350 likes | 464 Views
Mobile Traffic Sensor Network vs. Motion-MIX : Tracing & Protecting Mobile Wireless Nodes. # Jiejun Kong, * Dapeng Wu, + Xiaoyan Hong, # Mario Gerla # Dept of Computer Science * Dept of Computer Science + Dept of EE
E N D
Mobile Traffic Sensor Network vs. Motion-MIX:Tracing & Protecting Mobile Wireless Nodes #Jiejun Kong, *Dapeng Wu, +Xiaoyan Hong, #Mario Gerla #Dept of Computer Science *Dept of Computer Science +Dept of EE UCLA University of Florida University of Alabama November 7, 2005 @ACM SASN’05
Problem: Mobile Anonymity • Fixed Anonymity: Identity(net addr) • Mobile Anonymity: Identity Location • Identity (net addr/identity) • Location (positioned by the adversary) • Motion pattern(deduced by the adversary) • Significance of anonymous wireless communication • 1996 A.D.: Chechnya rebel leader, General Dzhokhar Dudayev, always on the move, but killed during a traceable wireless call
Mobile Traffic Sensor Network • Mobile traffic analyst • Unmanned aerial vehicle (UAV) • Coordinated positioning(tri-lateration / tri-angulation)can reduce location uncertainty • If moving faster thanthe transmitter, canalways trace the victim
Outline • Background • Proposed solution • In theory: Asymptotic network security model • In practice: Motion-MIX • Security analysis • Motion-MIX satisfies the asymptotic network security model • Summary
Notion: Security as a “landslide” game • Played by the guard and the adversary • Proposal can be found as early as Shannon’s 1949 paper • Not a 50%-50% chance game, which is too good for the adversary • The notion has been used in modern crypto since 1970s • Based on NP-complexity • The guard wins the game with 1 - negligible probability • The adversary wins the game with negligible probability • The asymptotic notion of “negligible” applies to one-way function (encryption, one-way hash), pseudorandom generator, zero-knowledge proof, ……AND this time ……
Definition: A function m: NR is negligible, if for every positive integer c and all sufficiently large x’s (i.e., there exists Nc>0, for all x>Nc), Our Asymptotic Network Security Model • Concept: the probability of security breach decreases exponentially toward 0 when network metric increases linearly / polynomially • Consistent with computational cryptography’s asymptotic notion of “negligible / sub-polynomial” • is negligible by definition x is key length in computational cryptox is network metric (e.g., # of nodes) in network security
Insecure Secure(Ambiguous area) The Asymptotic Cryptography Model The “negligible” line(sub-polynomial line) • Security can be achieved by a polynomial-bounded guard against a polynomial-bounded adversary Probability of security breach 1 2 # of key bits (key length) 128 • See Lenstra’s analysis for proper key length(given adversary’s brute-force computational power) • There are approximately 2268 atoms in the entire universe
Insecure Secure(Ambiguous area) Our Asymptotic Network Security Model The “negligible” line(sub-polynomial line) • Conforming to the classic notion of security used in modern cryptography ! We’ve used the same security notion The “exponential” line(memory-less line) Probability of network security breach Network metric (e.g., # of nodes -- network scale)
Design Assumptions • Adversary model • Passive • Few insiders (captured & compromised nodes), • Global (or equivalently, mobile and capable of scanning the entire network area in short time) • Honest-but-curious (protocol-compliant) • External: polynomially-bounded by key length • Internal: fraction of N (which is # of network nodes) • Network model • Loquor ergo sum (I speak, so I exist): nodes must transmit upon application demand, cannot shut up • Pairwise key sharing (via Diffie-Hellman, KPS, or “mobility helps security”)
Venue Venue • “Venue” is the smallest area that the adversary can “pinpoint” a wireless transmitter via its wireless transmission The VIP nodebeing traced
D. Niculescu, B. Nath, “VOR Base Stations for Indoor 802.11 Positioning,” ACM MOBICOM’04, pp.58—69. Assumption: Imperfect Wireless Positioning
Motion Pattern Tracing (1 node) • 1 transmitting node in the network • No way to protect it • Just like a cryptographic case using 1-bit key
Motion Pattern Tracing (2 nodes) • 2 transmitting nodes in the network; Better security protection • What’s the network-based analytic model behind this phenomenon?What happens if there are many nodes in a scalable network? • We need Motion-MIX
Motion-MIX: Design Goal • k incoming mobile nodes or wireless packet flows get fully mixed in the Motion-MIX k-anonymity: the adversary cannot differentiate these k nodes
Motion-MIX vs. Chaumian MIX • Effectiveness determined by the adversary’s capability & the guard’s capability • Privacy model: like Chaumian MIX processor, the internal state of Motion-MIX is private The adversarial side cannot position any transmitting node inside the area quantified by • Temporal-spatial model: like Chaumian MIX (e.g., pool mix), the guarding side can delay and gather the protected items in a Motion-MIX Motion-MIX’s size is determined bi-laterally (the adversary & the guard) in terms of time and space
Adversary’s capability ’ Size of Motion-MIX • Adversary determines inner circle • Guard determines outer ring • t is the minimum delay between any 2 transmissions from a single node • vavg is the average/expected node mobility speed • Motion-MIX’s size is a bilaterally-determined quantity’ = ( + vavg*t)
Wireless Traffic Mixing Per Venue Algorithm D -- Wireless traffic mixing:(Each venue transmits approximately kpackets pert in a fully distributed manner) Prerequisite: Pre-defined system parameterkand unit timet.1 Divide current unit timetintokslices. 2 FOR (each time slicei) DO 3 IF (I have only heardx<itransmissions so far during the current unit time interval) 4 In the next time slice, transmit a decoy packet with probability(i-x)/i. 5 END IF 6 END FOR Ensures: Greater-than-zero effect1. If at least a “good” node is in a venue, the adversary can only estimate there are averagelyE(k’)nodes inside. Actually # of nodes inside the venue can be from minimally1 to maximally(N - #_of_non-empty_venues). 2. Otherwise, the venue is empty. Motion-MIX is not functional.
Necessary Conditions of Motion-MIX • Protocol-stack-wise concerns, not limited to application/middleware layer (unlike MIX-Zone) • Building blocks • Identity-free routing ANODR (MOBIHOC’03) • Anonymous even against any insider • One-time packet contents XOR-tree (TISS’00) • E.g., for 100 packets, the 2 extreme cases (1 sender to 1 recipient & 100 different senders to 100 different recipients) and all cases in-between are equally probable looks truly random / independent • Radio interface calibration to remove RF signatures “Shake them up” (MOBISYS’05)
#E #D #C KB( KA(hello)) KA(hello) KC( KB( KA(hello))) KA(hello) KC( KB( KA(hello))) KB( KA(hello)) #B Identity-free Routing: ANODR (MOBIHOC’03) E Route-REPly global_trap denotes an encryption of a well-known tag (“You are the destination”) using a key only known by destination E C D B • ANODR: destination EreceivesRREQ, global_trap, onion where A Route-REQuest onion = KD( KC( KB( KA(hello)))) RREP, global_proof, onion RREP, global_proof, onion, #X#X is a random packet stamp selected by Xand shared on the hop KX(m) denotes using symmetric key K (only known by X) to encrypt a message m
payload payload payload payload #3 #2 #1 #4 Identity-free Data Forwarding • Table driven virtual circuit: stores mapping of a pair of packet stamps • Packet marked with # • Matched incoming # is replaced by corresponding outgoing # • IP address, 802.11 MAC address not used in ANODR C A B #3 #4 #1 #2 #2 #3
198573f8d5b 198573f8d5b 2 e53410957fa 3 e53410957fa ... ... One-time Packet Contents (cont’d) • “Unpredictable” pseudorandom packet contents • In secular term, looks truly random to the adversary • Key management & distribution needed 56a35d537fe 1 56a35d537fe Key
4342747 5422819 5452343 1745634 9746411 6175747 8543358 Identity-free Packet Flow (ANODR)
Mobile network model • Divides the network into large number n of very small tiles (i.e., possible “positions”) • A node’s presence probability p at each tile is small Follows a spatial binomial distributionB(n,p) • When n is large and p is small, B(n,p) is approximately a spatial Poisson distribution with rate r1 • If there are N mobile nodes roaming i.i.d.rN= N·r1 • The probability of exactly k nodes in an area A’
Venue ’ Venue
Average Venue • Publicity assumption (Kerckhoff’s Desiderata): the adversary knows the entire identity set and the network area, it can estimate that expectation of # of nodes in each venue is • Thus, nodes in each venue transmit k = E(k') real/decoy packets in a fully distributed manner • A motion-MIX is min(k, E(k'))–anonymouswhere '=(+vavg*t) is the bi-lateral Motion-MIX size • In each non-empty venue, min(k, E(k')) - anonymous • In the entire network, ubiquitously min(k, E(k')) - anonymous due to identity-free routing, one-time packet contents and RF signature hiding
Untraceable Mobile Nodes (or Packet Flows) All motion patterns equally likely if contiguous venues are non-empty (in the previous time slot t) Untraceable(per Shannon’s information theoretic notion) The VIP nodebeing traced
Security Analysis: Impact of N (# of nodes) Probability of having less than k good nodes is negligible with respect to network scale N Probability of tracing a mobile node is negligible with respect to Nand motion time |T| Probability of tracing a packet flow is negligible with respect to N and# of traveled venues |X|
Summary • Anonymous communication in mobile networks has its own idiosyncrasy • Motion pattern of mobile nodes can be traced Motion-MIX needed • We propose a novel asymptotic network security model that is consistent with classic security notions • Identity-free routing, one-time packet contents, and radio signature hiding are necessary conditions to implement Motion-MIX • Motion-MIX + ANODR is practical • Work-in-progress: Currently, doing real-world experiments on Motion-MIX and ANODR • Related to MANET localization/positioning, QualNet simulation, ANODR Linux implementation, UAV experiment • More rigorous formalization & proofs
UCLA E-mail contacts:Jiejun Kong: jkong@cs.ucla.eduMario Gerla: gerla@cs.ucla.edu Thank You Questions ?
Notion: Perfect Secrecy(C.E.Shannon) • A triangluar relation: plaintext M, ciphertext E, key K • Given ciphertext E, adversary gains no informationH(M|E) = H(M)a posteriori = a priori XORm k = e Not scalable
Route-driven connection Route-driven connection s s r r 1 1 1 1 s s r r 2 2 2 2 s s r r 3 3 3 3 s s r r 4 4 4 4 anonymity anonymity anonymity anonymity set set set set Notion: Perfect Anonymity(IACR ePrint TR2005-132) Not Scalable indistinguishable indistinguishable flooding synchronized Sender Anonymity Recipient Anonymity
Message Secrecy & Anonymity(information theoretic notion) • Security degradation can be defined as the ratio between H(XAS|C)andH(XAS),as demonstrated in 2 PET’02 papers [Serjantov&Danezis,PET’02] and [Diaz et al., PET’02] • This non-scalable solution is not our answer ! Perfect AnonymityH(XAS|C) = H(XAS) Perfect SecrecyH(M|E) = H(M)
r1 • Inspired by Bettstetter et al.’s work • For any mobility model (random walk, random way point), Bettstetter et al. have shown thatr1 is computable following • For example, in random way point modelin a square network area of size a£a defined by -a/2·x· a/2 and -a/2·y· a/2 • r1 is “location independent”, yet computable in NS2 & QualNet given any area A’(using finite element method)
r1in Random Way Point model [Bettstetter et al.] a=1000
WASP Micro-Aerial Vehicle (MAV) • Wingspan: 13 inches • Combined wing structure (Lithium-Ion battery pack): 4.25 ounces (120 gm) • Total weight of the vehicle: 6 ounces (170 gm) • Power: 9 Watts during the flight. • Flying time: 1 hour and 47 min • Good enough to trace a mobile soldier or a few soliders per MAV