1 / 31

Thoughts on the Formal Modeling of Security of Sensor Networks

Thoughts on the Formal Modeling of Security of Sensor Networks. Catherine Meadows Center for High Assurance Computer Systems Naval Research Laboratory Washington, DC. Outline of Talk. Brief introduction to sensor networks

boyce
Download Presentation

Thoughts on the Formal Modeling of Security of Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Thoughts on the Formal Modeling of Security of Sensor Networks Catherine Meadows Center for High Assurance Computer Systems Naval Research Laboratory Washington, DC

  2. Outline of Talk • Brief introduction to sensor networks • Brief introduction to standard Dolev-Yao notion of protocol correctness • In-depth discussion of how assumptions behind sensor network security differ from Dolev-Yao notions • Some examples • Chose examples as different from DY-type protocols as possible in order to illustrate points • Some suggestions for future research

  3. What is a Sensor Network? • Network of sensors and other devices communicating by wireless technology • Responsible for gathering and coordinating data, and communicating it to data processing points

  4. Security Needs of Sensor Networks • Nodes need to be able to authenticate themselves to network • Receiver of data from network needs to be able to ensure that that data is correct and consistent • Receiver could be another node in the network our some entity outside of network • Data may be aggregate of data gathered by individual nodes • Network needs to be able to protect itself from denial of service attacks • Network may also need to protect secrecy of data, although not in all applications • Will often be enough to guarantee that no single node contains information about the entire network

  5. How Can We Adapt Formal Crypto Protocol Analysis to Sensor Networks • Have generally accepted threat model, Dolev-Yao, that serves as the basis for most formal analysis systems for crypto protocols • Well-defined formal methods built using that model • Recently, model has been extended to include cryptographic notions of security • Purpose of this talk: • Explore where DY does and does not apply to sensor networks • Explore feasibility of developing general threat model for security of sensor networks

  6. Some Attacks on Sensor Networks • Collusion: Illegal collaboration among subset of nodes • Sybil: Single entity impersonates multiple network nodes • Effective against systems that rely on majority vote • Sinkhole: Single node redirects all data through it • Good for implementing denial of service attack • Wormhole: Adversary has faster link for communication between origin and destination point • Can be used to confuse network about physical location of origin

  7. Dolev-Yao Model • Assume intruder who can • Read, intercept, alter, or create traffic at any point • Perform any cryptographic operation available to legitimate member of system • Assume principals divided up into honest and dishonest • Honest principals follow rules of protocol • Dishonest principals in league with intruder and share all keys and other information with it • Any message sent by dishonest principal • Honest principals stay honest, dishonest principals say dishonest • Some variants of model do allow for compromise of keys

  8. Dolev-Yao Model (cont.) • Fixed set of operations allowed to principals • Concatenation, deconcatenation • Cryptographic functions (private key, public key, keyed hash, etc.) • Generation of random nonces • Some versions also include timestamps • Two general classes of security goals • Secrecy • Authentication: if a certain event occurs, then certain other events must have or must not have occurred in the past • Possibly in a prescribed order

  9. ATTACKER MODEL

  10. What’s Behind Attacker Model in DY • In wired networks, we generally assume strong layering • Crypto protocols will rely on routing to send data from one point to another, but can’t make any special demands on it • For that reason, DY model makes the worst case assumption that the network is completely under control of the intruder

  11. Sensor Network Model Not as Pessimistic • Severe energy constraints means that you need to have greater cross-layer communication • Secure services can and must be designed in closer cooperation with other network services • Thus, most security protocols for sensor networks interact closely with the routing mechanism • The upshot: modeling routing explicitly means that we can assume that nodes controlled by intruder can only read or alter traffic if they are in close physical proximity to sender of traffic • More detailed, but weaker, intruder model • Note: most, but not all, solutions rely on broadcast routing, so can make simplifying assumption that attacker can pick up on or interfere with communication only if within certain distance of broadcasting node

  12. DISHONEST PRINCIPALS

  13. Assumptions About Dishonest Principals • In DY model, dishonest principals in league with attacker and assumed to be in communication with it • In sensor networks, ability to communicate limited to physical proximity • Only nodes that are close together are assumed always to be able to communicate • Again, attacker model is weaker, but more detailed

  14. Assumptions About Dishonest Principals (2) • In DY, set of honest and dishonest nodes does not change • In sensor network, nodes usually assumed to start out honest • Much computation in sensor networks based on consensus • Thus necessary to identify bad nodes and remove them • Life trajectory of bad node: starts out good, becomes bad, is identified and removed

  15. Assumptions About Attacker Computational Strength • In sensor networks, nodes may have very limited computational and memory capability in order to conserve energy • Some models assume that attacker nodes have no more capability than honest nodes • Allows us to use non-cryptographic solutions • Algorithms that are not cryptographically strong, but cannot be broken by resource-constrained node

  16. ACTIONS AVAILABLE TO HONEST PRINCIPALS

  17. Operations Available to Honest Principals • Besides operations available to honest principals, have two others • Distance bounding • Node can tell distance from other node by sending it a message and see how long it takes to return • If response authenticated, dishonest node can lie about being further away than it is, but not closer • Signal strength measurement • Sender includes strength of transmitted message in message • Receiver compares received strength to transmitted strength to compute distance • Not secure, but can be useful when combined with other mechanisms

  18. SECURITY GOALS

  19. Security Goals • DY Goals involve secrecy and authentication for some set of principals • What happens to rest of network is immaterial • Sensor network goals usually apply to the entire network • Network should be connected (securely) • Majority of nodes in the network should be able to compute their location • Goals often probabilistic • May be too difficult to get perfect of near-perfect assurance of success

  20. Protocol 1: Eschenauer-Gligor Key Distribution Scheme • Public key cryptography often too expensive to implement in a sensor network • Shared key crypto requires too many keys • Insight: don’t need every node to be able to communicate directly with every other node • What you need is a connected graph • Assign each node a random subset of given pool of keys • Nodes then go through a key discovery phase to determine which near neighbors they share keys with • Resulting graph: • Nodes are sensors • Edges are (s,t) where s and t are near one-hop neighbors sharing key • Probabilistic analysis to determine whether graph is connected • Given two nodes, what is the probability there is a path between them?

  21. Protocol 2: Capkun & Hubaux Secure Positioning Scheme • When newcomer claims position, three nodes forming triangle around that position perform distance bounding protocol • Newcomer can’t claim to be farther away from one node than it is without also claiming to be closer to another node • It’s impossible to pretend to be closer than you are!

  22. Features of a Secure Distance Bounding Protocol • Timed response must be quick to compute • Computationally intensive response will mess up timing • Authentication is computationally expensive • But, if protocol not authenticated properly, honest node’s connection could be hijacked by another node • Need a way of including both crypto and fast responses in the same protocol • Problem first addressed by Brands and Chaum, 1998 • Seeking to defeat “grandmaster attack” on zero knowledge protocols • Attacker passes off honest node protocol responses as its own • Dual of problem we are considering here

  23. Capkun and Hubaux Protocol u : Generate random nonce Nu : Generate commitment (c, d) = commit(Nu) u -> v : c v : Generate random nonce Nv v -> u : Nv u -> v : Nu XOR Nv v : Measure time tvu between sending Nv and receiving Nu XOR Nv u -> v : Nu,Nv,d,MACKuv (u, Nu,Nv,d) v: Verify MAC and verify if Nu = open(c, d) Security property: If protocol finishes successfully, u should have sent Nu XOR Nv to v after receiving Nv

  24. Protocol 3: SerLoc (Lazos and Poovendran, 2004) • Secure location protocol designed to defeat wormhole attack • Depends on architecture consisting of powerful beacons who have access to location information (e.g. via GPS), and less powerful sensors who locate themselves wrt beacons • Attacker may try to replay beacon information from one part of network in other parts, confusing sensors

  25. SerLoc Idea • Each locator Li transmits information that defines the sector Si, covered by each transmission • Sensor s defines the region of intersection (ROI), from all locators it hears – Majority Vote L4 S1 L3 S3 Locators heard at the sensor LHs L1 s s S2 S4 L2 (0, 0) Locator Sensor ROI

  26. Dealing with Wormholes (1) Accept only single message per locator • Multiple messages from the same locator are heard due to: • Multi-path effects • Imperfect sectorization • Replay attack obstacle R Ac R Wormhole link Multi-path or Imperfect Sectors are not attacks! False Alarms! R: locator-to-sensor communication range. sensor Locator Attacker

  27. Dealing with Wormholes (2) Exploit the range bounds to detect anomalies • Locators heard by a sensor cannot be more than 2R apart, where R = locator-to-sensor communication range 2R Ai Aj R Li Lj R Wormhole link • This allows you to identify anomalies, but not to choose correct location • If you hear from two locators greater than 2R apart, can use distance bounding to detect which is closer

  28. Protocol not Secure Against Jamming • If attacker can block transmission from close-by locators, sensor can no longer identify anomalies • Lazos, Poovendran, and Capkun have developed protocol robust against jamming combining ideas of SerLoc and Capkun-Hubaux • Use metric Maximum Spoofing Impact (MSI): maximum distance between actual location and spoofed location • Protocol reduces MSI 2R Ai Aj R Li Lj R Wormhole link

  29. Where do we go from here? • Look what’s been done for similar problems • Nature of problem • Network-wide properties to be guaranteed • Guarantee only statistical • Attacker with limited powers • Two examples • Denial of service • Meadows’ denial of service model • Application of probabilistic model checkers to anti-DoS • Agha et al. Use PMAude and VESTA to model Gunter et al.’s packet dropping protocol • Anonymizing networks • Stubblebine and Syverson’s group intruder logic models intruder with limited abilities • Application of probabilistic model checkers to anonymizing networks • Shmatikov application of PRISM to Crowds

  30. Conclusions • Number of new problems to consider when analyzing security of sensor network protocols • Consensus-related goals • Probabilistic definitions of correctness • Need to take geometry, timing, and other physical factors into account • What are the best ways of dealing with these?

  31. References L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks” Proc. of the 9th ACM Conference on Computer and Communication Security, Washington D.C., November 2002 S. Capkun and J. Hubaux, “Secure Positioning of Wireless Devices and Applications to Sensor Networks,” Proc. of INFOCOM, Miami FL, March 2005 L. Lazos and R. Poovendran, “SeRloc: Secure Range-Independent Localization for Wireless Sensor Networks,” Proc. Of WISE, Philadelpia, PA, October 2004 L. Lazos, R. Poovendran, and S. Capkun, “ROPE: Robust Position Estimation in Wireless Sensor Networks,” Proc. of ISPN 2005

More Related