Detection of Denial-of-Message Attacks on Sensor Network Broadcasts Jonathan M.McCune Elaine Shi Adrian Perrig and Michael K.Reiter.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Containing DoS Attacks in Broadcast Authentication in Sensor Networks (Ronghua Wang, Wenliang Du, Peng Ning) Containing DoS Attacks in Broadcast Authentication.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
Computer Science SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao April 24, 2007.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Calculating Discrete Logarithms John Hawley Nicolette Nicolosi Ryan Rivard.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Re-Configurable Byzantine Quorum System Lei Kong S. Arun Mustaque Ahamad Doug Blough.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
1 Query-Flood DoS Attacks in Gnutella by Andreas Legrum based upon a paper by Neil Daswani and Hector Garcia-Molina.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Security for Broadcast Network
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Packet Leashes: Defense Against Wormhole Attacks
Defending Against DDoS
Presentation transcript:

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts Jonathan M.McCune Elaine Shi Adrian Perrig and Michael K.Reiter

Introduction Message broadcast is a fundamental communication primitive in most sensor networks. Sensor nodes are deprived of broadcast messages under the Denial-of-Message ( DoM ) attack. A simple approach is for every broadcast recipient to send an authenticated acknowledgement for each broadcast message, which can cause the ACK implosion problem. The attacker’s goal is to deny the broadcast to as many nodes as possible while remaining undetected by the base station. The designer’s goal is to limit the attacker’s capacity to achieve this.

Attack Taxonomy Attacks Against Flooding  Blocking attack An attacker may seek to compromise a vertex cut set of nodes, thereby partitioning the network into two halves, with complete control over communications between partitions.  Without enough nodes to obtain a vertex cut set  Denial of service (DOS)  Jamming

Cluster based flooding  It is only necessary to prevent cluster-heads from forwarding messages.  Attackers can be successful with far fewer compromised node. Tree based flooding  For the blocking attack, it will suffice to block non-leaf nodes.  Malicious nodes can also violate the clustering protocol to get elected as non-leaf nodes to get an advantage. Weaknesses in Efficient Broadcast

SIS allows us to detect a disruptive adversary and in the meantime, reduce the number of acknowledgements sent to the base station. SIS only requires a subset of recipients acknowledge each broadcast. This subset is computed deterministically but in a way that is hidden from the attacker. Secure Implicit Sampling (SIS)

Assumptions A base station which is considerably more powerful than ordinary sensor nodes. Base station is the source of all legitimate broadcast messages. A secure key-management protocol is present to establish and manage secure pair-wise keys between each node and the base station.

The basic protocol Assumptions  A base station which is considerably more powerful than ordinary sensor nodes.  Base station is the source of all legitimate broadcast messages.  A secure key-management protocol is present to establish and manage secure pair-wise keys between each node and the base station. Security Requirements  It is necessary to apply appropriate cryptographic functions to ensure data origin authentication.  An attacker must have no way of finding out which set of nodes are selected to send acknowledgement.

Notation Msgs: The set of possible broadcast messages. F: A pseudorandom functions family parameterized by a secret value K belonging to Keys(F). K sk F : A key randomly chosen from Keys(F) that is shared between the broadcast source and the node k. f p (x): f p is a function for which the fraction of inputs that map to 0 is p, and 1-p map to 1. MAC: A function family parameterized by a secret value K belonging to Keys(MAC). K sk MAC : A key randomly chosen from Keys(MAC) that is shared between the broadcast source and the node k.

The Secure Mechanism If K is randomly chosen from Keys(F), then an attacker not knowing K cannot distinguish F(K) from a randomly chosen function even after seeing F(K,m) many times. MAC is a message authentication code: If K is randomly chosen from Key(MAC), then an attacker not knowing K cannot produce MAC(K,m) fro any m even after having seen MAC(k, m’) may times.

Upon receiving a broadcast m from base state s, node k tests whether f p (F(K sk F,m))=0. If so, it sends a=MAC(K sk MAC,m) to s. Each node can be viewed as being selected independently with probability p to acknowledge. When s receives an acknowledge “a” purportedly from k for m, it confirms that MAC(K sk MAC,m)=a. For a particular round i, let S i be the number of ACKs expected, Ri be the number of ACKs received and confirmed. S can compute S i by checking fp(F(K sk F,m))=0 for every node k. If R i /S i <h, where h is a threshold, an alarm is raised.

Analysis Consider the ideal world first, where there is no packet loss. Let x be the number of victim nodes and p the probability that a node gets sampled. P ( false negative) = (1-p) x P ( detection)=1-P ( false negative) =1-(1-p) x False positive: signaling an attack when there is none. False negative: attackers being able to escape detection.

Let p i be the probability that the base station receives an ACK from the i th node given that it is sampled. The number of ACKs received approximates a Binomial distribution over p r0 and S i. S i is the number of expected ACKs in round i, and p r0 =(p 1 +p 2 +…+p n )/n. In the detection phase, the observed R i will deviate from the anticipated Binomial(S i,P r0 ) distribution. The following slide shows the derivation of detection probability, where f(s) is defined as:

The Optimal Attacker The success of attacker is defined in terms of the number of legitimate nodes deprived of a broadcast. His best strategy is to compromise all neighbors of the base station. If SIS is present, the above strategy will no longer be successful. A clever attacker will try to remain undetected with high probability while still doing damage to the network.

Model the attacker with MDP

Attacker Reward Function The attacker’s action is indicated by x, the number of victim nodes per round. r is the discount factor. In the no-loss case

Reward Analysis Consider the attacker and our detection system as two players in a zero-sum game. The gain of the attacker is the loss of our system. The attacker is entitled to choose x, while our system choose p. The equilibrium of the game is given by the following minimax construction.

Extensions and Discussion Exclusive-or Aggregation ( tree-based broadcast protocol)  Upon receiving acknowledgements from its children, node i can compute the XOR of its acknowledgement with those of all its children.  Node i will then forward ACK i up the tree towards the base station S.  Upon receiving acknowledgements from all of its neighbors, S can then compute the XOR of all received acknowledgements.  S will compare the expected value of XOR and the above one.

In the above scheme: If all nodes receive the broadcast, and all the aggregated acknowledgements arrive at the base station, then S can compute The base station can calculate the expected value for the XOR of all acknowledgements by iterating through the keys it share with each node for the purpose of computing acknowledgement MACs.

Reducing the Verifier’s Computational Overhead  Random acknowledgement: the broadcaster randomly selects a subset of nodes to sample ( return ACKs).  Random checking: the verifier randomly picks a subset of nodes to check whether they are sampled, and if so, whether they have indeed returned an ACK.

Explicit Acknowledgement Requests  The base station may need to explicitly request a set of nodes to acknowledge in each broadcast round.  Bloom filters can be used to encode a set of nodes from which the base station explicitly wants acknowledgements.  Bloom filters ensure that there are no false negative.  Given the Bloom filter, an adversary cannot figure out which set of nodes are selected, as long as shared keys between the base station and each node are kept secret.

Simulation Results First run hundreds of rounds of broadcast without attackers to get p r0. Then run thousands of rounds with various percentage of attackers to generate a large set of victim nodes. For each d of deprived nodes:

Conclusion and Future Work Contributions  SIS provides a general mechanism that allows us to sample a subset of network nodes for acknowledgements in a way hidden from the adversary.  Use a game theoretical model to evaluate SIS. Limitations  Assume that the network operates under stable conditions and nodes are immobile.  Assume that lost acknowledgements are uncorrelated.