Download presentation
Presentation is loading. Please wait.
1
Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley
2
How to think about security Security goals: Confidentiality Integrity Availability Threats: Outsiders? Insiders? Ordinary motes? Motes with superpowers?
3
Part I: Security against outsiders
4
The security risk: RF leakage
5
The outsider threat Lesson: build in security from the start
6
Keeping the outsider at bay networ k base station k k k k k k A simple approach: global shared keys
7
Global shared keys Advantages –Simple; reasonable performance Limitations –No security against insider attacks –What if a mote is compromised or stolen?
8
Part II: Security against insiders Tolerating compromised motes
9
Defending against insider attacks networ k base station k4k4 k5k5 k1k1 k3k3 k2k2 k 1, …, k 5 per-mote keying
10
Per-mote keying Advantages –Simple; reasonable performance –Lost motes don’t reveal rest of network’s keys Disadvantages –Motes can’t talk to each other without the help of the base station
11
Per-mote keying Advantages –Simple; reasonable performance –Lost motes don’t reveal rest of network’s keys Disadvantages –Motes can’t talk to each other without the help of the base station –Insiders can still falsify sensor readings
12
An example networ k base station Computing the average temperature 67° 64° 69° 71° 68° f( 67°, …, 68°) where f(x 1, …, x n ) = (x 1 + … + x n ) / n
13
An example + an attack networ k base station Computing the average temperature 67° 64° 69° 71° 68° f( 67°, …, 1,000°) where f(x 1, …, x n ) = (x 1 + … + x n ) / n 1,000° result is drastically affected
14
Resilient aggregation Some theory: –For f : n → , a random variable X on n, and σ = StdDev[f(X)], define Pow(A) = E[(f(A(X)) – f(X)) 2 ] 1/2 ⁄ σ –Say f is (m, α)-resilient if Pow(A) ≤ α for all adversaries A : n → n modifying only m of their inputs –Example: the “average” is not (m, α)-resilient for any constant α
15
Relevance of resilience Intuition –The (m, α)-resilient functions are the ones that can be meaningfully and securely computed in the presence of m malicious insiders. Formalism –Theorem. If f isn’t (m, α)-resilient, m insiders can bias f(...) by at least ± α σ, on average. If f is (m, α)-resilient, it can be computed centrally with bias at most ± α σ, for m insiders.
16
Examples f… is (m, α)-resilient, where averageα = ∞ average, discarding 5% outliers α ≈ 1.65 m/n 1/2 for m 0.05 n medianα ≈ m/n 1/2 for m < 0.5 n maxα = ∞ 95 th percentile “max”α ≈ O(m/n 1/2 ) for m < 0.05 n countα ≈ m/(p(1–p)n) 1/2 (assuming n independent Gaussian/Bernoulli distributions)
17
Primitives for aggregation (1) Computing with histograms –Theorem. If f is a (m, α)-resilient, symmetric function with ∑ i |∂f/∂x i | ≤ β, f can be computed securely using a histogram with buckets of width w. With m insiders, the bias will be at most about α σ + 0.5wβ.
18
Primitives for aggregation (2) Computing with random sampling –Idea in progress. If f is a (m, α)-resilient, symmetric function with ∑ i |∂f/∂x i | ≤ β, perhaps f can be computed securely by sampling the values at k randomly selected motes.
19
But: An important caveat! networ k Aggregation in the network introduces new challenges 2 4 1011 2
20
Summary Crypto helps, but isn’t a total solution –Be aware of the systems tradeoffs Seek robustness against insider attack –Resilience gives a way to think about insiders –The law of large numbers is your friend Feedback?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.