Dynamic Security in Wireless Communications

Slides:



Advertisements
Similar presentations
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Advertisements

1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Data Communications and Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Medium Access Control Sub Layer
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Airmail: A Link-layer Protocol for Wireless Networks
Data Link Layer Lower Layers Local Area Network Standards
Re-evaluating the WPA2 Security Protocol
MobiCom’13 Jie Xiong and Kyle Jamieson University College London
Wireless Protocols WEP, WPA & WPA2.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Wireless Network Security
Secure Sockets Layer (SSL)
Packet Leashes: Defense Against Wormhole Attacks
Module 3 Medium Access Control.
TCP and MAC interplay in Wireless Ad Hoc Networks
Channel Allocation (MAC)
Understanding the OSI Reference Model
CSE 4905 Network Security Overview
Colorado School of Mines
Channel Spoofer: Defeating Channel Variability and Unpredictability
160 MHz PHY Transmission Date: Authors: March 2010
Mobile ad hoc networking: imperatives and challenges
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
CS412 Introduction to Computer Networking & Telecommunication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
TCP in Wireless Ad-hoc Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
WLAN Security Antti Miettinen.
Building A Network: Cost Effective Resource Sharing
Antti Miettinen (modified by JJ)
Information-Theoretic Security
Feedback-jamming ARQ mechanisms
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
CARRIER SENSE MULTIPLE ACCESS (CSMA)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Intercepting Mobile Communications: The Insecurity of
Security in Wide Area Networks
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Impact of transmission errors on TCP performance
Presentation transcript:

Dynamic Security in Wireless Communications Sheng Xiao, Weibo Gong and Don Towsley University of Massachusetts, Amherst

Outline Motivation Dynamic Secrets in Wireless Communications security and the time scales of network activities Dynamic Secrets in Wireless Communications Algorithms for Dynamic Security Adversarial Models A Simple ON-OFF Model for Dynamic Security

Motivation: Randomness in Communication is a Resource for Security “LRD is all about time scales” – [Anatharam 09] “network dynamics depend on operations at different layers and time scales” – [Resnick et, al 03] Hierarchical ON-OFF models for communication activities – [many authors] Randomness of wireless channels at various time scales is a great resource for secrecy Information loss in wireless channels could be used for security. [Wyner 75, Maurer 95, 02, Rabin 01] Dynamic Secrets - frequently update the security key using channel randomness Parity code for security purpose: easy to detect error but hard to correct – Gallager’s HDPC Dynamic secrets as an improvement, not a replacement: it can be used to compliment the current security technologies - [Xiao et, al 10]

Motivation : Time Scales in Network Activities human activities application layer network layer link layer physical layer Network traffic can be modeled as a product of hierarchical ON-OFF processes at different time scales. [Misra et al 98, Resnick et al 03, etc.]

Time Scales of Security Schemes Time scale of a security scheme is defined as the life span of a master key (root secret). digital certificate wireless network secret key (typically change when hardware upgrade) password (could be obliged to change every several months) faster key updates? decades years months Note: Session keys are derived from a master key (root secret). Whether or not use session key has no effect on time scale of a security scheme. Security measures at large time scales allow adversary to have sufficient time to attack.

Time Scales of Attacks factorize large number (~1000 bits) exhaustive search for keys < 64 bits (such as DES) social engineering attacks Trojan and Botnet exploit algorithm design and implementation flaws decades years months days hours Technology advancement help accelerate attacks. Frequent key updates are desired to defend against fast attacks.

Dynamic Secrets in Wireless Communications Motivation Dynamic Secrets in Wireless Communications adversary’s information loss is user’s secret Algorithms for Dynamic Security Adversarial Models A Simple ON-OFF Model for Dynamic Security

Explore the Key Space Alice Bob conventional k is only a small, static portion of all freely available secret information. k could be updated frequently since communication between Alice and Bob can occur very often. Eve’s information loss to Alice and Bob’s communication helps security. An error-prone communication phase is favorable for security. Eve

A Wireless, Packet Level Example Alice 1 2 3 4 5 6 7 8 9 Bob 4 5 7 8 Eve 2 3 4 6 7 8 9 Independent, lossy wireless channels. Eve could miss s even with better receiver. Alice-Bob communication generates dynamic secrets s1, s2, s3,… Starting from initial key k0, key k iteratively updated by XOR with dynamic secrets. Eve defeated if misses any dynamic secret. Adversary’s information loss provides secrecy to k.

Dynamic Secrets in Wireless Communications Motivation Dynamic Secrets in Wireless Communications Algorithms for Dynamic Security exploit true randomness in wireless channels Adversarial Models A Simple ON-OFF Model for Dynamic Security

Capture the Transmission Randomness 1 2 timeout 3 4 ………… Alice Bob OTF (One Time Frame) – frame only transmitted once : 1 and 4 Non-OTF – retransmitted frame : 2 and 3 Alice, Bob synchronously classify frames as OTFs / non-OTFs using local information. Classification extracts randomness from wireless channels.

Generate Dynamic Secrets and Dynamic Key 1 – bit strings in collected OTFs 2 – bit strings in collected non-OTFs if | 1 |  nts or|2|  nts threshold nts determines how often k updated value of k, update time contain true randomness

Dynamic Security Experiment in Office WLAN Even in an ideal anechoic chamber environment with multiple colluding adversaries, information loss still non-negligible after several minutes [Serrano et, al. 2009].

Mobility can Help Security Mobility is another layer of randomness in wireless communications. Alice Bob Eve’s error-free eavesdropping region Alice and Bob’s mobility is an unpredictable factor that can cause Eve’s information loss. Mobility greatly increases difficulty for Eve to track k. Similarly, multi-channel communication Eve must fight against all possible information loss factors to track dynamic key k. Eve suffers from single point of failure.

Dynamic Secrets in Wireless Communications Motivation Dynamic Secrets in Wireless Communications Algorithms for Dynamic Security Adversarial Models security improvements against various adversaries A Simple ON-OFF Model for Dynamic Security

Adversary I: Eavesdropping Attack Alice Bob Eve allowed to passively eavesdrop wireless signals. Eve Eve needs to maintain error-free eavesdropping in order to succeed.

Adversary II: Trojan Attack Alice Bob Eve allowed to plant Trojan program on Bob. Eve Trojan program forced to be always be active to track k and constantly report k back to Eve. Eve will have limited time to exploit k because k changes frequently.

Adversary III: Man-In-The-Middle (MITM) Alice Bob Eve allowed to know everything communicated between Alice and Bob. Eve Dynamic security forces Eve to always be present as MITM from the very beginning of Alice-Bob communication.

Adversary IV: Spoofing Attack Alice Bob Eve learns k. She impersonates as Alice to send requests to Bob. k Eve Alice and Bob immediately detect this attack when they communicate, i.e. inherent intrusion detection.

Dynamic Secrets in Wireless Communications Motivation Dynamic Secrets in Wireless Communications Algorithms for Dynamic Security Adversarial Models A Simple ON-OFF Model for Dynamic Security compare time scales of security schemes

ON-OFF Security Model: Periodic Key Updates Eve obtains k secure not secure Alice and Bob use key k to secure communication. Eve attempts to crack key k. k updates The events that Eve successfully obtains k are modeled as independent arrivals in a Poisson stream with rate λ. An administrator manually update k for every T time. Current time scale of security is too large to control damage of key cracking attacks. 21

ON-OFF Security Model : Dynamic Key Updates Eve obtains k secure not secure Alice and Bob use dynamic key k to secure communication. Eve attempts to crack key k. Eve loses track of k Assuming Eve’s frame error probability is p. Sojourn time in “not secure” state follows geometric distribution. Alice and Bob communicate with frame rate R. “Typical frame error rate (FER) for IEEE 802.11 and TCP/IP protocol suite is 2-3% but mobility of station increases FER by about 30%.” Xylomenos G., Polyzos G.C., Mahonen P. and Saaranen M.: TCP Performance Issues over Wireless Links. IEEE Communications Magazine, April 2001 Alice and Bob can improve security by increasing R or artificially jam the wireless environment to limit p. Time scale of dynamic security can defend many practical attacks. 22

Summary and Future Works Fine time scale security is needed to defend against fast attacks Inherent errors in wireless communications enables cost-efficient, frequent key updates, e.g. small time scale security Security improvements possible in various adversarial models Future Works Model and analyze key secrecy in different traffic distributions, e.g. independent vs. LRD Investigate the system security over multi-scale security mechanisms