Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Wireless Sensor Networks: Key Management Approaches
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Range-Based and Range-Free Localization Schemes for Sensor Networks
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Routing Security in Ad Hoc Networks
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Chris Karlof David Wagner University of Califonia at Berkeley
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Chris Karlof and David Wagner University of California at Berkeley
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Packet Leashes: Defense Against Wormhole Attacks
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Protocols.
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
An Overview of Security Issues in Sensor Network
Protocols.
Presentation transcript:

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner

Key Contributions Secure routing issues in WSNs Show how they are different from ad hoc networks Introduce two new classes of attacks  Sinkhole attack  Hello flood attack Analyze security aspects of major routing protocols Discuss countermeasures & design considerations for secure routing in WSNs

WSNs vs. Ad Hoc Networks Multi-hop wireless communications Ad hoc nets: communication between two arbitrary nodes WSNs Specialized communication patterns  Many-to-one  One-to-many  Local communication More resource constrained More trust needed for in-network processing, aggregation, duplicate elimination

Assumptions Insecure radio links Malicious nodes can collude to attack the WSN Sensors are not tamper-resistant Adversary can access all key material, data & code Aggregation points may not be trustworthy Base station is trustworthy

Threat Models Device capability Mote class attacker Laptop class attacker: more energy, more powerful CPU, sensitive antenna, more radio power Attacker type Outside attacker: External to the network Inside attacker: Authorized node in the WSN is compromised or malicious

Security Goals Secure routing Support integrity, authenticity, availability of messages in presence of attack Data confidentiality

Potential Attacks Attacks on general WSN routing Attacks on specific WSN protocols

Attacks on General WSN Routing Protocols Spoof, alter, or replay routing info. Create loops, attack or repel network traffic, partition the network, attract or repel network traffic, etc. Message authentication can partly handle these issues Selective forwarding Malicious node selectively drops incoming packets

Sinkhole attack Specific to WSNs All packets are directed to base station A malicious node advertises a high quality link to the base station to attract a lot of packets Enable other attacks, e.g., selective forwarding or wormhole attack

Sybil attack A single node presents multiple ID’s to other nodes Affect geographic routing, distributed storage, multi-path routing, topology maintenance

Wormhole attack Two colluding nodes A node at one end of the wormhole advertises high quality link to the base station Another node at the other end receives the attracted packets

Hello flood attack Specific to WSNs In some protocols, nodes have to periodically broadcast “hello” to advertise themselves  Not authenticated! Laptop-class attacker can convince it’s a neighbor of distant nodes by sending high power hello messages

Acknowledge spoofing Adversary spoofs ACKs to convince the sender a weak/dead link support good link quality

Attacks on Specific Routing Protocols TinyOS beaconing Construct a BFS tree rooted at the base station Beacons are not authenticated Adversary can take over the whole WSN by broadcasting beacons

Directed diffusion Replay interest Selective forwarding & data tampering Inject false data

Geographic routing Adversary can provide false, possibly multiple, location info. Create routing loop GEAR considers energy in addition to location  Laptop-class attacker can exploit it

Countermeasures Shared key & link layer encryption Prevent outsider attacks, e.g., Sybil attacks, selective forwarding, ACK spoofing Cannot handle insider attacks  Wormhole, Hello flood, TinyOS beaconing Sybil attack Every node shares a unique secret key with the base station Create pairwise shared key for msg authentication Limit the number of neighbors for a node Hello flood attack Verify link bidirectionality Doesn’t work if adversary has very sensitive radio

Countermeasures Wormhole, sinkhole attack Cryptography may not help directly Good routing protocol design Geographic routing Location verification Use fixed topology, e.g., grid structure Selective forwarding Multi-path routing Route messages over disjoint or Braided paths Dynamically pick next hop from a set of candidates Measure the trustworthiness of neighbors

Countermeasures Authenticated broadcast uTESLA Base station floods blacklist Should be authenticated Adversaries must not be able to spoof

Towards Resilient Geographic Routing in WSNs Ke Liu, Nael Abu-Ghazaleh, KD Kang Computer Science Dept. State University of New York at Binghamton

Outline Background: Geographic Forwarding Security Threats and Threat Model Localization and Location Verification Secure Trust-based Multi-path Routing Conclusions

Geographic Forwarding Keep track of neighbors’ locations Forwarding set is set of neighbors closer to destination than self Pick next hop as a member of the forwarding set Greedy forwarding – pick closest to destination

Geographical Forwarding (2) Local interactions only – no local state maintained Can get stuck in voids; void traversal algorithm needed (e.g., perimeter routing) We don ’ t consider this aspect of operation

Threat Model/Assumptions Two types of nodes: Anchors:  Know their location (e.g., using GPS)  Act as reference points for localization  Sufficient density to enable localization  First assume they are trusted; later relax the assumption Sensor Nodes:  Can be compromised  Key pre-distribution to provide cryptographic keys Confidentiality, authentication, message integrity, can be supported if needed

Threat Models/Assumptions (2) GF is different from traditional topology based routing protocols We do not consider MAC/physical level attacks Orthogonal techniques apply there Sybil attack (node claiming multiple locations) are possible Blackhole, wormhole and selective forwarding attacks are possible

Location Verification First contribution of this paper Each node is responsible for reporting its location information Trusted to provide the correct information; no mechanism to verify using traditional localization approaches If nodes can falsify their location GF breaks down Sybil attacks, blackholes, and other attacks easily possible Location Verification: prevent nodes from lying about their location

Existing Solution (Sastry et al 2004) Echo Protocol: Location challenged by verifier Node responds instantly with ultrasonic pulse Speed of sound allows estimate of distance Includes a nonce sent by the verifier  Prevents early response to appear closer Argue that delaying response not possible because it moves node into another verifiers region Coarse-grained verification (within region) Requires ultrasound channel

Localization via Triangulation Lateration is the calculation of position information based on distance measurements from three known points (anchors) 2D position requires three distance measurements. Signal Strength, Time of Arrival, Time Difference of Arrival, etc.. used to estimate distance Triangulation measures angle of arrival d2 d3 d1

Proposed Solution – Anchors Localize Protocol 1. Node transmits localization packet 2. Anchors receive it concurrently; each anchor estimates distance to node 3. Anchors exchange estimates to calculate location Localization responsibility moved to trusted anchors Location passed to node with certificate or supplied by anchors Limitation: range based localization – range free localization requires extension d2 d3 d1

Possible Attacks (1) Nodes cheat by manipulating the localization transmission E.g., in signal power based ranging  transmit at higher power to appear closer;  or lower power to appear farther In TDOA  Send ultrasonic pulse before RF pulse to appear closer;  Send RF pulse before ultrasonic to appear further

Defense Key observation: node will appear closer to, or further, from all anchors concurrently Detectable when anchors exchange ranges Leads to Non-feasible location in all non-trivial anchor placements d2 d3 d1 d2-dx d3-dx d1-dx d2+dx d3+dx d1+dx

Possible Attacks (2) Directional antenna version of previous attack Use directional antenna to send different localization beacons to each anchor  Other anchors cannot hear the directional packet  Falsifying distance to each anchor separately can allow undetectable (consistent) forgery Two versions: Sequential: attacker sends the beacons sequentially to the different anchors Concurrent: attacker has multiple radios and can concurrently forge distances

Defense Sequential version can be defended by having anchors be loosely synchronized Can detect the different time stamps on the packets received by the different anchors Concurrent version challenging A sophisticated attacker with expensive H/W MAC level authentication? Moving anchors? Other sensors detecting inconsistency?

Compromising Anchors So far, assumed anchors are trusted If they are compromised they can assist nodes in falsifying their location Cause errors in the localization of legitimate nodes Correctly evaluating location under byzantine failure is a variant of byzantine quorum However, unlike classical byzantine quorum, consensus is on an indirect value (location) With n anchors in range, can localize correctly if  3+ceiling((n-3)/2) anchors are not compromised Can use threshold cryptography or similar approaches to ensure that a rogue anchor doesn ’ t bypass localization process

Possible Attacks Mobility attack: Localize and obtain a valid localization certificate Move to a new location and use the invalid (but certified) location to do mischief  Or send the certificate to a proxy node that can use it Defense: Have anchors in an area responsible for supplying certified location Place time bounds on location validity (energy- security tradeoff)

Secure Multi-path Routing

Forwarding Misbehavior Misbehaving nodes can mis-route or selectively forward packets Can have valid location estimates Since GF is completely localized, problem is difficult to detect A node has no idea where the packet should be sent beyond its current next hop

Proposed Solution Multi-path routing: Select next hop probabilistically among forwarding set  Probability proportional to trust (aka reputation) Trust estimate is adapted over time Based on observed behavior of the nodes How to detect misbehavior?

Detecting Misbehavior/Updating Trust Trust updated up or down depending on observed behavior of neighbors Rebroadcast check A sending node hears if the next hop forwards it again  Drop reputation if not Not fool proof  Can miss rebroadcast due to collision or fading  Next hop can pretend to forward the packet to a non-existing next hop neighbor (securely building 2-hop neighbor cliques can help here) Trust consensus Exchange trust estimates with neighbors among neighbors that are trustworthy

Summary Sybil, blackhole and wormhole attacks require location falsification in GF Prevented using location verification mechanism Forwarding misbehavior does not depend on location falsification Multi-path routing helps avoid bad paths even when misbehaving nodes are not known Building and tracking reputation helps ostracize misbehaving nodes

Conclusions Presented a verified localization algorithm for use in GF in WSNs Specific to range-based localization Outlined a number of attacks and their defense Derived limit for anchor byzantine quorum on location Presented a preliminary secure routing protocol Use probabilistically multi-path routing Track trust estimate to discover and avoid bad paths

Future/Ongoing Work Extend to range-free localization Extended to the case with compromised anchors Extend to void avoidance/face routing Virtual Coordinate routing Initialize node coordinates and use them as identifiers and for routing Similar to GF, but some unique and more difficult attacks Explore interaction with localization errors Evaluate trust-based multi-path routing on motes

Conclusion WSN security is challenging, relatively new area of research #Problems >> #Solutions Any ideas to address challenges?

Thank you – Any questions?