 Qutaibah Malluhi Computer Science and Engineering Qatar.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Physical Layer B. Konkoth.
Hardware Concepts Chapter 4.
Communication channels and transmission media
1 Electronics & Signals Honolulu Community College Cisco Academy Training Center Semester 1 Version
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Physical Transmission
MAGNETO OPTICAL CURRENT TRANSFORMER Presented By: Shivankit Bansal Final Year Electrical Deptt.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Implementations  Ethernet Networks  Wireless Networks.
Physical Transmission
Introduction to Network (c) Nouf Aljaffan
IST 126 Computer Networks Spring, What is a Computer Network? A group of computers and other devices that are connected together in order to share.
Transmission Media. Characteristics to consider for Media Selection Throughput Cost Installation Maintenance Obsolescence vs bleeding edge Support Life.
TOPIC 1.2 INTRODUCTION TO NETWORKING. OBJECTIVES By the end of the topic, students should be able to: a) List the elements of data communication systems.
LECTURE#6 - CABLES Asma AlOsaimi. Copper Coaxial Cable - Thick or Thin Unshielded Twisted Pair - CAT 3,4,5,5e&6 Optical Fiber Multimode Singlemode Wireless.
Attenuation is the loss of signal strength, for example, when cables exceed a maximum length. This means that a 1 bit voltage signal loses amplitude as.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Physical Transmission
Physical Transmission
Conducted and Wireless Media (Part I)
Physical Transmission
Defending against Search-based Physical Attacks in Sensor Networks
Physical Transmission
Computer Networks Topics: Twisted Pair and Fiber Optic Cable
An Overview of Security Issues in Sensor Network
Presentation transcript:

Physical Layer Security

Outline Overview Physical Security in Wired Networks Physical Security in Wireless Networks

Overview Networks are made up of devices and communication links Devices and links can be physically threatened Vandalism, lightning, fire, excessive pull force, corrosion, wildlife, wear-down, wiretapping, crosstalk, jamming We need to make networks mechanically resilient and trustworthy

3

How can two computers communicate? Encode information into physical “signals” Transmit those signals over a transmission medium

Types of Media Metal (e.g., copper): wired EM/RF (e.g., IEEE 802.11): wireless Light (e.g., optical fiber)

Outline Overview Physical Security in Wired Networks Threats and Physical Security in Wireless Networks Cryptography

Noise, Jamming, and Information Leakage When you move a conductor through a magnetic field, electric current is induced (electromagnetic induction) EMI is produced from other wires, devices Induces current fluctuations in conductor – Problem: crosstalk, conducting noise to equipment, etc 16

Physical Tapping Conductive Taps Inductive Taps Form conductive connection with cable Inductive Taps Passively read signal from EM induction No need for any direct physical connection Harder to detect Harder to do with non- electric conductors (e.g., fiber optics) 24

Tapping Cable: Countermeasures Physical inspection Physical protection E.g., encase cable in pressurized gas Use faster bitrate Monitor electrical properties of cable TDR: sort of like a hard-wired radar Power monitoring, spectrum analysis 25

Case Study: Submarine Cable (Ivy Bells) 1970: U.S. learned of USSR undersea cable Connected Soviet naval base to fleet headquarters Joint US Navy, NSA, CIA operation to tap cable in 1971 Saturation divers installed a 3-ft long tapping device Coil-based design, wrapped around cable to register signals by induction Signals recorded on tapes that were collected at regular intervals Communication on cable was unencrypted Recording tapes collected by divers monthly 26

Case Study: Submarine Cable (Ivy Bells) 1972: Bell Labs develops next-gen tapping device 20 feet long, 6 tons, nuclear power source Enabled No detection for over a decade Compromise to Soviets by Robert Pelton, former employee of NSA Cable-tapping operations continue Tapping expanded into Pacific ocean (1980) and Mediterranean (1985) USS Parche refitted to accommodate tapping equipment, presidential commendations every year from 1994-97 Continues in operation to today, but targets since 1990 remain classified 27

Protection against wildlife Rodents Moths Cicadas Ants Crows

Protection against wildlife Rodents (squirrels, rats, mice, gophers) Chew on cables to grind foreteeth to maintain proper length Insects (cicadas, ants, roaches, moths) Mistake cable for plants, burrow into it for egg laying/larvae Ants invade closures and chew cable and fiber Birds (crows, woodpeckers) Mistake cable for twigs, used to build nests Underground cables affected mainly by rats/termites, aerial cables by rodents/moths, drop cables by crows3,5 closures by ants

Countermeasures against wildlife Use High Strength Sheath cable PVC wrapping stainless steel sheath Performance studies on cable (gnathodynameter) Cable wrap Squirrel-proof covers: stainless steel mesh surrounded by PVC sheet Fill in gaps and holes Silicone adhesive Use bad-tasting cord PVC infused with irritants Capsaicin: ingredient in pepper spray, irritant Denatonium benzoate: most known bitter compound 36

Outline Overview Physical Security in Wired Networks Physical Security in Wireless Networks Cryptography

Physical Attacks in WSNs: What & Why? Physical attacks: destroy sensors physically Physical attacks are inevitable in sensor networks Sensor network applications that operate in hostile environments Volcanic monitoring Battlefield applications Small form factor of sensors Unattended and distributed nature of deployment Different from other types of electronic attacks Can be fatal to sensor networks Simple to launch Defending against physical attacks Tampering-resistant packaging helps, but not enough We propose a sacrificial node based defense approach to search-based physical attacks Physical attacks can permanently destroy the sensors, which are different from electronic attacks such as jamming attacks, which tries to interfere the radio channels and interrupt the sensor networks’ operation. Emphasize that physical attacks are simple to lunch.

Physical Attacks in WSNs – A General Description Two phases Targeting phase Destruction phase Two broad types of physical attacks: Blind physical attacks Search-based physical attacks

Blind Physical Attacks in WSNs Due to the brute-force destruction methods and blindly selecting attack areas

Search-Based Physical Attacks in WSNs It is hard for the attacker to get the exact location of the sensors, but it can isolate a relatively small area for each detection sensor.

Modeling Search-based Physical Attacks in WSNs Sensor network signals Passive signal and active signal Attacker capacities Signal detection Attacker movement Attacker memory Attack Model Attacker objective Attack procedure and scheduling Passive signals include heat, vibration, magnetic signals which are parts of the constant physical characteristics of the sensors. Active signals on the other hand include communication messages, beacons, query messages etc., that are part of normal communications between sensors in the network. Signal strength, active, passive signal detection range, active signal frequency cluster-head: large active signal detection range, cluster-head rotation frequency The cluster-head rotation is used to balance the power consumption and reduce the damage due to the destruction of the cluster-head Isolation/detection accuracy Attacker moving and destruction speed

Signal Detection di: Estimated distance θ: Isolation accuracy Direction/Angle of arrival πri2: Isolation/sweeping area ri =di * θ Attacker’s detection capacity is stronger than that of sensors

Network Parameters and Attacker Capacities f : Active signal frequency Rnoti: message transmission range Ra: The maximum distance the attacker is detected by active sensors Rs: Sensing range Rps: Max. distance for passive signal detection Ras: Max. distance for active signal detection v: Attacker moving speed M: Attacker memory size

Attacker Objective and Attack Procedure AC: Accumulative Coverage EL: Effective Lifetime, the time period before the coverage falls below a threshold α Objective: Minimize AC AC measures both coverage and lifetime of sensor networks. During the scheduling of attack activities, the attacker needs to choose between normal sensors and the cluster-head if the time cost to destroy them is same Need more time to reach cluster-heads and the corresponding sweeping areas are larger.

Discussions on Search-based Physical Attacks in WSNs Differentiate sensors detected by active/passive signals Sensors detected by passive signals are given preference Scheduling the movement when there are multiple detected sensors Choose sensors detected by passive signals first Choose the one that is closest to the attacker Optimal scheduling? Due the dynamics of the attack process, it is hard to get the optimal path in advance

Defending against Search-based Physical Attacks in WSNs Assumptions Sensors can detect the attacker or Destroyed sensors can be detected by other sensors Attacker’s detection capacity is stronger than sensors, but not unlimited A simple defense approach Our sacrificial node based defense approach

A Simple Defense Approach : Attacker : Sensor Rnoti s3 s7 Rnoti Rnoti s1 s4 s2 s6 s5

Our Defense Approach Adopting Sacrificial Nodes (sensors) to improve monitoring of the attacker and to increase the protection areas A sacrificial node is a sensor that keeps active in proximity of the attacker in order to protect other sensors at the risk of itself being detected and destroyed Attack Notifications from victim sensors States Switching of receiver sensors of Attack Notifications to reduce the number of detected sensors

Defense Protocol 1: receive AN, not be sacrificial node 2: receive AN, 3: not receive AN, receive SN 4: T1 expires 5: T2 or T3 expires 6: destroyed by attacker Sending (nonsacrificial node) Sensing (sacrificial node) Destroyed Sleeping 1 5 4 2 6 3

An Illustration of Our Defense Approach : Attacker : Sensor Rnoti s3 s7 Rnoti Rnoti s1 s4 s2 s6 s5

Discussions on Our Defense Protocol Trade short term local coverage for long term global coverage Sacrificial nodes compensate the weakness of sensors in attack detection Our defense is fully distributed Sacrificial node selection Who should be sacrificial nodes? State switching - timers When to switch to sensing/sleeping state to prevent detection? When to switch back to sensing/sending state to provide coverage?

Sacrificial Node Selection Principle The more the potential nodes protected can be, higher is the chance to be sacrificial node Solution Utility function u(i) is computed by each sensor based on local information Sensor i decides to be sacrificial node if u(i) ≥ Uth Uth = β * Uref (0<β<1); Uref = N * π * R2noti / S

Utility Function u(i) What is the basic idea of u(i)? The more nodes being protected, the larger u(i) is Overlap is discounted Distance matters Theorem 1: The utility function u(i) is optimal in terms of minimizing the expected mean square error between u(i) and uopt(i)

State Switching D(i): Random delay for SN message T(i): timers for states switching

Performance Evaluation Network parameters: S: 500 * 500 m2 N: 2000 α: 0.5 f: 1 / 60 second Rnoti: 20 m Ra: 0.1 m Rs: 10 m Attack parameters: Rps: 5 m Ras: 20 m v: 1 m/second M: 2000 Protocol parameters: β: 0.7 Δt: 0.01 second T: 20 seconds

Defense Effectiveness under Different Network Parameters

Defense Effectiveness under Different Attacker Parameters

Outline Physical Security in Wired Networks Tapping attacks Case studies Physical Security in Wireless Networks Physical attacks are patent and potent threats to sensor networks A Sacrificial Node-assisted approach to defend against physical attacks Cryptography

Acknowledgement These slides are partially from: Matthew Caesar’s slides on Physical Network Security: http://www.cs.illinois.edu/%7Ecaesar/courses/CS598.S13/slides/lec_02_physicallayer.pdf Dong Xuan’s slides on Physical Attacks in Wireless Sensor Networks http://www.cse.ohio-state.edu/~xuan/papers/05_mass_gwcxl.ppt