© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
A Survey of Secure Wireless Ad Hoc Routing
Sri Lanka Institute of Information Technology
Chapter 4 Conventional Computer Hardware Architecture
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Chapter 18. IP: Internet Protocol Addresses
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Centre for Wireless Communications University of Oulu, Finland
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
Security in Wireless Sensor Networks
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Concerns about designating the MAG as a Default Router James Kempf NETLMM Interim Sept. 27, 2006.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Cryptography and Network Security (CS435) Part One (Introduction)
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Secure Neighbor Discovery in IPv6 Jari Arkko Ericsson Research James Kempf DoCoMo US Labs.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 IPv4 Addresses.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Cisco I Introduction to Networks Semester 1 Chapter 8 JEOPADY.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
IP: Addressing, ARP, Routing
Chapter 5 IPv4 Addresses TCP/IP Protocol Suite
Packet Leashes: Defense Against Wormhole Attacks
Cryptographic Hash Function
Lecture 4a Mobile IP 1.
Presentation transcript:

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing attacks against naming and addressing: - address stealing - Sybil attack - node replication attack; protection mechanisms: - Cryptographically Generated Addresses - witness based detection of node replication

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 2/16 Chapter outline 4.1 The future of naming and addressing in the Internet 4.2 Attacks against naming and addressing 4.3 Protection techniques

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 3/16 Chapter outline 4.1 The future of naming and addressing in the Internet 4.2 Attacks against naming and addressing 4.3 Protection techniques

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 4/16 Introduction  naming and addressing are fundamental for networking –notably, routing protocols need addresses to route packets –services need names in order to be identifiable, discoverable, and useable  attacks against naming and addressing –address stealing adversary starts using an address already assigned to and used by a legitimate node –Sybil attack a single adversarial node uses several invented addresses makes legitimate nodes believe that there are many other nodes around –node replication attack dual of the Sybil attack the adversary introduces replicas of a single compromised node using the same address at different locations of the network 4.2 Attacks against naming and addressing

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 5/16 Illustration of the Sybil and node replication attacks Sybil nodes A B C D X Y Z X X A C B D E G F H I J replicated nodes 4.2 Attacks against naming and addressing

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 6/16 Chapter outline 4.1 The future of naming and addressing in the Internet 4.2 Attacks against naming and addressing 4.3 Protection techniques

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 7/16 Cryptographically Generated Addresses (CGA)  aims at preventing address stealing  general idea: –generate node address from a public key –corresponding private key is known only by the legitimate node –prove ownership of the address by proving knowledge of the private key  example in case of IPv6: 4.3 Protection techniques Cryptographically Generated Addresses (CGA)

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 8/16 A potential problem with CGA  often only a limited number of bits of the address can be chosen arbitrarily (64 in our example)  this number may be too small to guarantee second pre- image resistance –an adversary could pre-compute a large database of interface identifiers from public keys generated by himself, and use this database to find matches to victims' addresses  a solution can be the technique called hash extension –increase the cost of address generation, and hence the cost of brute- force attacks, while keep constant the cost of address usage and verification 4.3 Protection techniques Cryptographically Generated Addresses (CGA)

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 9/16 Hash extension 4.3 Protection techniques Cryptographically Generated Addresses (CGA)

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 10/16 Protocol for CGA generation 1.Set the modifier field to a random 128-bit value. 2.Hash the concatenation of the modifier, 64+8 zero bits, and the encoded public key. The leftmost 112 bits of the result are Hash2. 3.Compare the 16*Sec leftmost bits of Hash2 with zero. If they are all zero (or if Sec=0), continue with Step (4). Otherwise, increment the modifier and go back to Step (2). 4.Set the collision count value to zero. 5.Hash the concatenation of the modifier, subnet prefix, collision count and encoded public key. The leftmost 64 bits of the result are Hash1. 6.Form an interface identifier by setting the two reserved bits in Hash1 both to 1 and the three leftmost bits to the value Sec. 7.Concatenate the subnet prefix and interface identifier to form a 128-bit IPv6 address. 8.If an address collision with another node within the same subnet is detected, increment the collision count and go back to step (5). However, after three collisions, stop and report the error. 4.3 Protection techniques Cryptographically Generated Addresses (CGA)

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 11/16 Protocol for CGA verification 1.Check that the collision count value is 0, 1 or 2, and that the subnet prefix value is equal to the subnet prefix (i.e. leftmost 64 bits) of the address. The CGA verification fails if either check fails. 2.Hash the concatenation of the modifier, subnet prefix, collision count and the public key. The 64 leftmost bits of the result are Hash1. 3.Compare Hash1 with the interface identifier (i.e. the rightmost 64 bits) of the address. Differences in the two reserved bits and in the three leftmost bits are ignored. If the 64-bit values differ (other than in the five ignored bits), the CGA verification fails. 4.Read the security parameter Sec from the three leftmost bits of the interface identifier of the address. 5.Hash the concatenation of the modifier, 64+8 zero bits and the public key. The leftmost 112 bits of the result are Hash2. 6.Compare the 16*Sec leftmost bits of Hash2 with zero. If any one of these is nonzero, CGA verification fails. Otherwise, the verification succeeds. 4.3 Protection techniques Cryptographically Generated Addresses (CGA)

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 12/16 Thwarting the Sybil attack  note that CGAs do not prevent the Sybil attack –an adversary can still generate addresses for herself  a solution based on a central and trusted authority –the central authority vouches for the one-to-one mapping between an address and a device –e.g., a server can respond to requests concerning the legitimacy of a given address  other solutions take advantage of some physical aspects –e.g., identify the same device based on radio fingerprinting 4.3 Protection techniques Thwarting Sybil and node replication attacks

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 13/16 Thwarting the node replication attack (1/2)  a centralized solution –each node reports its neighbors’ claimed locations to a central authority (e.g., the base station in sensor networks) –the central authority detects if the same address appears at two different locations –assumes location awareness of the nodes base station A B C A D E (x1, y1) (x2, y2) 4.3 Protection techniques Thwarting Sybil and node replication attacks

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 14/16 Thwarting the node replication attack (2/2)  a decentralized variant –neighbors’ claimed location is forwarded to witnesses –witnesses are randomly selected nodes of the network –if a witness detects the same address appearing at two different locations then it broadcast this information and the replicated nodes are revoked 4.3 Protection techniques Thwarting Sybil and node replication attacks

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 15/16 Analysis of the decentralized variant  total number of nodes is n  average number of neighbors is d  each neighbor of A forwards A’s location claim with probability p to g randomly selected witnesses  average number of witnesses receiving A’s location claim is p*d*g  if there are L replicas of A, then for the probability of detection: P det > 1 – exp( - L(L-1)(pdg) 2 / 2n)  numerical example: n = 10000, d = 20, g = 100, p = 0.5 L = 2  P det ~ 0.63 L = 3  P det ~ Protection techniques Thwarting Sybil and node replication attacks

Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing 16/16 Summary  there are various attacks against naming and addressing –address stealing –Sybil attack –node replication attack  decentralization and lack of a central authority renders the defense against these attacks difficult  proposed solutions (CGA, node replication detection using witnesses) provide only probabilistic guarantees –parameters should be chosen carefully 4.4 Summary