1 Secure Sensor Routing A Clean-Slate Approach Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
A Survey of Secure Wireless Ad Hoc Routing
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Packet Leashes: Defense Against Wormhole Attacks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Implementing Multicast
Presentation transcript:

1 Secure Sensor Routing A Clean-Slate Approach Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig Carnegie Mellon University

2 Sensor Networks Thousands of nodes, each with: –A CPU and ~10 KB of RAM –A radio –Sensors (e.g., heat, motion, sound) –Limited power Communicate via multi-hop routing Applications: burglar alarms, emergency response, industrial uses All require secure routing!

3 Attacks on Routing Inject incorrect routing information or alter setup/update messages Compromise sensors –Provide malicious routing data/messages Suppress (selectively) routing messages Specific attacks: –Blackhole –Wormhole –Replication –Denial of Service –Sybil –Rushing –Slander –Framing

4 Consequences of Routing Attacks Controlling routing allows the attacker to control the network’s communication –Can view, modify, and/or drop messages –Create loops to exhaust legitimate nodes –Prevent or subvert proper network functionality

5 Techniques for Secure Routing Prevention –Harden protocols by restricting participants’ actions –Typically employs cryptography –Only forestalls known attacks Detection & Recovery –Monitor behavior for malicious activity –Eliminate malicious participants –Must be able to distinguish anomalous behavior and accurately assign blame Resilience –Maintain availability even under unpredicted attacks –Provide graceful performance degradation

6 Previous Work Sensor routing –Most assume trusted environment –INSENS only applicable to certain topologies –SIGF requires GPS Other secure routing protocols –Typically rely on a single technique Prevention: S-BGP, Ariadne Detection & Recovery: Watchdog, Pathrater, Secure Traceroute Resilience: INSENS –Inappropriate for resource-constrained sensor nodes Require PKI or excessive amounts of memory, computation or communication

7 Goals Start from a clean-slate Incorporate all three security techniques –Prevention, detection & recovery, and resilience Provide highly secure, highly available point- to-point routing –Necessary in many applications, e.g., Geographic Hash Tables (GHTs), key establishment, etc. Minimize resource utilization

8 Outline Introduction Overview and Assumptions Address and Routing Setup Forwarding Detection and Recovery Simulation and Implementation

9 Our Routing Protocol Architecture Establish routing tables and network addresses –Use prevention techniques to thwart active attackers –Detect and recover from attempts to deviate from the protocol or to launch additional attacks Apply resilient routing techniques to forward packets –Uses the securely established routing tables and network addresses

10 Assumptions Network authority (NA) uses a public/private keypair {K NA, K -1 NA } Each sensor node preloaded with: –Network authority’s public key K NA –Unique ID x –Certificate: Sig(K -1 NA, ID x ) Signature scheme optimizes for verification Intended for networks of primarily stationary sensors

11 Outline Introduction Overview and Assumptions Address and Routing Setup Forwarding Detection and Recovery Simulation and Implementation

12 Address and Route Setup Overview Goal: –Assign a unique network address to each node –Populate each node’s routing table Accomplished with a recursive grouping algorithm –Initially, each sensor constitutes its own group –Groups repeatedly merge until all nodes belong to same group Each time a node’s group merges, the node adds one bit to its network address and one entry to its routing table Node Routing ID Address Table A 0.1 B 0.0 C 1.1 D 1.0 Node IDAddress Routing Table A0.1 B0.0 C1.1 D1.0 Node IDAddress Routing Table A0.1RT A B0.0RT B C1.1RT C D1.0RT D

13 Recursive Grouping Algorithm Groups act in an asynchronous, distributed fashion Each group: –Collects information about its neighbors –Proposes to merge with smallest neighboring group Based on number of nodes in the group Ties broken based on group ID This metric keeps addresses and routing tables small –Mutual proposal triggers merge Entire process is deterministic for a given topology –Limits the damage an attacker can inflict

14 Recursive Grouping Example

15 Calculating Network Addresses Assume G and G’ decide to merge Each node in G independently extends its network address by one bit based on: Nodes in G’ make similar changes

16 Network Addresses Formation

17 Populating Routing Tables Assume G and G’ decide to merge Each node in G records the neighbor from whom it heard about G’ in its current routing table slot G Prefix Next Hop 0.*C 1.0C D G G’

18 Sample Routing Table Prefix Next Hop 0.* *

19 Outline Introduction Overview and Assumptions Address and Routing Setup Forwarding Detection and Recovery Simulation and Implementation

20 Forwarding Basic forwarding similar to area-style forwarding Given a destination network address route towards node with longest matching prefix Path length in logical hops bound by log(n) –A logical hop may require several physical hops

21 Forwarding Example Prefix Next Hop 0.* * Prefix Next Hop 1.* * Prefix Next Hop 1.* * Prefix Next Hop 0.* * Message from to 0.0.0

22 Outline Introduction Overview and Assumptions Address and Routing Setup Forwarding Detection and Recovery –Threats –Detecting Grouping Deviations –Eliminating Malicious Nodes Simulation and Implementation

23 Threats Compromised nodes may lie about group size or ID to subvert route setup Compromised nodes may claim multiple IDs or try to simultaneously group with several other nodes

24 Detecting Grouping Deviations Maintain a Grouping Verification Tree (GVT) for each group during recursive grouping –Prevents attacker from lying about group ID or size –Based on a hash tree construction Before two groups merge, they verify each other’s GVT Integrity of the GVTs insures integrity of the recursive grouping algorithm Final GVT covers all nodes in the network –Can be used to authenticate any node’s network address

25 Background: Hash Trees Employ a one-way hash function H: {0,1}*→{0,1} ρ to create one-way data structures The Merkle Tree is one such data structure –Each internal node calculated as: Parent = H(Child L || Child R ) –Authenticates a leaf node given the root value and nodes along the path to the root

26 Group ID Computation Assume G and G’ decide to merge Each node in G independently calculates the new group ID as:

27 GVT Formation One GVT per group GVT leaves are IDs of nodes in the group Internal nodes represent intermediate group IDs Each node maintains information about its branch of the GVT –Specifically, the group ID and size of each merge partner

28 GVT Verification Before merging, group G verifies the GVT for G’ (and vice versa) G’ announces its group ID (and size) Group G sends a challenge value to G’ The challenge uniquely selects a node in G’ –Chosen node sends its certificate and GVT information to G Nodes in G verify the GVT values ResponderChallenger λ

29 Eliminating Malicious Nodes Legitimate nodes use the Honeybee mechanism to eliminate malicious nodes To revoke malicious node M, legitimate node L broadcasts: –ID L, ID M, and a signature Legitimate nodes revoke M and L –Prevents a compromised node from revoking more than one legitimate node

30 Outline Introduction Overview and Assumptions Address and Routing Setup Forwarding Detection and Recovery Simulation and Implementation

31 Simulations Comparison against Beacon Vector Routing (BVR) protocol [NSDI 2005] –Optimized for efficiency –No security included Experimental Setup: –500 nodes, random deployment, DOI radio model Summary of Results: –Our routing success rate: 100% –Paths longer than shortest path –Distributes overhead evenly throughout network Better than BVR, even in topologies with voids

32 Metric: Path Stretch Stretch = Protocol Path Length / Optimal Path Length Optimistic for BVR: does not include failed BVR routes

33 Metric: Load Distribution - Uniform ~ 168,000 messages

34 Metric: Load Distribution - Irregular ~ 26,000 messages

35 Implementation Developed in NesC on TinyOS using Telos sensor nodes –Source code to be available soon Challenges overcome: –Reliable Broadcast –Asynchronicity –Asymmetric Links Ongoing work to expand the current testbed

36 Other Contributions Techniques for resilient forwarding Duplicate detection Proofs of performance and correctness Implementation details

37 Conclusions Secure sensor routing is an important and difficult problem Most previous techniques assume a trusted environment or use a single security technique We design a protocol incorporating all three security techniques that still compares favorably to insecure protocols

38 Thank you!

39 Drawbacks of Wired Networks Expensive to deploy Expensive to maintain –Upgrade –Replace Wires can introduce failures Wires are costly Wireless networks are more cost effective!

40 Merging Two Groups Assume G and G’ decide to merge Each node in G independently: –Calculates the new group ID: –Extends its network address by one bit according to: –Records the neighbor from whom it heard about G’ in the current routing table slot

41 Duplicate Detection After recursive grouping concludes, each node announces its ID and network address to its neighbors Run a replication detection algorithm [PaPeGl2005] to identify duplicates Detects nodes that: –Claim multiple IDs –Simultaneously group with several other nodes Duplicates are revoked

42 Resilient Forwarding Extend routing tables to facilitate multi-path forwarding During each merge, a node remembers multiple neighbors that announced the merge target –Leverages natural redundancy in the recursive grouping algorithm Prefix Next Hop 0 Next Hop 1 1.*AC 0.1.*CD 0.0.0A-- B

43 Resilient Forwarding Sender includes a direction string  in its packet  =  0 ||  1 || …||  k,  i  {0,1} Forwarding node selects among next hops based on current value of 

44 GVT Verification Before merging, group G verifies the GVT for G’ (and vice versa) G’ announces its group ID and size Group G chooses a challenger node –Challenger creates challenge –Challenger broadcasts the challenge to G and G’ Based on challenge, G’ chooses responder node –Responder sends its certificate and GVT branch information to G Nodes in G verify the GVT values