1 Jean-Pierre Hubaux EPFL/School of Information and Communication Secure Mobility.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Chris Karlof and David Wagner
By Md Emran Mazumder Ottawa University Student no:
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Hubaux Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING 1 Self-organization.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Cooperation between Nodes in Multi-Hop Wireless Networks Jean-Pierre Hubaux 1 Joint work with Naouel Ben Salem 1, Levente Buttyan 2, Srdjan Čapkun 1, Mark.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
1 Laboratory for Computer Communications and Application (LCA) Swiss Federal Institute of Technology (EPFL) Srdjan Čapkun joint work with Jean-Pierre Hubaux.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
NETWORK SECURITY.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Integrity-regions: Authentication Through Presence in Wireless Networks Srdjan Čapkun 1 and Mario Čagalj 2 1 Department of Computer Science, ETH Zurich.
Cryptography, Authentication and Digital Signatures
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Packet Leashes: Defense Against Wormhole Attacks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Lecture 36.
Lecture 36.
Presentation transcript:

1 Jean-Pierre Hubaux EPFL/School of Information and Communication Secure Mobility

2 Some security activities in MICS Secure software, secure applications Tamper-proof device-based security Protocol analysis (WTLS) Zero-infrastructure security Mobility Vs Security : - Mobility helps security - Provable encounters Last Encounter Routing Immune mobile systems Cooperation issues : - In multi-hop cellular networks - In pure ad hoc networks IP1 IP4 IP6 IP8 Trust in peer-to-peer systems IP5 Business aspects of security in mobile networks IP10

3 Provable encounters claimant certifier 1. Encounter claimant verifier 2. Proof of encounter Verification is: a posteriori frequent Verification is: a posteriori frequent claimant : a node claiming that it has met another node at a given time t certifier : a node that certified the encounter with the claimant verifier : a node that verifies the encounter between two nodes - Two scenarios : - any-to-any (typically mobile ad hoc networks, where any node can be a claimant, a verifier and a certifier) - any-to-one (typically hybrid ad hoc networks, where mobile nodes play roles of claimants and certifiers, and base stations perform verification) - Two building blocks : - Distance bounding - Proving the time of encounter

4 Applications of provable encounters  Secure protocols based on last encounter (e.g., Last Encounter Routing)  Topology tracking in multi-hop cellular networks (e.g, for misbehaviour detection)  Any service requiring to prove previous encounters, including their distance (e.g., liability issues in road traffic)  Distributed robotics  Prevention of wormhole attacks  …

5 General assumptions  Loose synchronization of the nodes clocks  Abilities of each node :  Measure time with a nanosecond precision  Perform cryptographic operations (generate keys, check signatures, compute hash functions,…)  No GPS receivers, no system providing location information  Presence of a centralized authority (off-line or on-line): assigns a unique, certified identity to each node  All nodes share pairwise secret keys (other options are possible)  The claimant and the verifier always authenticate each other at verification time

6 Authenticated distance bounding Similar issue: the Chess Grandmaster Problem Solution: Distance-Bounding Protocols (Brands and Chaum, Eurocrypt 1993) Related problem: Wormhole Attacks in ad hoc networks Proposed solution: Packet leashes (Hu, Perrig and Johnson, Infocom 2003) (based on precise clock synchronization or on location awareness) Alice Secret communication channel Authentication protocol Damien Bernard Carole Authentication protocol Location 1 Location 2 Mafia Fraud Attack (Y. Desmedt, 1988) :

7 Mutual Authentication with Distance Bounding (MAD) (1/2)  Our solution: MAD  Improvements wrt Brands and Chaum’s proposal:  Avoid public key cryptography  rely on MAC computations  Both nodes can measure the distance to the other node simultaneously  Assumption: special hardware module in each node  Can temporarily take over the control of the radio transceiver from the CPU  Able to respond to a one-bit challenge with a one-bit response

8 Mutual Authentication with Distance Bounding (MAD) (2/2)

9 Guaranteeing Encounter Freshness (GEF) (meaning at or before time t) 1. Initialization (at each node) V0V0 V1V1 V2V2 VNVN H H H 2. Network operation : disclose the values V i in reverse order Cert Cl 1 V Encounters : 1.1. Construct the hash chain : 1.2 Distribute V N to all other nodes 2.2. Verification (certifier authentication only, therefore called GEF-Ce) : Verif Cl 2 V 47 Cl 1 V 96 H N-47 (V 47 ) = V N ? Almost optimal hash sequence traversal: Coppersmith and Jakobsson, FC’02 If claimant authentication is also desired: each node produces n hash chains instead of one  GEF-CeCl Cl 2 V 47

10 Guaranteeing the Time of the Encounter (GTE) Purpose: The claimant can prove to the verifier that it met the certifier at the time t of the actual encounter (neither before nor later); Basic mechanism: only certifier authentication: GTE-Ce 1. Initialization Generation of N values (V 0 to V N ) Construction of the Merkle tree Deliver the root of the tree to all other nodes (in an authentic way) 2. Network operation 2.1 Encounters - At each time interval, the certifier broadcasts a V i with its siblings 2.2 Verification - Example : H(H(m 01 ||H(H(V 2 )||m 3 ))||m 47 ) = m 07 ?

11 The full solution : MAD + GTE-CeCl Encounter Proof of encounter

12 Attacks claimant certifier 1. Encounter claimant verifier 2. Proof of encounter Attack-Cl : deceive an honest verifier about previous encounters Attack-Ce : deceive a honest claimant about its identity or about the time of encounter Attack-V : deceive a honest verifier (to be met in the future) about previous encounters Attack-V : deceive a honest verifier (to be met in the future) about previous encounters

13 Resistance to attacks Resistant to Attacker-1-0 and Attacker-0-1 Resistant to Attacker-x-0 and Attacker-0-1 Resistant to Attacker-x-y Resistant to Attacker-1-0 and Attacker-0-1 Resistant to Attacker-x-0 and Attacker-0-1 Resistant to Attacker-x-y Resistant to Attacker-1-0 Resistant to Attacker-x-0 Resistant to Attacker-x-y GEF-Ce GTE-Ce GEF-CeCl GTE-CeCl With MAD Attack-Cl Attack-Ce Attack-V Other attacks: AttackClCe,… Attacker-x-y x : # owned nodes y : # compromised nodes Attacker-x-y x : # owned nodes y : # compromised nodes

14 Conclusion on Provable Encounters  Well-established cryptographic techniques can allow mobile nodes to prove their time and distance of encounters, at a very reasonable cost  Very first contribution to a novel and promising research area  Future work:  Study different mobility scenarios  Identify applications more precisely; examples: Single-hop wireless networks in which the Access Points are not (fully) trusted Intelligent Transport Systems S. Capkun, L. Buttyan, and J. P. Hubaux SECTOR : Secure Tracking of Node Encounters in Multi-hop Wireless Networks First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, October 2003

15 Mobility helps security Infrared link (Alice, PuK Alice, XYZ) (Bob, PuK Bob, UVW) Visual recognition, conscious establishment of a two-way security association Secure side channel -Typically short distance (a few meters) - Line of sight required - Ensures integrity - Confidentiality not required Alice Bob Problem : how to bootstrap security in a mobile network without a central authority ?

16 Friends mechanism IR Colin Bob (Colin’s friend) Alice (Alice, PuK Alice, XYZ) Colin and Bob are friends: They have established a Security Association at initialisation They faithfully share with each other the Security Associations they have set up with other users Colin and Bob are friends: They have established a Security Association at initialisation They faithfully share with each other the Security Associations they have set up with other users

17 Mechanisms to establish Security Associations Friendship : nodes know each others’ triplets Exchange of triplets over the secure side channel Two-way SA resulting from a physical encounter i j i knows the triplet of j ; the triplet has been obtained from a friend of i ifjifjifjifjijij a) Encounter and activation of the Secure Side Channel b) Mutual friend c) Friend + encounter Note: there is no transitivity of trust (beyond your friends)

18 Pace of establishment of the security associations (1/2) - Depends on several factors: - Area size - Number of communication partners: s - Number of nodes: n - Number of friends - Mobility model and its parameters (speed, pause times, …) Established security associations : Desired security associations : Convergence :

19 Pace of establishment of the security associations (2/2)

20 Conclusion on Mobility Helps Security Mobility can help security in mobile ad hoc networks, from the networking layer up to the applications The proposed solution also supports re-keying The proposed solution can easily be implemented with both symmetric and asymmetric cryptography S. Capkun, J. P. Hubaux, and L. Buttyan Mobility Helps Security in Ad Hoc Networks Fourth ACM Symposium on Mobile Networking and Computing (MobiHoc), Annapolis, June 2003

21 Conclusion  Security in mobile and wireless networks is a major research area  MICS has pioneered the exploration of mobility Vs. security  MICS is strongly committed to make further fundamental contributions