Wireless Sensor Networks Security and Privacy Professor Jack Stankovic Department of Computer Science University of Virginia.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
SPINS: Security Protocols in Sensor Networks
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Security for Broadcast Network
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Network Security Celia Li Computer Science and Engineering York University.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Packet Leashes: Defense Against Wormhole Attacks
SPINS: Security Protocols for Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Aggregation.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Wireless Sensor Networks Security and Privacy Professor Jack Stankovic Department of Computer Science University of Virginia

Security Complex, many aspects to consider Opportunity to address this properly – from the start! New (severe) constraints (memory, bandwidth, cpu processing speeds, power, …) –Lightweight solutions required Symmetric cryptography (asymmetric crypto is probably too expensive) Digital signature – 300 bytes/packet

Question If, for some reasons, WSNs did not have the significant impact we have been projecting, what might those reasons be? –Poor security – easy to make systems ineffective/unreliable –Privacy policy – laws that state that thou shall not deploy WSNs in public places

Question Is it possible to build secure WSN? VigilNet – 40 services (each can be attacked) –Solutions for each won’t fit Weaker guarantees and evolve

VigilNet Architecture

Outline Basic Problems Routing Problems –Solutions SPINS Denial of Service Privacy Summary

Basic Problems Vulnerability of channels (eavesdrop and inject fake messages) Vulnerability of nodes (capture, modify messages, re-route) (or add new nodes) Absence of infrastructure (e.g., no centralized certification authorities) Dynamically changing topology (difficult to distinguish between dynamics and attacks) Minimum capacity devices –Drain batteries Real-Time – slow packets down

Basic Problems Most existing solutions are too costly –Digital signatures – adds as much as 300 bytes/packet –Asymmetric crypto adds large variables and large memory costs, etc. Don’t handle broadcasting type operations

Communication Scenarios Confidentiality (eavesdrop) Adversary Node1 Base Station Msg Node2 Eavesdropping is Good for Debugging

Communication Scenarios Integrity Adversary Node1 Base Station Msg1 Msg1’

Communication Scenarios Authenticity Base Station Adversary Node 1 Node 2 Node 3 Node 4 I am the Base Station Reprogram system Reset system parameters

Security Assumptions Trust and Key Management –Trust base station and oneself –Symmetric Keys Active area of research – how to disseminate private keys

Security Solutions Very difficult Fn(assumptions made) –E.g., attack model Themes for Security in WSN –Operate in the presence of security attacks –Self-heal –Evolve to new attacks

Routing - Threat Models and Security Goals Threat Model: –Mote-class vs. laptop-class adversaries –Insiders vs. outsiders Security Goals: –Authenticity: verifies the identity of the sender –Integrity: messages are not tampered with –Availability: messages are received by intended receivers –Confidentiality: no eavesdropping Insiders and laptop-class adversaries are difficult challenges

Routing - Network Assumptions –Insecure Radio Links –Eavesdropping, modifying bits, and packet replays –Attacker has similar capabilities (HW, etc.) –Except, Attacker may have high quality (long-range) communications –Nodes can be “turned” –Attacker controls > 1 node; collusion is possible –Tamper resistant nodes are not realistic

Routing - Trust Requirements –Base Stations are trustworthy –Random key pre-distributions are valid Initialization procedure prior to deployment –Global (pair-wise) key, pools of keys, etc. Neighbor to neighbor key establishment after deployment Note: Too expensive to involve base station on all transactions

WSN Routing Attacks Spoofing Selective Forwarding Blackhole/Sinkhole Sybil Wormholes HELLO Floods Many routing protocols have been proposed, but few with security as a goal ! (consider all the ones we studied in this course)

Route Where? Each node to base station Nodes to aggregation points and then from aggregation point to base station Between 2 (n) nodes (peer to peer) Between 2 (n) areas Among all members of a (static / dynamic) group

Routing Attacks adversary base station sensor node high quality wireless link Attacks: try to manipulate user/application data or affect the underlying routing topology (state information)

Attack: Bogus Routing Information Spoofed, altered, or relayed routing information causes problems Example: spoof routing table beacons or claim to be base station –Can attract traffic Attacker becomes part of routing tree

Attacks: Selective Forwarding / Blackholes / Sinkholes Only forward a select few… drop / modify remaining packets Forward none – blackhole Sinkhole – lure all traffic through a compromised node; enables selective forwarding

Attack: Sybil attack An adversary may present multiple identities to other nodes FT implications: routes believing to be using disjoint nodes could be using a single adversary –E.G., an attacker node could provide multiple geographic locations to pretend to be in more than 1 place at a time A B I am at A and B

Attack: Wormholes Tunnel packets received in one part of the network and replays them in a different part Two distant malicious nodes collude to understate their distance from each other by relaying packets along a private channel between them Enables other attacks – confuses topology

Attack: HELLO floods Hello packets to announce presence of a node Assumption: the sender of a received packet is within normal radio range False! A powerful transmitter could reach the entire network Disrupts routing paths

Recall - SPEED SPEED: A Semi-Stateless Protocol for Real-Time Communication in Sensor Networks. Uses neighbor tables Strong Back-Pressure (Congestion) Area Anycast Multicast

SPEED Delay 11 SPEED Node 5's NT Delay 0.5s 0.1s 0.4s 0.1s ID Packet Source Destination Attack – change table

RAP RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks. 1 Packets with Different Velocities Respecting Deadlines and Priorities Attack – change velocity; Different order of delivery

SPEED and RAP: Routing Security Analysis Convince nodes to change their state tables (delay, source, destination, distance, deadlines, velocities). Flood network with high velocity packets (i.e. short deadlines or large distances). Change the radius of the last mile process. Local forwarding decisions allow some types of attacks to not be noticed. Example: a destination that is “beyond” the edge of the network. Just lower the velocity of a packet which will end up missing its deadline later and will be dropped.

Solution - SPINS Suite of security protocols optimized for sensor networks Practical on minimal hardware –Memory constraints –Energy constraints –CPU constraints Can be used for building higher level protocols, like secure routing

Definition Secure Channel: a communication channel that offers –Confidentiality no eavesdropping –Data authentication you know who sent message –Integrity data not changed –Data freshness Weak – correct order Strong – recent in terms of time

SPINS: 2 Building Blocks SNEP (Sensor-Network Encryption Protocol) –Encryption Protocol Data confidentiality and integrity –Secure point-to-point communication 2-party authentication –Data freshness (adversary can’t replay old messages)  TESLA (Micro Timed Efficient Stream Loss- tolerant Authentication) –Provides streaming broadcast authentication

Typical Cost Authenticated Broadcast –Asymmetric digital signature Up to bytes (of overhead) per packet Need a different solution

System Assumptions Communication patterns –Frequent node-base station exchanges –Frequent network flooding from base –Node-node interactions infrequent (not including multi-hop routing relays) Base station –Sufficient memory, power –Shares secret key with each node Node –Limited resources, limited trust –Each node trusts itself

Design Asymmetric cryptography is too expensive Use symmetric cryptography primitives A simple symmetric encryption function (RC5) provides: –Encryption & Decryption –Message Authentication Code (MAC) –Pseudorandom number generation –Hash Function Overhead is only 8 bytes per packet Use single block cipher (for code reuse)

Block Cipher: RC5 Subset of RC5 with 40% reduction in code size Low memory requirements Cipher text is the same size as the original text They rejected AES and DES as too expensive Plaintext RC5 block cipher Key Ciphertext

Key Generation/Setup Nodes and base station share a master key (pre-deployment) Other keys are bootstrapped from the master key: –Encryption keys (different for each direction between 2 nodes) –Message Authentication code key (different for each direction) –Random number generator key Ctr RC5 Block Cipher Master Key Key MAC Key Encryption Key random F is a pseudo- Random function to generate keys

SNEP Encryption Encrypted-data = {D} Counter is shared state – but not sent in message like usual solutions; maintained at each pair of nodes With the counter, even the same message is encrypted differently each time RC5 generates “random” data to XOR with message Counter RC5 Block Cipher Key Encryption + PjPj CjCj

SNEP Encryption Weak freshness guaranteed; counter must increase Decryption is identical Counter+1 RC5 Block Cipher Key Encryption + P j+1 C j+1 Counter+1 RC5 Block Cipher Key decryption + P j+1

SNEP MAC Message Authentication Code = MAC(K MAC, X) MAC uses Cipher Block Chaining (CBC) Every block of input affects output K MAC RC5 X1X1 K MAC RC5 X2X2 K MAC RC5 X3X3 MAC ++

Authentication, Confidentiality Without encryption on MSG, can have authentication only For encrypted messages, the counter is included in the MAC Counter in MAC prevents replays Node A Msg, MAC(K MAC, Msg) {Msg} <Kencryption, Counter), MAC(K MAC, Counter|| {Msg} ) Node B

Spins So Far SNEP –Encryption Protocol (RC5) Data confidentiality and integrity –Secure point-to-point communication 2-party authentication MAC based on RC5 –Data freshness (adversary can’t replay old messages) Counters

Broadcast Authentication Broadcast is basic communication mechanism Sender broadcasts data Each receiver verifies data origin Sender R1 M R4 M R3R2 MM

 TESLA Protocol TESLA : efficient source authentication in multicast for wired networks. µ TESLA: broadcast authentication for WSNs. –TESLA is too expensive for WSN

 TESLA Protocol Compare & Contrast (similarities) –Both require loose time sync. between BS and each node. –Both uses one-way hash function to produce a chain of secret keys in the sender, each key corresponding to a time interval at which the sender sends a packet. –Both maintain a key disclosure schedule known to both sender and receiver. –Receiver holds off the authentication of a packet until the required key is disclosed.

 TESLA Compare & Contrast Differences µ TESLA removes or adapts the expensive features of TESLA:  Asymmetric digital signature is replaced by symmetric key  Frequency of key disclosure is greatly lessened  Only the Base Station stores the key chain  Inter-node communication is made possible by the Base Station

 TESLA Overview Provides authenticated broadcast mechanism Must have an asymmetric mechanism to prevent forgery Why not use asymmetric digital signatures? –Expensive computation, storage, and communication Asymmetry: delayed key disclosure –Requires loosely synchronized clocks

Simple MAC Insecure for Broadcast Sender R1 M, MAC(K,M) R4 M, MAC(K,M) M’, MAC(K,M’) K K K

Key Setup Main idea: One-way key chains –BS chooses K(n) – easy to compute K(n-1) –BS computes entire chain K 0 is initial commitment to chain Base station gives K 0 to all nodes –Nodes can’t compute K(1) KnKn K n-1 K1K1 K0K0 X ……. F(Kn)F(K1)F(K2)

Broadcast Divide time into intervals Associate K i with interval i Messages sent in interval i use K i in MAC K i is revealed at time i +  Nodes authenticate K i and messages using K i K0K0 K1K1 K2K2 K3K3 … time  K 0 Revealed Here

Robustness to Packet Loss K2K3K4K5 t Time 2 Time 3Time 4Time 5 K1 P5 K3 P3 K1 P2 K0 P1 K0 Verify MACs P4 K2 FF Authenticate K3 Time 1 REAVEALING Key K0

 TESLA Issues Important parameters: time interval, disclosure delay Delay must be greater than RTT to ensure integrity Parameters define maximum delay until messages can be processed Nodes must buffer broadcasts until key is disclosed Requires loose time synchronization in network Base station commits to maximum number of broadcasts when forming chain –When current chain is exhausted, all nodes must be bootstrapped with a new one

Evaluation (Memory)

Evaluation (Execution Time) 2.5 ms to encrypt a 16 byte message 18 ms to deal with broadcast authentication

Evaluation (Energy cost) Total cost to send a message Highest overhead is from transmission of 8-byte MAC per packet Extra Bytes

Authenticated Routing Simple “Breadth-first search” routing algorithm Routing scheme assumes bidirectional communication Base station periodically broadcasts beacon BS

Authenticated Routing First reception of authenticated beacon during current routing interval defines “parent” At reception of a beacon, if it’s fresh then accept sender as its parent in the route and broadcast another beacon with the node’s id as sender id BS

Authenticated Routing Attacker cannot re-route any link – won’t authenticate BS

Authenticated Routing Final tree BS

SPINS Summary Focus on WSN communication patterns Meet severe energy, time, memory constraints Time synchronized network Pre-loaded master keys Basic techniques to be used in other protocols

Denial of Service Ref: Denial of Service in Sensor Networks; Wood & Stankovic

The Jamming Problem Jamming disrupts communication around the source Expensive to prevent—but can detect it J

Solution Summary J Edge nodes blindly report jamming Inner nodes sleep Outer nodes map collaboratively Jammed area

Jam Detection Highly decentralized algorithm: –Loose group semantics, eager eavesdropping, supremacy of local information, robustness to packet loss and failure –Does not consider other security attacks

A Mapping Service Map jammed-area and export to other modules Possibilities for using this information: –Report jammed area to base station Send in vehicle –Route around jammed area –Lower duty-cycle to save energy –Redirect any queries to services in jammed area –Expose area as programmer-accessible entity

Summary - Security Solutions from the start (too late?) Lightweight solutions required System must operate in presence of faults AND attacks Framework needed for security updates as attacks evolve over time

Summary - Security Define new trust models Key distribution schemes (static and dynamic) Routing, secure groups, denial of service, localization, … Can solutions exploit –Physical properties? Directional antennas, time validity intervals of data, velocity, … –Density? –Redundancy? –HW?

Medical System Architecture InternetInternet Internet PDAs Nurses Stations

Smart Living Health Spaces

Motivation What is privacy? –“ The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others ” – Alan Westin WSN in healthcare

Many Stakeholders Patients Patients family and friends Doctors Nurses Technicians Orderlies Admin Social Workers

Privacy Very complex, dynamic Differs for different countries, people, etc. Build into WSN at start Filters –Example: only transmit aggregated information about people in an area not ID based information Showstopper?

Authorization Framework Ask for data Change policy

Request Expressions Mandatory: – Optional: –[Aggregate Function] –[Time] –[Place] –[Conditions] –[Set Values] Example: Nurse N1 requests to read pulse of patient P1 for 30 minutes if P1 ’ s pulse is lower than 50 bpm  N1 read (P1,pulse) [t1,t1+30] if (P1,pulse) < 50 Roles, UserID, roomID, floorID Read, write, delete, add, set EKG, pulse, motion, light, temp, activity max, min, avg single time t, periodic [t1,t2] Bed, room, floor, =, >, =, single value, range

Policy Components –Request Subject –Rule: (action, ruling, context) –Data Subject –Data –Examples: Doctor (read,allow,critical condition) (patient, activity data)  Role policy DoctorX (read, deny) (patient, activity data)  Individual policy

Representation Directed Acyclic Graph –Nodes: Individual user Role Data –Edges: Inheritance Data association Rule: (action, ruling, context)

Privacy Policy Representation - Example

Policy Inconsistency Types Syntax inconsistency Semantic inconsistency –Multiple-role –Role vs. individual policy –Multiple rule instances

Inconsistency Detection Example

Privacy Added requirements for WSN –WSN specific Lightweight and Integrated Solutions –Highly dynamic Alarms Override when necessary –Highly distributed access and data creation –Data is transient –Notion of inanimate objects

Possible Approach Privacy filters –Collect what is needed; no more Blurring Reactive to critical situations –Real-Time Privacy WSN-Privacy Language Consistency checks (at different levels of granularity, at different times) Across enterprise trust domains

Summary - Research Q. How do we compose untrustworthy entities into a trustworthy aggregation –And how to maintain this trust as topology changes Lightweight key management Routing, denial of service, intrusion detection, authentication, localization, etc. Adaptive security and privacy service