Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.

Slides:



Advertisements
Similar presentations
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Advertisements

Multi-Party Contract Signing Sam Hasinoff April 9, 2001.
Impossibility of Distributed Consensus with One Faulty Process
DISTRIBUTED SYSTEMS II FAULT-TOLERANT BROADCAST Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Henry C. H. Chen and Patrick P. C. Lee
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Announcements. Midterm Open book, open note, closed neighbor No other external sources No portable electronic devices other than medically necessary medical.
Achieving Byzantine Agreement and Broadcast against Rational Adversaries Adam Groce Aishwarya Thiruvengadam Ateeq Sharfuddin CMSC 858F: Algorithmic Game.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Byzantine Generals Problem: Solution using signed messages.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
 Idit Keidar, Technion Intel Academic Seminars, February Octopus A Fault-Tolerant and Efficient Ad-hoc Routing Protocol Idit Keidar, Technion Joint.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
SybilCast: Broadcast on the Open Airwaves SETH GILBERT, CHAODONG ZHENG National University of Singapore.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Practical Byzantine Fault Tolerance
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes Haowen Chan, Adrian Perrig Carnegie Mellon University 1.
Richard Ogier Presented by Tom Henderson July 28, 2011
Packet Leashes: Defense Against Wormhole Attacks
MinJi Kim, Muriel Médard, João Barros
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Outline Distributed Mutual Exclusion Distributed Deadlock Detection
Jacob Gardner & Chuan Guo
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport

The problem

Authenticated Broadcast N nodes distributed in an ad-hoc network A source node S has a message to distribute to other nodes Properties: – Reliable Broadcast: the message should be distributed to all honest devices – Authentication: an honest device should accept the message only if it originates at the source Challenge: We need to do this without cryptography!

The problem Figure 1. We need to deliver the message from the source S to the honest nodes (blue) in spite of the disruptive malicious adversaries (red).

Previous Results Distributed Computing Theory: – [Koo]: at most ≈ ¼ of nodes in a neighborhood may fail – [Bhandari, Vaidya]: optimally-resilient protocol – [Gilbert, Guerraoui, Newport]: bit-by-bit transmission is optimal in the single-hop case Applied Networking: – Hubaux et al., Strasser et al. : Integrity codes, transmission via frequency hopping, MAC protocols The Cryptographers: – Lower bound by Boneh et al. : either synchronization or digital signatures are required – Protocols: TESLA by Perrig et al.

Our results We introduce two protocols that solve the problem, without employing any cryptography. RobustRB: optimally resilient, and asymptotically optimal in terms of running time. FastRB: trades some resilience (in theory) for vastly improved efficiency.

The model Nodes know their location, are synchronized and agree on a communication (TDMA) schedule in advance The adversary is Byzantine: – Crash failures – Jamming – “Spoofing” messages The adversary may cause collisions; however, receivers are always able to detect the collisions The energy of the adversary in a neighborhood is limited

Plan 1.Introduction 2.RobustRB: the building blocks 3.FastRB: faster is better 4.Simulation and Performance 5.Conclusions

One-hop transmission

The idea: 1.the source broadcasts the message 2.the receiver broadcasts back the message 3.if the message received is the same as the one sent, then the source is silent 4.otherwise, the source broadcasts a “veto” message and repeats 5.The receiver replies with the veto 6.If it receives a veto, the source repeats = source is silent ≠ message This procedure works because the adversary cannot turn the “veto” into silence.

The two-hop case Q: Is there a problem in this configuration? A: Kein Problem!

The two-hop case Q: How about now? A: There are problems when sending multiple messages. Fix: Append an alternating “sequence bit” to every message. 1 1

Recap So far, we know how to send a message securely over one hop in a multi-hop network The sender repeats the entire message every time it receives a veto [Gilbert, Guerraoui, Newport]: In this setting, the optimal strategy is to send the message bit-by-bit over one hop.

The multi-hop case

RobustRB Sending message across multiple hops, given authenticated single-hop transmission Based on a protocol by [Bhandari-Vaidya] The protocol assumes that nodes know a bound T on the number of malicious nodes in a neighborhood The protocol tolerates ¼ of nodes in a neighborhood to be malicious, which is optimal [Koo]

RobustRB: multi-hop idea T = 1 Idea: A node waits to receive a message across T + 1 disjoint paths located in the same neighborhood.

Do we stop here? The protocol is optimally resilient It is also asymptotically optimal in terms of running time How well does it perform in practice? Map size30 x 30 map40 x 40 map Robust RB cycles cycles Simple Epidemic342 cycles380 cycles Quotient158169

Back to the drawing board… Yes, but this happens very rarely! 6x 5x

A new approach Insight 1: We trade some (theoretical) resiliency to make the protocol more efficient Insight 2: In many applications, the nodes are densely distributed

FastRB 1.Adjacent cells can communicate 2.A node VETOes if it hears that a node in its cell broadcasts “suspicious” data

“Neighborhood Watch” Lemma: As long as there exists no cell that only contains “pirates”, no dishonest message is ever delivered.

FastRB

Observation: The protocol becomes more robust if it requires 2 or more cells to “vote” for the message.

FastRB Uses the density of the network to keep byzantine nodes “in check” The resulting structure is a grid of “meta- nodes”, on which we may apply routing algorithms The protocol can be made more resilient by implementing a “voting” variant It is simpler to implement

FastRB: Running time comparison Protocol30x30 map40x40 map50 x 50 map FastRB2568 cycles2970 cycles3048 cycles Simple Epidemic342 cycles380 cycles400 cycles Quotient

Plan Introduction RobustRB: the building blocks FastRB: faster is better Simulation and Performance Conclusions

Success rate Note: In this case, density 1 means a device has an expected number of about 20 neighbors.

Resilience

Network designer’s perspective

Jamming adversaries

Evaluation The success rate of FastRB is superior, since it requires simple connectivity Both protocols are resilient to Byzantine adversaries, as expected If nodes are distributed uniformly at random, the FastRB protocol is at least as resilient as RobustRB

The slide to remember 1.Wireless networks can tolerate Byzantine faults without use of cryptography 2.The state-of-the-art optimally resilient solution (RobustRB) can be slow in practice 3.There is a solution (FastRB) that achieves good levels of fault tolerance, while ensuring low overhead

Tolerance calculations For the experiments, R = 4, so the expected number of neighbors of a node is 80. The parameter T = 3 means that at most 3 of these should be malicious, therefore the tolerance percentage should be 3 / 80 = 3.75% For FastRB, there are about 1.5 nodes/neighborhood The expected number of neighborhoods that are entirely malicious is around 10!