350 likes | 538 Views
Protocol Exchange Meeting Feb 1-2, Naval Postgraduate School. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Radha Poovendran Network Security Lab University of Washington. Graduate Student: Loukas Lazos. Outline. Motivation Secure Localization Problem
E N D
Protocol Exchange Meeting Feb 1-2, Naval Postgraduate School SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Network Security Lab University of Washington Graduate Student: Loukas Lazos
Outline • Motivation • Secure Localization Problem • SeRLoc • Threats and defenses • Performance Evaluation • Conclusions Radha Poovendran Seattle, Washington
Why do we need location in WSN? Location-dependent services Network functions Access Control Monitoring Apps Radha Poovendran Seattle, Washington
Localization Problem Localization: Sensor Location Estimation • How do sensors become aware of their position undernon-deterministic deployment? • Choice of localization algorithm is based on: • Resolution required • Region of deployment • Resource constraints of the devices Radha Poovendran Seattle, Washington
Classification of Loc. Schemes • Indoors vs. Outdoors: • GPS, Centroid (outdoors). • RADAR, Active Bat, AhLos (indoors). • Infrastructureless (I-L) vs. Infrastructure based (I-B): • AhLos, Amorphous, DV-Hop (I-L). • RADAR, Active Bat, AVL (I-B). • Range-based (R-B) vs. Range-Independent (R-I): • RADAR, Ahlos, GPS, Active Bat (R-B). • APIT, DV-Hop, Amorphous, Centroid (R-I). • Active vs. Passive • Dv-hop, APIT (Active). • RADAR (Passive). Radha Poovendran Seattle, Washington
Localization in un-trusted environment • WSN may be deployed in hostile environments. • Threats in sensor localization: • External • Replay attacks. • Node Impersonation attacks. • Internal • Compromise of network entities. • False location claims. Radha Poovendran Seattle, Washington
Secure Location Services • Secure Verification of Location Claims • [Sastry et al. WISE 2002]. • Location Privacy • Privacy-aware Location Sensor Networks [Gruteser et al. USENIX 2003]. • Secure Localization: Ensurerobust location estimationevenin the presence ofadversaries. • SeRLoc: [Lazos and Poovendran, WISE 2004]. • S-GPS: [Kuhn 2004]. • SPINE: [Capkun & Hubeaux, Infocom 2005]. Radha Poovendran Seattle, Washington
Outline • Motivation • Problem Description • SeRLoc • Threats and defense • Performance • Conclusions Radha Poovendran Seattle, Washington
Our Approach: SeRLoc • SeRLoc:SEcure Range-independent LOCalization. • SeRLoc features • Passive Localization. • No ranging hardware required. • Decentralized Implementation, Scalable. • Robust against attacks - Lightweight security. Radha Poovendran Seattle, Washington
Network Model Assumptions (1) Omnidirectional Antennas Sensors: Randomly deployed, unknown location Sensor range r Locators: Randomly deployed Directional Antennas r Known Location, Orientation R θ Beamwidth θ Locator range R Locator Sensor Two-tier network architecture (X2, Y2) (X4, Y4) (X3, Y3) (X1, Y1) (X5, Y5) Radha Poovendran Seattle, Washington
Network Model Assumptions (2) • Locator deployment: Homogeneous Poisson point process of rate ρL (ρL: Locator density). • Sensor deployment: Poisson point process of rate ρsindependent of locator deployment (ρs:sensor density). • Or can be seen as random sampling of the deployment area with rate ρs (ρs >> ρL). LHs: Locators heard at a sensor s. Radha Poovendran Seattle, Washington
The Idea of SeRLoc ROI Locator Sensor L4 • Each locator Li transmits information that defines the sector Si, covered by each transmission. • Sensor defines the region of intersection (ROI) from all locators it hears. L1 L3 s L3 (0, 0) Radha Poovendran Seattle, Washington
Outline • Motivation • Problem • SeRLoc • Threats and defense • Performance • High resolution localization: HiRLoc • Conclusions Radha Poovendran Seattle, Washington
Threats s L1 • Attacker aims at displacing the sensors (false info is worse than no info). • We do not address DoS attacks. • We do not address jamming of the communication medium. [Lazos & Poovendran, IPSN 2005] Radha Poovendran Seattle, Washington
How can a sensor be displaced? • In SeRLoc: Sensor gets false localization information. • A) Replay beacons from a far-away region. • B) Impersonate locators and fabricate beacons. • How can we protect broadcasted localization information? Radha Poovendran Seattle, Washington
SeRLoc - Security mechanisms H1(Pwi) Hn(Pwi) H H H H Hash chain one-way hash function • Message Encryption: Messages encrypted with a symmetric key K0. • Beacon Format: ID authentication Synchronization var Li : { (Xi, Yi) || (θi,1, θi,2) || (Hn-j(PWi)), j } K0 Locator’s coordinates Slopes of the sector Shared symmetric key H0(Pwi) PWi • Every sensor stores the values Hn(PWi) for all the locators. • A sensor can authenticate all locators that are within its range (one-hop authentication). Radha Poovendran Seattle, Washington
SeRLoc – Wormhole Attack Record beacons sensor Locator Attacker • THREAT MODEL • The attacker records beacon information at region A L4 L3 • Tunnels it via the wormhole link at region B, and replays the beacons. L1 Region B • Sensor is misled to believe it hears the set of locators LHs: {L1 - L8}. L2 Wormhole link Region A L7 L8 • No compromise of integrity, authenticity of the communication • or crypto protocols. • Direct link allows replay of the beacons in a timely fashion. L5 L6 Radha Poovendran Seattle, Washington
Wormhole attack detection (1) Accept only single message per locator sensor Locator Attacker obstacle • Multiple messages from the same locator are heard due to: • Multi-path effects; • Imperfect sectorization. • Replay attack. R Ac R Wormhole link R: locator-to-sensor communication range. Radha Poovendran Seattle, Washington
Wormhole attack detection (2) Locators heard by a sensor cannot be more than 2R apart sensor Locator Attacker 2R Ai Aj R Li Lj R Wormhole link R: locator-to-sensor communication range. Radha Poovendran Seattle, Washington
Wormhole attack detection (3) Probability of wormhole detection sensor Locator Attacker The events of a locator being within any region Ai, Aj, Ac are inde-pendent (Regions do not overlap). 2R Ai Aj Ac Wormhole link Radha Poovendran Seattle, Washington
Wormhole attack detection (4) 99.48% Probability of wormhole detection L Radha Poovendran Seattle, Washington
Resolution of location ambiguity Closest Locator A sensor needs to distinguish the valid set of locators from the replayed ones. Attach to Closest Locator Algorithm (ACLA) • Sensor s : Broadcasts a nonce η. L4 • Locator Li : Reply with a beacon + the nonce η, encrypted with the pair-wise key Ks,Li. L3 L1 Region B • Sensor s : Identify the locator Lc with the first authentic reply. • Sensor s : A locator Li belongs to the valid set, only if it overlaps with the sector defined by the beacon of Lc. L2 L8 L5 Region A Wormhole link L7 L6 Radha Poovendran Seattle, Washington
SeRLoc – Sybil Attack Collect hash values Impersonator • THREAT MODEL • The attacker impersonates multiple locators (compromiseof the globally shared key K0). L3 L2 L1 L4 • Attacker can fabricate arbitrary beacons. • Hence, compromise the majority-based scheme, if more than |LHs| locators impersonated. Radha Poovendran Seattle, Washington
Sybil Attack detection (1) • In a Sybil attack, the sensor hears at least twice the number of locators it would normally hear. • Define a threshold Lmax as the maximum allowable number of locators heard, such that: Probability of false alarm Probability of Sybil attack detection • Design goal: Given security requirementδ, minimize false alarm probability ε. Radha Poovendran Seattle, Washington
Sybil Attack detection (2) 99% Detection probability 52 locators 26 locators 5% • Random locator deployment we can derive the Lmax value: False alarm Probability Radha Poovendran Seattle, Washington
Sybil Attack defense • Once a Sybil attack is detected, i.e. More than Lmax locators are heard: • Execute ACLA to attach sensor’s position to the closest locator. • Attacker needs to compromise the pairwise key between a locator and the sensor under attack to compromise ACLA. • What if a locator is compromised? Radha Poovendran Seattle, Washington
SeRLoc – Compromised Locators • Compromise of alocatorLi reveals K0, seed PWi to the hash chain of the locator. • Attacker can • Impersonate the Closest Locator. • Compromise the ACLA algorithm. • Displace any sensor that uses ACLA. • Need an Enhanced version of ACLA Radha Poovendran Seattle, Washington
Enhanced location determination algorithm 1. The sensor transmits a nonce with its ID and set LHs 2. Locators within r from the sensor relay the nonce. L1 L7 3. Locators within R reply with a beacon + the nonce. L2 4. Sensor accepts first Lmax replies. L9 L6 L3 L5 • Attacker has to compromise more than Lmax/2 locators, AND • Replay before authentic replies arrive at s. L8 L4 Radha Poovendran Seattle, Washington
Outline • Motivation • Secure Localization Problem • SeRLoc • Threats and defenses • Performance Evaluation • Conclusions Radha Poovendran Seattle, Washington
Performance Evaluation • Simulation setup: • Random locator distribution with density ρL. • Random sensor distribution with density 0.5. • Performance evaluation metric: • : Sensor location estimation. • si : Sensor actual location. • r : Sensor-to-sensor communication range. • |S| : Number of sensors. Radha Poovendran Seattle, Washington
Localization Error vs. Avg. LH • M number of antenna sectors. • Each locator is equivalent to M reference points. • In our simulation set up, SeRLoc outperforms most of the schemes. LH: Locators Heard Radha Poovendran Seattle, Washington
Localization error vs. sector error • Sector error: Fraction of sectors falsely estimated at each sensor. • Even when 50% of the sectors are falsely estimated, LE < r for LH 6 • SeRLoc is resilient against sector error due to the majority vote scheme. Radha Poovendran Seattle, Washington
Localization error vs. GPS error • GPS Error (GPSE): Error in the locators’ coordinates. • For GPSE = 1.8r and LH = 3, LE = 1.1r. • DV-hop/Amorphous: LE = 1.1r requires LH = 5 with no GPSE. • APIT: LE = 1.1r requires LH = 15 with no GPSE. Radha Poovendran Seattle, Washington
Summary and Conclusions • SeRLoc is a two-tier network architecture: • Locators: Known coordinates, sectored antennas, fixed transmission range. • Sensors: Passively determine their position, by intersecting the antenna sectors heard. • Resistance to attacks in WSN using: • Cryptographic primitives (encryption, hashing). • Geometric properties (Range of transmission). • Analytically evaluated level of security via spatial statistics. • Current developments: • Characterize wormhole Problem [UW+NRL; WCNC 2005] • Resistance to jamming attacks, analytical evaluation of error bounds [Lazos & Poovendran; ROPE 2005] Radha Poovendran Seattle, Washington
Workshop Announcement Workshop on Secure Localization of Wireless Sensor Networks:June 2005, University of Washington. Radha Poovendran Seattle, Washington