Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley.

Similar presentations


Presentation on theme: "Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley."— Presentation transcript:

1 Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley

2 How to think about security Security goals:  Confidentiality  Integrity  Availability Threats:  Outsiders? Insiders?  Ordinary motes? Motes with superpowers?

3 Part I: Security against outsiders

4 The security risk: RF leakage

5 The outsider threat Lesson: build in security from the start

6 Keeping the outsider at bay networ k base station k k k k k k A simple approach: global shared keys

7 Global shared keys  Advantages –Simple; reasonable performance  Limitations –No security against insider attacks –What if a mote is compromised or stolen?

8 Part II: Security against insiders Tolerating compromised motes

9 Defending against insider attacks networ k base station k4k4 k5k5 k1k1 k3k3 k2k2 k 1, …, k 5 per-mote keying

10 Per-mote keying  Advantages –Simple; reasonable performance –Lost motes don’t reveal rest of network’s keys  Disadvantages –Motes can’t talk to each other without the help of the base station

11 Per-mote keying  Advantages –Simple; reasonable performance –Lost motes don’t reveal rest of network’s keys  Disadvantages –Motes can’t talk to each other without the help of the base station –Insiders can still falsify sensor readings

12 An example networ k base station Computing the average temperature 67° 64° 69° 71° 68° f( 67°, …, 68°) where f(x 1, …, x n ) = (x 1 + … + x n ) / n

13 An example + an attack networ k base station Computing the average temperature 67° 64° 69° 71° 68° f( 67°, …, 1,000°) where f(x 1, …, x n ) = (x 1 + … + x n ) / n 1,000° result is drastically affected

14 Resilient aggregation  Some theory: –For f :  n → , a random variable X on  n, and σ = StdDev[f(X)], define Pow(A) = E[(f(A(X)) – f(X)) 2 ] 1/2 ⁄ σ –Say f is (m, α)-resilient if Pow(A) ≤ α for all adversaries A :  n →  n modifying only m of their inputs –Example: the “average” is not (m, α)-resilient for any constant α

15 Relevance of resilience  Intuition –The (m, α)-resilient functions are the ones that can be meaningfully and securely computed in the presence of m malicious insiders.  Formalism –Theorem. If f isn’t (m, α)-resilient, m insiders can bias f(...) by at least ± α σ, on average. If f is (m, α)-resilient, it can be computed centrally with bias at most ± α σ, for m insiders.

16 Examples f… is (m, α)-resilient, where averageα = ∞ average, discarding 5% outliers α ≈ 1.65 m/n 1/2 for m 0.05 n medianα ≈ m/n 1/2 for m < 0.5 n maxα = ∞ 95 th percentile “max”α ≈ O(m/n 1/2 ) for m < 0.05 n countα ≈ m/(p(1–p)n) 1/2 (assuming n independent Gaussian/Bernoulli distributions)

17 Primitives for aggregation (1)  Computing with histograms –Theorem. If f is a (m, α)-resilient, symmetric function with ∑ i |∂f/∂x i | ≤ β, f can be computed securely using a histogram with buckets of width w. With m insiders, the bias will be at most about α σ + 0.5wβ.

18 Primitives for aggregation (2)  Computing with random sampling –Idea in progress. If f is a (m, α)-resilient, symmetric function with ∑ i |∂f/∂x i | ≤ β, perhaps f can be computed securely by sampling the values at k randomly selected motes.

19 But: An important caveat! networ k Aggregation in the network introduces new challenges 2 4 1011 2

20 Summary  Crypto helps, but isn’t a total solution –Be aware of the systems tradeoffs  Seek robustness against insider attack –Resilience gives a way to think about insiders –The law of large numbers is your friend  Feedback?


Download ppt "Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley."

Similar presentations


Ads by Google