Presentation is loading. Please wait.

Presentation is loading. Please wait.

Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.

Similar presentations


Presentation on theme: "Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004."— Presentation transcript:

1 Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

2 Outline The problem Terminodes project: proposed solution to public-key management problem Sybil attacks Sybil vs. Terminodes Thwarting Sybil?

3 The problem Wireless ad hoc networks cannot depend on many of the resources available to traditional networks for security Such networks do not have the fixed infrastructure that is required for classical implementations of centralized certification authorities One option for solving this problem is to develop a self-organized system that completely sets aside the need for a trusted authority at any stage of implementation: Terminodes approach

4 Terminodes

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19 Sybil attacks A Sybil attack is the forging of multiple identities for malicious intent -- having a set of faulty entities represented through a larger set of identities. The purpose of such an attack is to compromise a disproportionate share of a system. Result is overthrowing of any assumption of designed reliability based on a limited proportion of faulty entities.

20 Sybil: key idea Sybil Attack undermines assumed mapping between identity to entity and hence number of faulty entities

21 Model in Douceur(2002): Set E of entities e; two disjoint subsets C (c is correct) and F (f is faulty). Broadcast communication cloud, pipe connecting each entity to the cloud. Entities communicate by broadcast messages, all messages received within bounded time, not necessarily in order. Assume local entity l is correct.

22 communication cloud remote entities local entity

23 Identity i is abstract representation of entity e which persists across multiple messages. 3 sources of info for which a local entity can accept identity i of remote e : –Trusted agency –Itself –Other entities Two ways to validate entities not received from trusted agency: –Direct validation –Indirect validation; accept identities vouched for by already accepted identities Goal: accept all legitimate identities, but no counterfeits

24 Method: for direct and and indirect validation (not using trusted agency), utilize computational tasks to validate distinctness; –basically, validate distinctness of two entities by getting them to perform some task (computational puzzle) that a single entity could not. –cannot assume homogeneous resources, only minimum; faulty entity could have more than minimum –practical impossibility of having challenges issued simultaneously. –Result: for direct or indirect validation, a set of faulty entities can counterfeit an unbounded number of identities. (Douceur)

25 Validation which does not use a trust agency can’t provably meet the identity goal; –Identification based on local-only information not practical –PGP-style web of (certification) trust not adequate; is indirect-validation. Douceur’s Conclusion: A centralized authority is required to realize a reliable distributed system.

26 Douceur’s 4 Lemmas 1.If  is the ratio of the resources of a faulty entity ƒ to the resources of a minimally capable entity, then ƒ can present g =  distinct identities to local entity l. 2.If local entity l accepts entities that are not validated simultaneously, then a single faulty entity ƒ can present an arbitrarily large number of distinct identities to entity l.

27 Douceur’s 4 Lemmas (cont) 3.If local entity l accepts any identity vouched for by q accepted identities, then a set F of faulty entities can present an arbitrarily large number of distinct identities to l if either |F|  q or the collective resources available to F at least equal those of q + |F| minimally capable entities. 4.If the correct entities in set C do not coordinate time intervals during which they accept identities, and if local entity l accepts any identity vouched for by q accepted identities, then even a minimally capable faulty entity f can present g =  |C| / q  distinct identities to l.

28 Sybil vs. Terminodes Despite their promises to the contrary, the Terminodes project is not immune to Sybil attacks This can be seen by looking at their repository construction algorithms

29 Maximum Degree Algorithm Each user stores in her local repository several directed and mutually disjoint paths of certificates. Each path begins at the user herself The certificates are added to the path as follows: a new certificate is chosen among the certificates connected to the last user on the path, such that the new certificate leads to the user that has the highest number of certificates connected to her

30 Shortcut Hunter Algorithm Certificates are stored into the local repositories based on the number of the shortcut certificates connected to the users A shortcut certificate is a certificate that, when removed from the graph makes the shortest path between two users previously connected by this certificate strictly larger than two

31 Thwarting Sybil Do we believe any of this? –Any flaws in the logic chain? –Is there another way to bind identities to entities? –Is there something about trust authorities that means they must (by nature) be centralized? Is this really a problem? –Existing systems seem to be working fine. –What’s wrong with a distributed system using a centralized trust authority? –Is a CA part of the distributed system that uses it? –Are existing practices good enough in practice?

32 The Sybil Attack in Sensor Networks: Newsome, et al. Malicious node and its Sybils: –Direct vs indirect communication –Fabricated vs stolen identities –Simultaneous vs non-simultaneous attacks

33 Sybil attacks Distributed storage Routing Data aggregation Voting Resource allocation Misbehavior detection

34 Defenses Old: –Computation –Storage –Communication New: direct attacks only –Radio resource testing –Random key predistribution –Registration –Position verification –Code attestation


Download ppt "Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004."

Similar presentations


Ads by Google