600 likes | 742 Views
Security and Safety Analysis of WSN Based on Finite Model Checking. Vladimir A. Oleshchuk University of Agder Norway. Vladimir I. Zadorozhny University of Pittsburgh USA. Outline. WSN basics Motivation Simulation and Model-checking for security analysis
E N D
Security and Safety Analysis of WSNBased on Finite Model Checking Vladimir A. Oleshchuk University of Agder Norway Vladimir I. Zadorozhny University of Pittsburgh USA UkrProg 2008 Kiev
Outline • WSN basics • Motivation • Simulation and Model-checking for securityanalysis • Trust-Aware Query Processing in Data Intensive Sensor Networks • Experimental results • Conclusions UkrProg 2008 Kiev
WSN Basics UkrProg 2008 Kiev
Real world Computer world real world computer world UkrProg 2008 Kiev
From sensors to sensor nodes Sensor Autonomous Computer Sensor node UkrProg 2008 Kiev
From sensor nodes to sensor networks (Collaboration, Event-driven processing, …) =Distributed Applications UkrProg 2008 Kiev
Basic WSN Taxonomy • Topology: • Random sensor network (not a-priori topology) • Structured sensor network (a-priori topology) • Special-purpose WSNs(e.g., Structural Health Monitoring) • Mesh Networks (e.g., MeshScape 4.0 Millennial Net system) • Mobility: • Stationary sensor nodes • Mobile sensor nodes UkrProg 2008 Kiev
Typical WSN applications • Support distributed interaction with the physical environment through measuring and aggregating data. • Example: monitoring and information tracking for managing critical assets: • Structural Health Monitoring (SHM) for monitoring integrity of civil and military structures • Monitoring of the vital signs parameters of patients • Military (battlefield) applications • …. UkrProg 2008 Kiev
CoBIS Scenario: Support for safety-critical processes such as alerting against inappropriate materials being stored together or outside of approved storage facilities UkrProg 2008 Kiev
VITUS • VITUS (Video Image analysis for TUnnel Safety) • The main aim of this project is to build and implement a prototype for an automatic video image analysis system in order to increase safety in tunnel road. UkrProg 2008 Kiev
CenSCIR (and Sustainable Bridges) UkrProg 2008 Kiev
WINES II • Use of Wireless Sensor Networks for Ageing Engineering Infrastructures (water supply, tunnels, bridges, etc.) UkrProg 2008 Kiev
WSN Applications • Generally speaking, WSNs can be used in applications where sensors are unobtrusively embedded into systems, consequently involving operations like: • monitoring • tracking • detecting • collecting • reporting UkrProg 2008 Kiev
Security concerns The reasons why security becomes an essential issue in WSN are: • sensitive nature of many of those applications (specially Critical Infrastructure Protection) • untrusted environment where the sensors are deployed share the drawbacks of any wireless network: natural physical insecurity of wired communications is present. UkrProg 2008 Kiev
Security concerns It is difficult to protect WSN because every node becomes a potential point of logical and physical abuse • Logical: • monitor transmissions, • intercept and modify data, and • impersonate nodes injecting false information to others. • Physical: • gain access to one or more of them and reprogram their operation • introduce his own fake nodes. UkrProg 2008 Kiev
Security Requirements • Data Confidentiality • Authentication • Data Integrity • Data Freshness • Non-repudiation • Availability • Time Synchronization • Secure Localization • Self-Organization • Forward secrecy • Backward secrecy UkrProg 2008 Kiev
Compare … RAM: GBs Disk: 100s of GBs Running at: GHzs WSN products μAMPS-1 (MIT) MICA-2 and MICA2Dot (UC Berkeley, Crossbow) Medusa MK-2 (UCLA) RAM: 4-128 KB Flash: 32KB - 1 MB Running at: 4 – 40 MHz UkrProg 2008 Kiev
Compare … • IEEE 802.11: wireless local area networks • 802.11b: 11 Mbps, operate at 2.4 GHz • 802.11g: 54 Mbps, operate at 2.4 GHz • 802.11a: 54 Mbps, operates at 5 GHz • Typical transmit power: 250 mW. Wireless Network Standards • IEEE 802.15: wireless personal area networks • Suitable for low power and low data rate sensor networks • 802.15.4: data rates: 20, 40 or 250 kbps in the 868, • 915 or 2400 MHz bands respectively. • Typical transmit power: 1 – 2 mW. UkrProg 2008 Kiev
Challenges • It is questionable if primitive traditionally used in other networking scenarios are suitable for sensor networks • because small amount of RAM memory. • and very modest computational power. • Cryptographic operations must be designed to minimize the use of memory. • Also, design of secure protocols should consider that • Each bit transmitted consumes as much power as executing hundreds of instructions. UkrProg 2008 Kiev
Example: Routing • Maximum transmission distance of current generation of sensor nodes ranges between 100 and 300 m. • Thus, messages cannot be transmitted directly between any two nodes • routing infrastructures needed • Algorithms should work • Even when nodes start to fail due to energy issues • With any network size and node density • Providing a certain quality of service • Minimizing the memory usage, speed and energy consumption • And Security must be considered!!! UkrProg 2008 Kiev
Collision! Collision! n7 n5 n6 n4 n3 n1 n2 Collisions and Collision Domains UkrProg 2008 Kiev
n2 n5 n4 n6 n3 n1 n7 Collision Aware Data Delivery UkrProg 2008 Kiev
Secure Routing • Challenge: (almost) no protocols with security in mind from scratch! • It is essential to make the routing algorithm robust against attacks: • Malicious nodes and denial of service still possible • Some work that focus on protection of existing routing protocols • Others focus on designing new protection techniques UkrProg 2008 Kiev
Securityissuesin WSN • Sensor nodes are devices with limited computational and energy resources • Wireless (open) transmission of critical information with limited communication channels (distance and broadband) • Sensors can be either inaccessible, or easily accessible and unprotected. • WSN can be large and potentially dynamic UkrProg 2008 Kiev
Problem of assuring WSN security • Users expect that certain level of WSN security will be guaranteed despite of limited resources (energy) allocated to each node. • Use of simulation tools may help to produce quantitative security assessment on particular execution sequences. • These predictions depend on the number performed simulation runs, and on the criteria used to select these runs • Seldom, but critical worst-case executions scenarios may be ignored during the simulation campaign UkrProg 2008 Kiev
Two approaches: Simulation and Model Checking • The objective of using Simulation is to study “average” case behavior of WSN • The objective of using Model Checking (MC) is to provide an approach to discover worst case scenario to improve security, safety, reliability of sensor network based applications. UkrProg 2008 Kiev 26
High-level MC scenario for WSN analysis • Step 1: Define a model M of the a behavioral description of the whole WSN that represents all possible execution sequences • Step 2: Use MC to find the worst-case execution sequences UkrProg 2008 Kiev
Example: Using MC to find the minimal lifetime of WSN • Identify the set of “final states” in the model M representing the state of the network when it is considered as “dead” • Find the shortest execution sequences (from the time duration point of view) leading to such final states • Such execution paths represent a worst-case execution scenario and give the minimal lifetime of the network UkrProg 2008 Kiev
Trust-Aware Query Processing in Data Intensive Sensor Networks UkrProg 2008 Kiev
Outline • Trust‐based routing: motivation • System model • Subjective logic • Trust‐based routing : an example • Experimental results UkrProg 2008 Kiev
Trust‐based routing: motivation • Current focus of research mostly on time/energy efficiency. • Reliability and trustworthiness of gathered data may be critical. • Usage of cryptographic protection is limited UkrProg 2008 Kiev
Trust-based routing: idea • The required level of trustworthiness can be achieved by routing data via trusted sensors, even though such trusted routes are longer and may be more time/energy consuming. • Trustworthiness of each sensor or groups of sensors may be determined from their context (e.g., properties of deployment area, sensor design, etc.). UkrProg 2008 Kiev
System model (1) • Two types of nodes: sensors and base stations. • Every sensor can be associated with one or several base stations. • Each sensor and each base station have an assigned opinion about the trustworthiness of the sensors it queries. • Each base station knows opinions about sensors it controls and opinions about trustworthiness of recommendations of sensors and other base st. UkrProg 2008 Kiev
System model (2) • A level of trust to each sensor based on its location, design, software configuration ,etc. • A sensor query originates at a base station propagating it to all sensor nodes in the network and collecting the results back from the sensors. • A query optimizer runs at a base station and generates a set of alternative query routing trees. • The optimizer selects a query tree that delivers results satisfying trustworthiness requirements (in addition to other requirements, such as finding maximizing concurrent transmissions). UkrProg 2008 Kiev
Subjective logic • Opinionω expresses an opinion about level of trustworthiness. • Let t, d and u be such that • where • Then a triple I called an opinion, where components and correspond to trust, distrust and uncertaintyrespectively. • The level of trustworthiness is defined based on several opinions. • Distrust could be expressed as opinion ω={0.0,0.9,0.1} • Maximum trust could be expressed as opinion ω={0.96,0.0,0.04} . UkrProg 2008 Kiev
Subjective logic operators • The subjective logic defines a set of logical operators for combining opinions such as conjunction, recommendation, and consensus. • An opinion of entity A about logical statement p being true is • For example, if A is a sensor node and statementp corresponds to the statement that “data received from A represents temperature in room XXX” UkrProg 2008 Kiev
Conjunctionof opinions UkrProg 2008 Kiev
Recommendation operator . (1) • A has none direct opinion about p, and will try to deduce some indirect opinion about trustworthiness of p based on the given recommendation. • An opinion of entity A about trustworthiness of a recommendation given by B denoted as: • when B gives a recommendation to A about trustworthiness of a statement p in form of its opinion. UkrProg 2008 Kiev
Recommendation operator (2) UkrProg 2008 Kiev
Consensus operator ⊕ • When there are several independent opinions about the same statement p, we can use consensus operator to get combined opinion about the same statement. UkrProg 2008 Kiev
Sensor network with base station and aggregation sensor node UkrProg 2008 Kiev
Optimized routing query tree without consideration of trustworthiness requirements with consideration of trustworthiness requirements UkrProg 2008 Kiev
Analyzing trust properties • denote trustworthiness level of result received by B on query q. • In English: Trustworthiness level of any query issued by node B will never be lower than N • In LTL: UkrProg 2008 Kiev
Expressing it in LTL • WSN is secure in the sense that any measurement can be delivered at least on trust level N. • Any message can be eventually delivered to base station B without degradation of its trustworthiness UkrProg 2008 Kiev
Questions in progress: • What is trade-off between energy and trust efficiency, latency and trust, etc. ? • What is the minimal lifetime in trust-aware WSN? • What is relation between required trust level and lifetime? • We should be able to validate that WSN conform given security policy. UkrProg 2008 Kiev
Trust-Aware Query Processing in Data Intensive Sensor Networks: Some Experimental Results
Experiments • Small-scale topology (10 nodes) • Experimental Set up • Results • Large-scale topology (73 nodes) • Experimental Set up • Results UkrProg 2008 Kiev
Small-scale: Experiments Set up • 10 nodes wireless sensor network • Data-intensive • Multi-hop delivery • Each node transmits: at least 128 Kb • Each node has an opinion: <t,d,u> • ‘t’ ranges between 0.97-0.99 (high trust!) • d and u; randomly assigned values such that t+d+u = 1 UkrProg 2008 Kiev
Small-scale: Routes Data delivery evaluated on following 5 different routes UkrProg 2008 Kiev
Time and Energy Cost for Various Routes • Route 1,2 and 5 have comparable latency • Route 3 has minimum latency • Route 4 has maximum latency and energy cost • Route 1 has minimum energy cost • A Time-Energy Optimizer would pick Route 1 or Route 3 as a (near) optimal route UkrProg 2008 Kiev