Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
NDN in Local Area Networks Junxiao Shi The University of Arizona
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Ross Anderson Haowen Chan Adrian Perrig University of Cambridge Carnegie Mellon Uni.Carnegie Mellon Uni. Presented by EMRAH ATILGAN Key Infection: Smart.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Group #1: Protocols for Wireless Mobile Environments.
From the Eternity Service to Suicide Bombing – a Short History of Ad-hoc Network Security Ross Anderson Cambridge.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Key Infection: Smart Trust for Smart Dust Presented by Sree P. Kollipara By Ross Anderson, Haowen Chan, Adrain Perrig.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Wireless Ad Hoc Networks
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Mobile ad hoc networking: imperatives and challenges
SPINS: Security Protocols for Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SPINS: Security Protocols for Sensor Networks
Presentation transcript:

Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)

Sensor Networks  100s to 1000s of cheap sensor nodes  Communicate peer-to-peer and route information to base stations  Example: Sensors could be scattered by air to monitor pollution - or track people

Typical Sensor Node Characteristics  Wireless communication  Battery powered  Immobile  Not tamper-resistant  Limited processing hardware and memory  Communicate peer-to-peer and route data to one or more base stations

Platform Technologies: UCB Mote  UCB Mote Evolution

Approaches to Key Distribution  Attempt #1: Use a PKI Problem: Too computationally intensive  Attempt #2: Use a single symmetric master key Problem: Single node capture exposes entire network  Attempt #3: Load each node with key for each neighbour Problem: Don’t know neighbours a priori  Attempt #4: Load each node with many keys (n-1 keys/node, or fancier randomised scheme) Problem: Memory cost too high

Threat Model  Attacker deploys white dust to monitor an area  Defender has a few black dust motes already, rapidly deploys more, and sends in ‘insects’ that reverse-engineer some white motes  Passive defense: see what movements yield sensor traffic  Active defense: transmit jamming / deceptive messages  Example: corrupt routing to partition network

Defender Model  During the deployment phase, we have a partial, passive defender - some links monitored but no jamming / flooding / physical attack  After deployment, the gloves come off! The defender is pervasive and active  Often reasonable because of economics: white can deploy dust anywhere while black must defend everywhere

Basic Idea  Suppose all nodes share an initial master key, and use this to bootstrap link keys  Once the reverse-engineering insect arrives, the enemy gets the master key  The enemy can now eavesdrop all the links it monitored  But it could only monitor a small fraction of them! We may still be OK  This is equivalent to broadcasting initial keys locally, and in the clear

Key Infection  Assume that mote i, when it comes to rest, transmits a key ki  When mote j hears it, it responds with a pairwise key, using only just enough power for the link: j -> i : { j, k ji } ki i j The key is compromised if a hostile mote lies in the intersection of the two circles i E.g, 1 black mote for 100 white % of links secure

Key Whispering  First improvement - instead of broadcasting ki at full power, whisper it - increase volume until response heard  In other words, whispering already reduces compromised links by 2/3 d1% basic1% whisper3% basic3% whisper 21.13%0.40%3.48%1.19% 31.75%0.61%5.06%1.81% 42.38%0.83%6.75%2.44% 52.92%1.01%8.40%3.02%

Key Capture Enemy / subverted nodes  Neither node A or node B was captured, but their shared key has been exposed Keys of node A Keys of node B

Multipath Privacy Amplification  If i talks via j to k, and link jk compromised, find any other paths, e.g., i -> l -> k, set up keys k ik along all available paths, and hash them together  This gets a further significant reduction in compromised links: d1% basic1% multipath 3% basic3% multipath 20.61%0.38%2.23%1.11% 30.55%0.26%1.76%0.91% 40.40%0.16%1.57%0.80% 50.35%0.04%1.29%0.40%

Interaction with Routing  Even with no mobility, the network topology will change as a result of battery exhaustion / attacks  White may invest in preparing for failover - multipath key establishment helps  Many interesting questions, e.g. energy efficiency, clubbing, different logical paths on same physical path…

Other Applications (1)  Peer-to-peer systems typically start out optimistically with a large number of hopefully trustworthy nodes  ‘Black’ nodes join once the network starts to operate, and ‘white’ nodes may be subverted (e.g., by court order)  Here too the issue isn’t the initial key bootstrapping, but resilience in the face of what happens later

Other Applications (2)  Subversive networks are similar. Law enforcement can only monitor so many people, and so many phones…  Once subversive activity manifests, the task is to penetrate a network that may have been fairly open at the start, but has now closed up  Again, the important aspect is not the initial bootstrapping, but the subsequent lockdown, and any associated resilience

Security Economics  Economics provide the big showstopper for security in general  Here, the game depends on both initial and marginal costs of attack and defence  Initial keying increases initial cost to both  Equilibrium depends on marginal costs - defender efforts vs attacker resilience  Logically, defender will give up, or attacker have to go all out to maintain network  Attacker will logically make marginal investment in resilience, not bootstrapping

Research Problems  What are the relative costs of key establishment vs. maintenance in different types of network?  What are the best attack and defence strategies at equilibrium?  What’s the interaction with routing algorithms?  Can you deal with new motes joining?  Can you have multiple virtual networks (‘United Nations Dust’)?  Can multiple users interact locally (‘Neighbourhood Watch Dust’)?

Conclusions  Sensor networks present interesting and novel protection problems  They provide a tractable model for bigger problems, from P2P network design to some real-world policing problems  Challenge the conventional wisdom that authentication is about trust bootstrapping  In many real social networks, trust is more about group reinforcement / bonding  Will future pervasive computing systems be command-and-control, or societal?