170 likes | 292 Views
Security in Self-organizing Systems. Refik Molva Institut EURECOM refik.molva@eurecom.fr http://www.eurecom.fr/ce/researchce/nsteam.en.htm. Self-organizing Systems. System or Network consists of a Collection of Ordinary Components No fixed infrastructure No (or limited) organization
E N D
Security in Self-organizing Systems Refik Molva Institut EURECOM refik.molva@eurecom.fr http://www.eurecom.fr/ce/researchce/nsteam.en.htm
Self-organizing Systems • System or Network consists of a Collection of Ordinary Components • No fixed infrastructure • No (or limited) organization • Ad Hoc Networks • Sensor Networks • P2P Applications • Ubiquitous computing
Self-organizing No(or limited) infrastructure Lack of organization Wireless & Mobile Scarcity of Resources Limited Energy Lack of physical security Lack of connectivity Cooperation Security Challenges • Comm. Security • Key management • Trust Management • Privacy Context-awareness
Communication Security • Secure Routing • ARAN, SRP, ARIADNE, SEAD,TIK • New Challenges • Network coding and security [Gkantsidis, Rodriguez] • Data aggregation [Girao, Schneider, Westhoff] [Castellucia, Tsudik]
Key Management Challenges • Lack of (or limited) • Security infrastructure • Key servers (KDC, CA, RA) • Organization (a priori trust) • p2p • Authentication is not sufficient to build trust Bootstrapping security associations from scratch Fully distributed Minimum dependency
Key Management • Symmetric : • Key pre-distribution • Key agreement • Asymmetric Keys • PK Certificate = (ID,PK)CA • Self-organized CA • Web of trust(PGP) • Certificate-less • Crypto-based IDs: ID = h(PK) • ID-based Crypto: PK = f(ID) • Context-awareness • Distance Bounding Protocols • Seeing-is-believing
Key pre-distribution • Sensor Networks – TTP-based [Eschenauer, Gligor ACM CCS’02, H. Chan, A. Perrig et al, Oakland’03] [Wenliang Du et al, INFOCOM’04] • Ad Hoc version – no TTP [A. Chan, INFOCOM’04] Distributed key setup by randomly choosing key rings from a public key space • Cover-Free Family Algorithm • Neighbors determine intersection of their key rings using homomorphic encryption
[cert(PKi)]SK1 [cert(PKi)]SK2 … [cert(PKi)]Ski … CERT(PKi)SK (ID, PK) bindingSelf-organized CA[Zhou, Haas] [Kong, et al.] [Yi, Kravets] [Lehane, et al.][Bechler et al, INFOCOM’04] • Based on threshold cryptography • PROs: distributed, self-organized • CONs: share distribution during bootstrap phase, network density, Sybil attack [cert(PKi)]SK1 [cert(PKi)]SK2 PKi [cert(PKi)]SKi Verification of CERT(PKi)SK by any node using well known PK
(ID, PK) bindingWeb of Trust (PGP)[Hubaux, Buttyan, Capkun] • No CA • Alice Bob and Bob Eve Alice Eve • Merging of certificate repositories • PROs: no centralized TTP • CONs: initialization, storage, transitivity of trust
(ID, PK) bindingCrypto-based ID • SPKI [Rivest] • Statistically Unique Cryptographically Verifiable IDs [O’Shea, Roe] [Montenegro, Castellucia] IPv6 @ = NW Prefix | h(PK) • DSR using SUCV-based IP addresses [Bobba, et al] PROs: no certificates, no CA CONs: generation of bogus IDs
(ID, PK) bindingID-based Crypto[Halili, Katz, Arbaugh] • ID-based • PK = h(ID) • SK computed by TTP • Threshold Crypto to distribute TTP PROs: no certificates, no centralized server CONs: distribution of initial shares Based on [Boneh, Franklin, CRYPTO 2001]
Trust • Managed environment • A-priori trust • Authentication trustworthiness • But: • requirement for infrastructure • scarcity of computing resources (sensors) • lack of connectivity (sensors, ad hoc nw) • Open environment • No a-priori trust • authentication does not guarantee correct operation →New paradigms • Trust establishment protocols (history, e-cash, …) [Bussard, Molva, Roudier, PerCom’04, PerSec’04, iTrust’04] • Reputation
Cooperation enforcement Threshold cryptography Token-based [Yang,Meng,Lu] Nuglets [Buttyan,Hubaux] SPRITE [Zhong, Chen, Yang] CONFIDANT[Buchegger,Le Boudec] CORE [Michiardi,Molva] Beta-Reputation [Josang,Ismail] Micro-payment Reputation-based Bittorrent (P2P) Built-in with Application
Summary • Main research focus • Bootstrapping from scratch • New trust paradigms • Optimization (computation, bandwidth) • Solutions yet to come . . . • Interesting applications of cryptography • Some untruths and non-sense Room for creativity
New Challenges • Opportunistic Communications • No end-to-end connectivity • Collapsed system (Application=network) • Data eventually reaches destination • Trust management • Forwarding of encrypted data • Network coding and cryptography • Data aggregation
Selected Publications • "Analysis of Coalition Formation and Cooperation Strategies in Mobile Ad hoc Networks“in Ad Hoc Networks Journal – Volume 3, Issue 2 , March 2005, Pages 193-219 • “Pocket Bluff- A Cooperation enforcing scheduled pocket switching protocol“submitted to Sigcomm Hotnets IV, July 2005 • “Non cooperative forwarding in ad hoc networks”Networking 2005, 4th IFIP International Conference on Networking, May 2 - 6, 2005, Waterloo, Canada - Springer LNCS Vol 3462, 2005 , pp 486-498 • “Policy-based Cryptography“Financial Cryptography 2005, Dominica, February 2005. • “Ad Hoc Network Security” Chapter 12 in Mobile Ad Hoc Networking,S. Basagni, M. Conti, S. Giordano, I. Stojmenovic (Editors) ISBN: 0-471-37313-3 June 2004, Wiley-IEEE Press • “IDHC: ID-based Hash-Chains for broadcast authentication in wireless networks”, EURECOM Technical Report RR-04-111 • “History-based Trust Establishment Protocols“in PerCom’04 and iTrust’04, March 2004. • “CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”CMS'2002, Communication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security /Borka Jerman-Blazic & Tomaz Klobucar, editors, Kluwer Academic Publishers, ISBN 1-4020-7206-6, August 2002 , 320 pp • "Ad Hoc Network Security" Chapter to appear in Handbook of Information Security, H. Bidgoli (Editor), Wiley & Sons • Other papers on http://www.eurecom.fr/ce/researchce/nsteam.fr.htm Related Events IEEE Workshop on Trust Security and Privacy in Ubiquitous Computing, Sicily June 2005, Niagara Falls, June 2006 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Budapest, July 2005, Hamburg September 2006. IEEE ICC Network Security and Information Assurance Symposium, Istanbul, June 2006 ESORICS / RAID, Sophia Antipolis September 2004