350 likes | 360 Views
Explore the Secure Unicast Messaging Protocol (SUMP) for sensor networks, including its strengths, weaknesses, and applications. Learn about security concerns, related works like LEAP and SPINS, and strategies for countering routing attacks.
E N D
SUMP: Secure Unicast Messaging Protocol Jeff Janies, Chin-Tser Huang, and Nathan Johnson Presentation by: Jeff Janies
Outline • Sensor Network Background • Related Work • Routing level attacks • SUMP Overview • Strengths and Weaknesses
Definitions • Sensor Network – A network of devices for monitoring or tracking physical phenomenon • Wireless Ad hoc Sensor Network – A sensor network of constrained devices that automatically organizes and communicates through wireless means
Military Target tracking Perimeter defense Battle field assessment Troop monitoring Personal Low cost home security Commercial Inventory tracking Building Control Systems Environmental Forest Fire early detection Animal population monitoring Applications
Layout • Two network entities • Sensor nodes (Sensors) • Base station • Sensor records readings • Base station is the aggregation point
Devices • Sensors – the X-Bow MICA2 mote • Limited power • Powered by 2 AA batteries • Limited Computing power • 8-bit Atmel processor • Limited Memory • 512-bits programmable memory • Base station – Laptop • Limitless computational ability and power
Security Concerns • Because of the sensors limitations security is a growing concern • The RSA keys cannot fit in sensor’s memory • Exponentiation is resource consuming • Communication is on a lossy channel
Security Concerns • Confidentiality –communications must not be overheard • Integrity – errors in messages must be detectable • Availability – if possible, a message must be deliverable • Non-repudiation – no one can send a message then deny sending it
Assumptions • There are no compromised nodes in the network during the initialization of the network. • The base station cannot be compromised. • The base station shares a unique symmetric key with each node • The base station is aware of all nodes in the network prior to deployment. • Nodes are fixed in location.
Related Works • LEAP (Localized Encryption and Authentication Protocol) • SPINS (Security Protocol for Sensor Networks) • μ-Tesla – multi-cast • SNEP – point-to-point communication
LEAP • Uses pairwise keying • Path establishment through breadth first searching • Similar to wired network establishment with ARP
LEAP • Advantages • Efficient routing of messages • Each node has an understanding of the network’s connectivity • Disadvantages • Infeasible in modern sensor networks • To resource consuming • Memory requirements are too great
SPINS • μ-Tesla • A key chain is calculated and the keys are used in reverse order • Uses delayed key distribution • Messages are decrypted at the end of a time step (after receiving the key for the time step)
SPINS • SNEP (Secure Network Encryption Protocol) • Uses Symmetric keys shared by the base station and individual nodes • Provides the protection from replay, forgery, and information leakage
SPINS • Advantages • A complete package for secure communication • Provides both unicast and multicast protection • Disadvantages • Message is propagated through flooding • The method is vulnerable to routing level attacks
Routing Level Attacks • Routing level Attack – Any attack by which an adversary causes a breakdown of communication through the use of route establishment
Worm Hole • When a group of malicious nodes forwards messages faster then legitimate paths • Receiving nodes are convinced the malicious path is the best S4 BS S2 S1 S3 A1 S5 A2 S6 S7
Black hole • A node convinces other nodes to forward through it • The node arbitrarily drops packets • Creates holes in the sensing environment S3 BS S2 S4 A1 S1 S5 S8 S6 S7
SUMP OverviewCountering Routing Attacks • Grouping by Level opposed to locality • Group management becomes an issue • How does a node know its group? • How does a node determine if a message is legitimate?
Approaches to Group authentication • Cryptographic accumulators • Only a single value is stored • Computation of the value is resource consuming • Key chain commitment • Easy to authentication • Increases the storage requirement of the sensors.
A light-weight Alternative • Using merkle hash trees the computational intensity is limited • Authentication is preformed with log(n) hashes • Nodes only store one value
H(H(ID5). H(ID9)) H(ID5) H(ID9) ID5 ID9 Merkle Hash Trees • A hash of the nodes’ IDs form the leaves of the tree. • All other elements are hashes of the concatenation of the elements children • Each node stores the root value of the tree
Merkle Hash Trees • Authentication chains • A list of the sibling values of each element in the path from the leaf to the root. • If the root can be produced, the authentication is successful. Auth chain for 1: {H(1), H(H(3).H(4))} H(H(H(1).H(2)).H(H(3).H(4))) H(H(1).H(2)) H(H(3).H(4)) H(1) H(2) H(3) H(4)
BS A B Hello(BS).1 Hello(BS).2 Reply(1.IDA) Reply(2.IDB) Reply(2.IDB. IDA) Path Establishment • Base Station transmits hello message • Nodes record the hop count, increment the count, and retransmit the hello packet • Nodes reply including there own ID • Nodes forward replies and Concatenate their ID to the reply
Path Establishment • Base station records all path information from each reply • The first reply received from a sensor is the primary path (fastest turnaround time) • All other paths are recorded as alternate paths Reply(2.IDB. IDA) Level of B: 2 Path to B: {A, B}
Path Establishment • After path establishment • Base station groups all sensors of the same level, and produces a Mekle Hash Tree for each level • The IDs of the sensors are the leaves • The root of the tree is distributed
Base Station All sensors’ IDs All sensors’ level All sensors’ symmetric keys A representation of the Merkle Hash Tree for each level Sensors ID Level symmetric key Root of its level’s Merkle Hash Tree Storage requirement
Message propagation • Base station: • Concatenates the message, msg, to the ID of the destination sensor • Produces the authentication chain for the sensor, and concatenates the message to the chain. • encrypts the resulting message with the symmetric key of the sensor
Message propagation (Outgoing) • Base station (cont.) • The base station concatenates the authentication chain of each sensor in the path to the destination in reverse order, and encrypts with the symmetric key of the intermediate sensor. • Below is an example message to sensor 2. K5({auth5}.K3({auth3}. K2({auth2}.ID2.MSG)))
Message propagation (Outgoing) • Sensors • Decrypt packet • Attempt to authenticate • If successful and more authentications present, remove used authentications and retransmit. • If successful and no more authentications are present, check the ID field and process accordingly. • If unsuccessful, drop packet.
Strengths • Level by level authentication of messages • The base station has global view of the network • Network faults (node deaths) are detectable • Directed communication
Weaknesses • Large message size • Outbound communications are limited in size • Limited group size
Future Work • Integration with a multicast messaging service. • Experimentation with less constrained devices (i.e. pocketPC, SPOT) • Deployment in real world environments
Conclusion • Routing level attacks are defendable with a level-wise grouping method • Merkle Hash trees provide a light-weight alternative to expensive group authentication • By increasing packet size storage requirements of sensors can be lessened