Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Denial of Service in Sensor Networks Szymon Olesiak.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Containing DoS Attacks in Broadcast Authentication in Sensor Networks (Ronghua Wang, Wenliang Du, Peng Ning) Containing DoS Attacks in Broadcast Authentication.
Marcin Poturalski, Manuel Flury,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Effectiveness of Distance Decreasing Attacks Against Impulse Radio Ranging Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu, David Evans Jason Buckingham CSCI 7143: Secure Sensor Networks November 2, 2004.
Data Consistency in Sensor Networks: Secure Agreement Fatemeh Borran Supervised by: Panos Papadimitratos, Marcin Poturalski Prof. Jean-Pierre Hubaux IC-29.
A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks Reza Shokri Tutors: Panos Papadimitratos, Marcin Poturalski 29 January 2008.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Impact of Radio Irregularity on Wireless Sensor Networks
Yih-Chun Hu Carnegie Mellon University
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
1 Jean-Pierre Hubaux EPFL/School of Information and Communication Secure Mobility.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security of Routing Protocols in Ad Hoc Wireless Networks presented by Reza Curtmola – Advanced Topics in Wireless Networks.
SAR-SSI, 16/05/2014Cristina Onete CIDRE Keep your friends close with distance-bounding protocols.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Ad Hoc Network.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Security in Wireless Networks Mike Swift CSE b Summer 2003.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Packet Leashes: Defense Against Wormhole Attacks
Presentation transcript:

Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux

Proliferation of Wireless Networks 2 Wireless Sensor Networks WiFi and Bluetooth enabled devices RFID

Proliferation of Wireless Networks Strength of wireless networks: – Any devices in range can communicate without additional infrastructure Enables ad-hoc and mobile networking – Devices do not know in advance with whom they can communicate Neighbor Discovery becomes essential: – Can wireless device A communicate directly with wireless device B? 3

Neighbor Discovery How to achieve Neighbor Discovery? 4

Neighbor Discovery How to achieve Neighbor Discovery? Simple, widely used solution, but not secure 5 A B “Hello, I’m A” B: “A is my neighbor”

Attacking Neighbor Discovery “Relay” or “Wormhole” Attack The adversary simply relays the message A “Hello, I’m A” B: “A is my neighbor” M 6

Attacking ND: Routing in Sensor Networks 7 [1] Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. INFOCOM 2003

Attacking ND: Routing in Sensor Networks 8 The adversary sets up a wormhole, convincing remote nodes they are neighbors [1] Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. INFOCOM 2003

Attacking ND: Routing in Sensor Networks 9 This “shortcut” attracts many routes The adversary can eavesdrop, modify, or drop (DoS) Local attack with global impact!

Attacking ND: RFID Access Control 10 [2] Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contact-less smartcard. SECURECOMM 2005

Attacking Neighbor Discovery “Relay” or “Wormhole” Attack The adversary does not modify any messages Cryptography alone cannot help A “Hello, I’m A” B: “A is my neighbor” M 11

Securing Neighbor Discovery Use message time-of-flight to measure distance Reject “neighbors” who are too far away – Distance Bounding [3] – Temporal Packet Leashes [1] – SECTOR [4] Use node location to measure distance – Geographical Packet Leashes [1] 12 [1] Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. INFOCOM 2003 [3] S. Brands and D. Chaum. Distance-bounding protocols. EUROCRYPT '93 [4] S. Capkun, L. Buttyan, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. SASN '03

Our Contribution: “provable” Model taking into account physical aspects of the wireless environment Previously [5]: Impossibility result for time-based protocols 13 [5] M. Poturalski, P. Papadimitratos, and J.-P. Hubaux. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility. ASIACCS '08 obstacle A B M A B No time-based protocol can distinguish these two situations

Our Contribution: “provable” Model taking into account physical aspects of the wireless environment This work: Proving the correctness of ND protocols – Model extended and modified Closer representation of the wireless environment – Stronger availability properties – Composability 14

Outline The model ND properties Example ND protocol Skip proof Limitations and possible extensions 15

Messages Any of the following is a message: An authenticator is a message: A concatenation is a message: Message are essentially terms – Subterm relation 16

Messages: Temporal Structure Message m has a duration | m | – message transmission time (bit-rate dependant) Duration is preserved by concatenation m1m1 m2m2 m3m3 mkmk 17

Events 18 t – start time Events temporal structure: inherited from m

Events m1m1 t 19 t – start time Events temporal structure: inherited from m Useful notation:

Traces A trace model a system execution A trace  in  is a set of events 20 A B C

Traces A trace model a system execution A trace  in  is a set of events 21 A B C A receives m 2 before B sends it…

Traces A trace model a system execution A trace  in  is a set of events 22 A B C We need to constrain traces to make them meaningful

Setting A setting models an instance of the environment Formally: S = (nodes, loc, type, link, nlos) 23

Setting S = (nodes, loc, type, link, nlos) 24 { A, B, C, D, E, F, G, H } The nodes in the setting Notation: V

Setting S = (nodes, loc, type, link, nlos) H A C B D G F E 25 Location of every node Notation: dist

Setting S = (nodes, loc, type, link, nlos) H A C B D G F E 26 Type of every node: correct/adversarial Notation: V cor / V adv

Setting S = (nodes, loc, type, link, nlos) H A C B D G F E 27 The link/neighbor function Notation: communication possible not link A to B is up at time t links A to B and B to A are up at time t

Setting S = (nodes, loc, type, link, nlos) 28 H A C B D G F E Non-line-of-sight “delay” nlos(A,B)  0 The additional distance the signal needs to traverse

Feasible Traces A feasible trace  in  S,P,A satisfies constraints imposed by: – a setting S Communication follows the laws of physics – a protocol P Correct nodes follow protocol P – adversary model A Adversarial nodes abide with adversary model 29

Setting-feasible Traces A B 30 v – wireless channel propagation speed

Setting-feasible Traces A B 31 v – wireless channel propagation speed

Setting-feasible Traces A B 32 v – wireless channel propagation speed

Setting-feasible Traces A B 33 v – wireless channel propagation speed propagation delay

Setting-feasible Traces Full form of this rule includes the Dcast event Dual rules: – If there is a Bcast/Dcast event and a link is up, there will be an Receive event 34

Adversary-feasible Traces Adversarial nodes can behave arbitrarily, except respecting: – unforgability of authenticators – freshness of nonces 35 Authenticators and nonces need to be relayed

Adversary-feasible Traces 36 A

Adversary-feasible Traces 37 auth B ( m 0 ) A

Adversary-feasible Traces 38 auth B ( m 0 ) A

Adversary-feasible Traces 39 auth B ( m 0 ) A

Adversary-feasible Traces 40 auth B ( m 0 ) A  relay – the minimum processing delay when relaying

Adversary-feasible Traces Adversarial nodes can communicate over an adversarial channel with information propagation speed v adv  v 41 auth B ( m 0 ) A

Protocol-feasible Traces Rules are protocol-specific One general rule that requires correct nodes to respect the freshness of nonces 42

Protocol-feasible Traces 43 n n B

Protocol-feasible Traces 44 n n B

ND Properties Correctness: “declared neighbors are actual neighbors” 45

ND Properties Correctness: “declared neighbors are actual neighbors” 46

ND Properties Correctness: “declared neighbors are actual neighbors” 47

ND Properties Correctness: “declared neighbors are actual neighbors” 48

ND Properties Correctness: “declared neighbors are actual neighbors” 49

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 50

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 51

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 52

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 53

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 54

ND Properties Correctness: “declared neighbors are actual neighbors” Availability: “actual neighbor are declared neighbors” T P – protocol specific duration 55

Protocol P CR/TL : Challenge-Response/Time-and-Location 56 challenge message response message authentication message

Protocol P CR/TL : Challenge-Response/Time-and-Location 57 challenge message response message authentication message Comment: “Hard to see the connection between this informal presentation and formal protocol definition” Solution: Intermediate form: informal “implementation” is pseudo-code

Protocol P CR/TL : pseudo-code 58 block A block states what events a node executes when an event of interest occurs

59 Protocol P CR/TL : pseudo-code

60 Protocol P CR/TL : pseudo-code

61 Protocol P CR/TL : pseudo-code

62 Protocol P CR/TL : rules

63 Protocol P CR/TL : rules

64 Protocol P CR/TL : rules

65 Protocol P CR/TL : behavior restriction With these rules we can prove availability To prove correctness, we need to restrict nodes’ behavior wrt. Bcast and Neighbor events

66 Protocol P CR/TL : Bcast restriction First attempt: Every Bcast is one these three events

67 Protocol P CR/TL : Bcast restriction First attempt: Every Bcast is one these three events Too restrictive! No other protocol can be executed by the nodes

68 Protocol P CR/TL : composability Better solution: Bcast of particular authenticators has to be the authentication message

69 Protocol P CR/TL : Neighbor restriction Every Neighbor event has to be one of these two events

Result Theorem: Protocol P CR/TL satisfies the Neighbor Discovery Specification: Correctness ( ND 1) Availability ( ND 2 CR/TL ) Under the assumptions: Relaying processing delay  relay > 0 Equality of maximum information propagation speed and wireless channel propagation speed v adv = v 70

Future Work: ND with adversarial nodes P CR/TL needs all nodes to be correct Partial solution: Distance-Bounding protocols [3] Cannot express DB in our model, as it uses: – xor – commitments – rapid bit exchange: protocol sends single fresh bits Not compatible with our definition of freshness 71 [3] S. Brands and D. Chaum. Distance-bounding protocols. EUROCRYPT '93

Future Work: ND with adversarial nodes Can one do without the rapid bit exchange? No: Bit level attack [6]: Need to shift model to bit level to reason about ND with adversarial nodes 72 guess a few bits C R = f(C) [6] J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore. So near and yet so far: Distance-bounding attacks in wireless networks. ESAS 2006.

Conclusions Proving the correctness of Secure Neighbor Discover protocols A model or wireless networks Secure Neighbor Discovery specification Definition of a Secure Neighbor Discovery protocol Highlighted interesting future directions 73

In the paper Proofs Other Secure Neighbor Discovery protocols – P CR/T - challenge-response / time-based protocol – P B/T - beacon / time-based protocol – P B/TL - beacon / time-and-location-based protocol Our model captures the differences in their – functionality – assumptions / requirements 74