Security for Sensor Networks: Cryptography and Beyond David Wagner University of California at Berkeley In collaboration with: Chris Karlof, David Molnar,

Slides:



Advertisements
Similar presentations
TinySec: Security for TinyOS C. Karlof, N. Sastry, D. Wagner November 20, 2002.
Advertisements

Chris Karlof and David Wagner
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Cellphone Security David Wagner U.C. Berkeley. Cellular Systems Overview  Cellphone standards from around the world: North America AnalogAMPS DigitalCDMA,
Trust relationships in sensor networks Ruben Torres October 2004.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Wireless Security Why Swiss-Cheese Security Isn’t Enough David Wagner University of California at Berkeley.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Wireless Security David Wagner University of California at Berkeley.
Wireless Security David Wagner University of California, Berkeley.
TinySec: Security for TinyOS Chris Karlof Naveen Sastry David Wagner January 15, 2003
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam.
Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner SenSys 2004.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner Presented by Paul Ruggieri.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Chris Karlof, David Wagner Presented by Michael Putnam
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Chris Karlof David Wagner University of Califonia at Berkeley
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
TinySec: Performance Characteristics Chris K :: Naveen S :: David W January 16, 2004.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
WLAN What is WLAN? Physical vs. Wireless LAN
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Security Considerations for IEEE Networks Karthikeyan Mahadevan.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Security for Sensor Networks: Cryptography and Beyond David Wagner University of California at Berkeley In collaboration with: Chris Karlof, David Molnar,
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Security in WSN Vinod Kulathumani West Virginia University.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Chapter 14 Network Encryption
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
TinySec: Security for TinyOS
Security Of Wireless Sensor Networks
Wireless Security Why Swiss-Cheese Security Isn’t Enough
Security of Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Security for Sensor Networks: Cryptography and Beyond David Wagner University of California at Berkeley In collaboration with: Chris Karlof, David Molnar, Naveen Sastry, Umesh Shankar

Learn From History… analog cellphones: AMPS analog cloning, scanners  fraud pervasive & costly digital: TDMA, GSM TDMA eavesdropping [Bar] more TDMA flaws [WSK] GSM cloneable [BGW] GSM eavesdropping [BSW,BGW] Future: 3 rd gen.: 3GPP, … cellphones , WEP WEP broken [BGW] WEP badly broken [FMS] WPA Future: i 2003  attacks pervasive wireless networks Berkeley motes 2002 TinyOS 1.0 TinyOS 1.1, TinySec 2003 sensor networks Let’s get it right the first time!

Sensor Nets: So What? What’s different about sensor nets? Stringent resource constraints Insecure wireless networks No physical security Interaction with the physical environment Back to the 90’sNewBack to the 70’s

Where Are We Going? Some research challenges in sensor net security: Securing the communication link Securing distributed services Tolerating captured nodes In this talk: Techniques and thoughts on these problems.  Cryptography and beyond

I. Communications Security: The TinySec Architecture “It doesn’t matter how good your crypto is if it is never used.”

TinySec Design Philosophy The lesson from : Build crypto-security in, and turn it on by default! TinySec Design Goals: 1. Encryption turned on by default 2. Encryption turned on by default 3. Encryption turned on by default  Usage must be transparent and intuitive  Performance must be reasonable 4. As much security as we can get, within these constraints

Challenges Must avoid complex key management TinySec must be super-easy to deploy Crypto must run on wimpy devices We’re not talking 2GHz P4’s here! Dinky CPU (1-4 MHz), little RAM (  256 bytes), lousy battery Public-key cryptography is right out Need to minimize packet overhead Radio is very power-intensive: 1 bit transmitted  1000 CPU ops TinyOS packets are  28 bytes long Can’t afford to throw around an 128-bit IV here, a 128-bit MAC there

Easy Key Management networ k base station k k k k k k Making key management easy: global shared keys

Be Easy to Deploy Making deployment easy: plug-n-play crypto + link-layer security SecureGenericComm App Radio GenericComm App Radio

Perform Well on Tiny Devices Use a block cipher for both encryption & authentication Skipjack is good for 8-bit devices; low RAM overhead Radio Stack [MicaHighSpeedRadioM/ CC1000RadioIntM] TinySecM CBC-ModeM SkipJackM CBC-MACM

Minimize Packet Overhead Minimize overhead: cannibalize, cheat, steal dest AM IV len dataMAC Encrypted MAC’ed Key Differences No CRC -2 bytes No group ID -1 bytes MAC +4 bytes IV +4 bytes Total: +5 bytes

Tricks for Low Overhead CBC mode encryption, with encrypted IV Allows flexible IV formatting: 4 byte counter, + cleartext hdr fields (dest, AM type, length); gets the most bang for your birthday buck IV robustness: Even if IV repeats, plaintext variability may provide an extra layer of defense Ciphertext stealing avoids overhead on variable-length packets CBC-MAC, modified for variable-length packets Small 4-byte MAC trades off security for performance; the good news is that low-bandwidth radio limits chosen-ciphertext attacks Can replace the application CRC checksum; saves overhead On-the-fly crypto: overlap computation with I/O

More Tricks & Features Early rejection for packets destined elsewhere Stop listening & decrypting once we see dst addr  us Support for mixed-mode networks Interoperable packet format with unencrypted packets, so network can carry both encrypted + unencrypted traffic Crypto only where needed  better performance Length field hack: steal 2 bits to distinguish between modes Support fine-grained mixed-mode usage of TinySec Add 3 settings: no crypto, integrity only, integrity+secrecy These come with performance tradeoffs Select between settings on per-application or per-packet basis

More Performance Tricks App-level API for end-to-end encryption TinySec focuses mainly on link-layer crypto, but end-to-end crypto also has value End-to-end secrecy enables performance optimizations (don’t decrypt & re-encrypt at every hop), enables more sophisticated per-node keying, but incompatible with in-network transformation and aggregation; thus, not always appropriate End-to-end integrity less clear-cut, due to DoS attacks

TinySec: Current Status Design + implementation stable Released in TinyOS 1.1 Integration with RFM & Chipcon radio stacks; supports nesC 1.1 Simple key management; should be transparent Several external users Including: SRI, BBN, Bosch

TinySec Evaluation Wins: Performance is ok Integration seems truly easy Neutral: Out of scope: per-node keying, re-keying, sophisticated key mgmt; PKI; secure link-layer ACKs No security against insider attacks; What if a node is captured, stolen, or compromised? Losses: Not turned on by default in TinyOS yet 

II. Communications Security: What Crypto Can’t Do “If it’s provably secure, it’s probably not.” -- Lars Knudsen

Limitations of Crypto Can’t prevent traffic analysis Can’t prevent re-transmitted packets Can’t prevent replayed packets Can’t prevent delayed packets Can’t prevent packets from being jammed Can’t prevent malicious insiders, captured nodes Crypto is not magic fairy dust; It won’t magically make insecure services secure.

Isn’t Crypto All We Need? Crypto doesn’t automatically make X secure, where: X = network programming Attacker could replay old programs X = time synchronization Attacker could delay beacon packets, propagating wrong timing X = routing Some attacks on next slide X = localization Attack in three slides X = aggregation Attacks after a few more slides

Example: Attacks on Routing Hello flood attack: Broadcast really loudly; then everyone will think you are near them. Wormhole attack: Tunnel packets from one part of the network and replay them in a different part.

Protocols analyzed in [KW03] ProtocolRelevant attacks TinyOS beaconingBogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Directed diffusion and multipath variant Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Geographic routing (GPSR,GEAR) Bogus routing information, selective forwarding, Sybil Minimum cost forwardingBogus routing information, selective forwarding, sinkholes, wormholes, HELLO floods Clustering based protocols (LEACH,TEEN,PEGASIS) Selective forwarding, HELLO floods Rumor routingBogus routing information, selective forwarding, sinkholes, Sybil, wormholes Energy conserving topology maintenance Bogus routing information, Sybil, HELLO floods All are insecure

III. Interacting With The Environment: Location Verification “Where ever you go, there you are.”

Lightning How far away was the lightning? Count, then divide by 5…

Location Determination How far away is Alice? Have her transmit & chirp; measure elapsed time radio sound Alice took 100 ms; Alice must be ≈ 33 m away

The Ventriloquist Attack Alice is malicious; she wants to seem nearby Attack: Chirp in advance, wait a little, then transmit radio sound Alice ghost image Effect: Alice is able to lie about her location. took 3 ms; Alice must be ≈ 1 m away

The Echo Protocol Secure location verification Add a challenge-response, and Alice can’t chirp early sound: N Alice Result: Alice can no longer lie about her location. took 100 ms; Alice must be ≥33 m away Protocol: radio: N 1. V  A: N 2. A  V: N

Secure Location Services For more details: see the Echo protocol [SSW03], a secure protocol for location verification Applications: location- based access control

IV. Tolerating Malicious Data: Resilient Aggregation “If you believe that, I have a bridge to sell.”

An Example networ k base station Computing the average temperature 67° 64° 69° 71° 68° f ( 67°, …, 68°) where f (x 1, …, x n ) = (x 1 + … + x n ) / n

An Example + An Attack networ k base station Computing the average temperature 67° 64° 69° 71° 68° f ( 67°, …, 1,000°) where f (x 1, …, x n ) = (x 1 + … + x n ) / n 1,000° result is drastically affected

Statistical Theory First, some background: Let D(Θ) be a parametrized distribution on  (Θ = param), X = (X 1, …, X n ) denotes n samples from D(Θ) f :  n →  is an estimator if Θ’ = f (X) is an estimate of Θ The root mean square error of an estimator f is rms(0) = E[(Θ’ – Θ) 2 ] 1/2 Next, a novel defense: resilient aggregation A k-node attacker A is a function A:  n →  n that changes only k of its inputs. Let Θ* = f (A(X)), rms(k) = max A E[(Θ* – Θ) 2 ] 1/2 Definition: f is (k, α)-resilient if rms(k) ≤ α  rms(0) E.g.: the “average” is an estimator, but it is not (1, α)-resilient for any constant α

Relevance of Resilience Intuition The (k, α)-resilient functions are exactly the ones that can be meaningfully and securely computed in the presence of k malicious insiders. Formalism (see paper)

Results (excerpts) f… is (k, α)-resilient, where minimumα = ∞ maximumα = ∞ sumα = ∞ averageα = ∞ average, discarding 5% outliers α ≈ 6.28 k /n for k 0.05 n medianα ≈ 0.32 k for k < 0.5 n maxα = ∞ count α  0.25 k /n (assuming n independent Gaussian/Bernoulli distributions)

Hard: In-Network Resilient Agg. networ k In-network aggregation introduces new security challenges

Hard Problems Communication security Defeating traffic analysis; spread spectrum for real? A library of secure distributed services & protocols Security against node compromise/capture e.g., routing that can tolerate just one malicious insider? Byzantine attack tolerance, on the cheap? Privacy

Summary Crypto helps, but isn’t a total solution Be aware of the systems tradeoffs Seek robustness against insider attack Resilience gives a way to think about malicious/captured nodes The law of large numbers is your friend Feedback?