1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
An Advanced Signature System for OLSR Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu, David Evans Jason Buckingham CSCI 7143: Secure Sensor Networks November 2, 2004.
Data Consistency in Sensor Networks: Secure Agreement Fatemeh Borran Supervised by: Panos Papadimitratos, Marcin Poturalski Prof. Jean-Pierre Hubaux IC-29.
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks Reza Shokri Tutors: Panos Papadimitratos, Marcin Poturalski 29 January 2008.
Castor: Scalable Secure Routing for Ad Hoc Networks
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech.
Secure Location Verification Using Radio Broadcast Adnan Vora, Mikhail Nesterenko 4/27/04.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Timing-sync Protocol for Sensor Networks (TPSN) Presenter: Ke Gao Instructor: Yingshu Li.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Network Computing Laboratory Radio Interferometric Geolocation Miklos Maroti, Peter Volgesi, Sebestyen Dora Branislav Kusy, Gyorgy Balogh, Andras Nadas.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Collaborative Sampling in Wireless Sensor Networks Minglei Huang Yu Hen Hu 2010 IEEE Global Telecommunications Conference 1.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Modeling End-to-end Distance for Given Number of Hops in Dense Planar Wireless Sensor Networks April Chan-Myung Kim
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Slide 1/29 DCSL: Dependable Computing Systems Lab L ITE W ORP : A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks Issa.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Experimental Ranging With Mica2 Motes M. Allen, E. Gaura, R. Newman, S. Mount Cogent Computing, Coventry University The experimental work here makes use.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
/ 24 1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai Santosh Kumar Dong Xuan Computer Science and Engineering The Ohio.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
Localization with witnesses
Secure Verification of Location Claims
Presentation transcript:

1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and Jean-Pierre Hubaux Laboratory for Computer Communications and Applications, EPFL, Switzerland Second ACM Conference on Wireless Network Security (WiSec'09) March 2009 Zurich, Switzerland

2 Wormhole Attack

3 Wormhole

4 Wormhole Attack False Links over the Wormhole

5 Neighbor Verification Protocol Protocol Stages i.Ranging ii.Exchanging the Neighbor Tables (include distance) iii.Neighbor Verification (security tests) Our Main Idea Local geometric consistency tests Motivation - The other proposed methods are not implementable on sensor networks (e.g., directional antennas) or are not secure enough considering the sensor networks’ limitations (e.g., tight time synchronization in nanosecond precision is required). - Our goal is to propose a secure and practical protocol for WSN.

6 The Ranging Protocol

7 ? ? ? A B C D

8 AB t REQ/A t REQ/B C REQ Fresh Random Nonce

9 The Ranging Protocol AB REP t REQ/A t REQ/B C t REP/B t REP/A REQ

10 The Ranging Protocol AB REP t REQ/A t REQ/B C t REP/B t REP/A REQ t RNG/B t RNG/A RNG (Ultra)Sound

11 The Ranging Protocol AB REP t REQ/A t REQ/B C t REP/B t REP/A REQ t RNG/B t RNG/A RNG ACK (Ultra)Sound

12 The Ranging Protocol AB REP t REQ/A t REQ/B C t REP/B t REP/A REQ t RNG/B t RNG/A RNG (Ultra)Sound ACK Node B: “Synchronization Test” Speed of sound Empirical Synchronization Error

13 C B The Ranging Protocol (Over Attack) A d wa d wb d wc d bc A C B >= d wb + d wb The adversary can change adjust the distance between nodes only by introducing different delay values while relaying RNG messages

14 Neighbor Table Exchange A B C D F E G Each node broadcasts its neighbor table to its direct neighbors. Neighbor tables include distance between nodes. We assume nodes are deployed on a plane. (it can be extended to 3D)

15 Neighbor Verification (Security Tests)

16 Neighbor Verification (Security Tests) Link Symmetry Test d (B->A) = d (A->B) (1)

17 Neighbor Verification (Security Tests) Maximum Range Test d (B->A) < R R (1) (2) Link Symmetry Test d (B->A) = d (A->B)

18 Neighbor Verification (Security Tests) Quadrilateral Test Each 4 neighbors that form a clique must belong to a quadrilateral. (embedding graph on a plane) Maximum Range Test d (B->A) < R R (1) (3) (2) Link Symmetry Test d (B->A) = d (A->B)

19 Neighbor Verification (Security Tests) Quadrilateral Convexity Test A link will be marked as verified link if it belongs to a convex quadrilateral. Maximum Range Test d (B->A) < R R (1) (3) (2) (4) Quadrilateral Test Each 4 neighbors that form a clique must belong to a quadrilateral. (embedding graph on a plane) Link Symmetry Test d (B->A) = d (A->B)

20 Security Analysis

21 Security Analysis To successfully create a false link: the attacker has to convince 4 nodes that form a convex quadrilateral (2-2) (3-1) A B C D D A B C

22 Security Analysis (2-2) A B C D C D A B C D A B Nodes’ perception (1) Nodes’ perception (2) We have proved that neither of these perceptions are possible. Thus, 2-2 attack is impossible.

23 Security Analysis (3-1) D A B C A B C D Nodes’ perception D A B C We have proved that the attack is possible only if:

24 Experimental Results Settings The ranging protocol has been implemented on Crossbow Cricket motes

25 Experimental Results Settings The ranging protocol has been implemented on Crossbow Cricket motes Results Time Synchronization Error: 99.55% below 5 microsecond Distance Measurement Error: Below 5cm error (Range up to 4m) Link Symmetry Error: 97% below 7cm (74% below 2cm)

26 Performance Evaluation in Benign Setting Links have to satisfy the convex quadrilateral test to be verified by our protocol. Yet, even in a benign setting, some links might not belong to any convex quadrilateral, and therefore remain unverifiable. How percentage of true links can be verified?

27 Performance Evaluation in Benign Setting Coverage Uniform distribution of nodes in a field measuring 400m*400m “R”: Transmission range = 100m “e”: Maximum distance estimation error as percentage of R.

28 Conclusion -Neighbor Verification Protocol for Wireless Sensor Networks -Based on estimation of node distance and simple, local tests -Practical solution, implemented on Cricket motes -Formal analysis and proof of correctness -Highly effective against powerful adversaries -Adding detection of adversary increases security (see tech- report)

29 The Ranging Protocol (Properties) AB REP t REQ/A t REQ/B C t REP/B t REP/A REQ t RNG/B t RNG/A RNG (Ultra)Sound ACK i.REQ and REP cannot be delayed ii.RNG can be delayed: same delay for all pairs WAWA WBWB

30 Security Analysis (b): |AC|+|BD| = |AD|+|BC| = a + b + c + d + 2t(a) |AC|+|BD| < |AD|+|BC| (b) contradiction (c): x + y > a + b + c + d +2t (c) (triangle inequalities for: ∆ACX, ∆CXB, ∆BXD, ∆DXA) x + y < a + b + c + d (a) (triangle inequalities for: ∆ABW 1, ∆CDW 2 ) contradiction “t” is the distance equivalent to the delay over the wormhole: delay×s (2-2) Case

31 Security Analysis |AD|-|AW 1 | = |BD|-|BW 1 | = |CD|-|CW 1 | = t + d => A, B, C lie on a hyperbola with foci D and W 1, on the arm closer to W 1. As this arm is concave, no 3 points A, B, C can form a convex quadrilateral with D  (3-1) Case

32 Performance Evaluation in Benign Setting The number of tested 4-cliques per node. Computational Complexity 95-percentile Median 5-percentile