480 likes | 623 Views
ADVANCED TOPICS. Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260. Mesh Networks and Security. What are Wireless Mesh Networks?. Similar to Wi-Fi Networks
E N D
ADVANCED TOPICS ShambhuUpadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260
What are Wireless Mesh Networks? • Similar to Wi-Fi Networks • Instead of multiple wireless hotspots (WHS), WMNs use one WHS and several transit access points (TAP), also called routers • Clients connect to TAPs, which connect wirelessly to the WHS either directly or multi-hopping over other TAPs
WMNs • WMN provides reliability through redundancy • It is a special case of wireless ad hoc networks • Wireless mesh networks can be implemented with various wireless technologies including 802.11 (802.11s), 802.15, 802.16 • Examples • MIT RoofNet (2001) • Quail Ridge WMN (QuRiNet) at Napa Valley, CA (2004) • Also useful in smart grid for automatic meter reading
Advantages/Disadvantages • Advantages • The TAPs themselves are cheaper than WHS • Since TAPs communicate by wireless signals, they do not require cabling to be run to add new TAPs • Allows for rapid deployment of temporary networks • Disadvantages • TAPs are often placed in unprotected locations • Lack of physical security guarantees • Communications are wireless and therefore susceptible to all the vulnerabilities of wireless transmissions
Three Security Challenges Posed by WMNs • Securing the routing mechanism • WMNs rely on multi-hop transmissions over a predominantly wireless network • Routing protocol is very important and a tempting target • Detection of corrupt TAPs • The TAPs are likely to be stored in unprotected locations, so they may be easily accessed by malicious entities and can be corrupted or stolen • Providing fairness • The protocol needs to be designed to distribute bandwidth between the TAPs in a manner fair to the users to prevent bandwidth starvation of devices far from the WHS
Fairness • There are several ways in which bandwidth can be distributed among TAPs • What may be the best solution is to distribute bandwidth proportional to the number of clients using a TAP
Attack Model • Four simple types of attacks possible • The first attack is removal and replacement of the device • easily detected by change of topology • Access the internal state of the device • Modify internal state • Clone TAPs • Other sophisticated attacks possible • Blocking attacks, black hole, sybil, etc.
Access Internal State • This is a passive attack and is difficult to detect • In this attack the attacker need not disconnect the device from WMN • Even the disconnection cannot be detected • The effect of the attack can be reduced by changing the TAP data at regular intervals
Modify Internal State • In this type of attack, the attacker can modify the routing algorithm • This type attack also changes the topology • It can also be detected by WHS
Clone TAP • In this type of attack the attacker is able to create a replica of the TAP and place this in a strategic location in WMN • It also allows the attacker to inject some false data or to disconnect some parts of network • It can damage the routing mechanisms but can be detected
Jamming and Countermeasure • The first diagram shows the attack by the adversary • The second diagram shows the protection measure for this attack after detection
Attacks on Multihop Routing in WMN • Rational attack vs. malicious attack • A rational attack • Does only if misbehaving is beneficial in terms of price, QoS, or resource saving • For instance, force the traffic through a specific TAP in order to monitor the traffic of a given mobile client or region • A malicious attack • Involves partitioning the network or isolating the TAPs • For instance, the routes between WHS and TAPs are artificially increased leading to poor performance
Securing Multihop Routing • Using secure routing protocols to prevent attacks against routing messages • If the state of one or more TAPs is modified, the attack can be detected and the network reconfigured • DoS attacks can be prevented by identifying the source of disturbance and disabling it
Generalized WMNs • Vehicular Networks is special case of WMNs where TAPs are represented by cars and roadside WHS • Involves applications such as reporting events (accidents), cooperative driving, payment services and location based services • Multi-Operator WMNs include several operators and various devices: mobile phones, laptops, base stations and APs
Conclusion • WMNs extend the coverage of WHS in an inexpensive manner • The three fundamental security issues that have to be addressed in WMNs • Detection of corrupt TAPs • Defining and using a secure routing protocol • Defining and implementing a proper fairness metric
Reference • Ben Salem, N.; Hubaux, J-P, "Securing wireless mesh networks ,“ Wireless Communications, IEEE, vol.13, no.2, pp.50,55, April 2006
Issues in Sensor Networks • Localization • Synchronization • In-network processing • Data-centric querying • Energy-aware computing
Energy Constraints • Battery-powered devices • Communication is much more energy consuming than computation • Transmitting 1 bit costs as much energy as running 1,000 instructions • Gap is only going to be larger in the future • Load balancing • Coordinated sleeping schedules • Explore correlation in sensing data • Power saving techniques integral to most sensor networks
MAC Protocols for Sensor Networks • Contention-Based: • CSMA protocols (IEEE 802.15.4) • Random access to avoid collisions • IEEE 802.11 type with power saving methods • Scheduling-Based: • Assign transmission schedules (sleep/awake patterns) to each node • Variants of TDMA • Hybrid schemes
MAC Protocol Examples • PAMAS [SR98]: • Power-aware Medium-Access Protocol with Signaling • Contention-based access • Powers off nodes that are not receiving or forwarding packets • Uses a separate signaling channel • S-MAC [YHE02]: • Sensor Medium Access Control protocol • Contention-based access • TRAMA [ROGLA03]: • Traffic-adaptive medium access protocol • Schedule- and contention-based access • Wave scheduling [TYD+04]: • Schedule- and contention-based access
S-MAC • Identifies sources of energy waste [YHE03]: • Collision • Overhearing • Overhead due to control traffic • Idle listening • Trade off latency and fairness for reducing energy consumption • Components of S-MAC: • A periodic sleep and listen pattern for each node • Collision and overhearing avoidance
S-MAC: Sleep and Listen Schedules • Each node has a sleep and listen schedule and maintains a table of schedules of neighboring nodes • Before selecting a schedule, node listens for a period of time: • If it hears a schedule broadcast, then it adopts that schedule and rebroadcasts it after a random delay • Otherwise, it selects a schedule and broadcasts it • If a node receives a different schedule after selecting its schedule, it adopts both schedules • Need significant degree of synchronization
S-MAC: Collision and Overhearing Avoidance • Collision avoidance: • Within a listen phase, senders contending to send messages to same receiver use 802.11 • Overhearing avoidance: • When a node hears an RTS or CTS packet, then it goes to sleep • All neighbors of a sender and the receiver sleep until the current transmission is over
Routing Strategies • Geographic routing: • Greedy routing • Perimeter or face routing • Geographic localization • Attribute-based routing: • Directed diffusion • Rumor routing • Geographic hash tables • Energy-aware routing: • Minimum-energy broadcast • Energy-aware routing to a region
Energy-Aware Routing • Need energy-efficient paths • Notions of energy-efficiency: • Select path with smallest energy consumption • Select paths so that network lifetime is maximized • When network gets disconnected • When one node dies • When area being sensed is not covered any more • Approaches: • Combine geographic routing with energy-awareness • Minimum-energy broadcast
Minimum Energy Broadcast Routing • Given a set of nodes in the plane • Goal: Broadcast from a source to all nodes • In a single step, a node may broadcast within a range by appropriately adjusting transmit power • Energy consumed by a broadcast over range γ is proportional to γα • Problem: Compute the sequence of broadcast steps that consume minimum total energy • Centralized solutions • NP-complete [ZHE02]
Three Greedy Heuristics • In each tree, power for each node proportional to αth exponent of distance to farthest child in tree • Shortest Paths Tree (SPT) [WNE02] • “Node” version of Dijkstra’s SPT algorithm • Minimum Spanning Tree (MST) [WNE02] • Maintains an arborescence rooted at source • Broadcasting Incremental Power (BIP) [WNE02] • In each step, add a node that can be reached with minimum increment in total cost • SPT is Ω(n)-approximate, MST and BIP have approximation ratio of at most 12 [WCLF01]
References • Feng Zhao and Leonidas Guibas, Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufman, 2004 • Jeffrey E. Wieselthier, Gam D. Nguyen, and Anthony Ephremides. 2002. Energy-efficient broadcast and multicast trees in wireless networks. Mob. Netw. Appl. 7, 6 (December 2002)
Advanced Meter Reading • Advanced Metering Infrastructure (AMI) or smart meters (2-way) • Used for revenue accounting • Wireless based • Many proprietary • Moderate range, drive-by reading • Mesh (Zigbee) and WiFi sometimes • About 50Million AMR/AMI installed (USA) • Suggested standard: ANSI C12.18 • Smart meters (at Microgrid level) provide information needed to analyze energy usage and thus allow energy minimization algorithms to be implemented
Prospects for Smart Appliances • Examples: smart refrigerator, smart dryer • Two-way communication via Internet • Logical extension of smart grid/buildings • Technically possible for years but … • Hardware costs high; Installation may be complex; Standards lacking • Forms a SCADA or CPS system • Security and privacy concerns high • Benefits unclear • Futuristic discussion mostly
Smart Metering Communication • Zigbee is ideal for AMI • Can network a no. of sensors and controllers in a household • Possibly in a mesh network • Can operate in one of 3 frequency bands
Potential Concerns • WiFi and Zigbee interference • Can be handled by separating the channels by 30MHz • Security concerns of ad hoc and mesh networks apply • Eavesdropping • Traffic analysis • Replay attacks • Additionally: • Employee mistakes, equipment malfunctions, virus, coordinated attacks from a state or terrorist group • Privacy concerns • Smart meters collect personally identifiable info • Cyber criminals could use them for identity theft
A Privacy Compromise Scenario • Electricity use patterns could lead to disclosure • Could leak info on customers • When they’re at home (sleeping versus watching television) • When at work, or traveling • It might also be possible to discover what types of appliances and devices are present • Increases in power draw could suggest changes in business operations • Impacts • Criminal targeting of home • Business intelligence to competitors
Hacking Attacks and Mitigation • Two-way communication between customers and utility companies means more risk • Two-way meters accessible to both users and enemies (use buggy s/w) • Smart meter is the pain point (may be hacked) • Simulation of a worm injected into a meter shows • how it would spread • how it can be used to cause power grids to surge or shut off • Common vulnerabilities exist, but no powerful devices to implement • Devices do not have cycles to implement strong crypto solutions • Mitigation techniques • Zigbee security (uses hierarchy of keys) • Machine-to-machine strong authentication • Encryption • Data hashing, digital signing, etc. • This is an active research area today
References • Darold Wobschall, University at Buffalo, 2012 • M. Nabeel, J. Zage, S. Kerr, E. Bertino, Cryptographic Key Management for Smart Power Grids, 2012, http://www.cerias.purdue.edu/apps/reports_and_papers/view/4591
What is IoT? • Loosely coupled decentralized system of smart objects • Ubiquitous computing, 100B to be connected to the Internet by 2020 • After the WWW, IoT represents the most potentially disruptive technological revolution • What inspired IoT? • RFID, Short-range wireless communication • Real-time localization • Sensor networks • What does it entail? • Scientific theory • Engineering design • User experience
IoT Curriculum • Universities have started building special curricula • Open University in UK has developed a learning infrastructure for collaborative learning in IoT • Merging of the physical and digital realms (CPS) • Physical objects become true actors on the Internet • Huge increase in the number of internetconnected devices, objects, sensors and actuators • Huge increase in the amount and value of data (Big Data) • Emergence of novel embedded device platforms below the level of personal mobile devices • Novel applications in energy, transport, health, business and daily life • Expectation is that MOOCs may take up the challenge • Companies such as Cisco, IBM, Intel are engaging
Skills Set for IoT • Algorithms • Programming skills • Distribution and collaboration • Ability to develop networked sensing apps • Creative design • Collaborative design • Ethical issues • Privacy and security • Computing in society
Typical Components of IoT • iPod • Nokia, Android cell phones • Nintendo DS, Game Boy Advance • Roomba 500 iRobot • Sirius Satellite Radio Receivers • Automobiles
IoT Protocol Details • IEEE 802.15.4 is the standard for low rate WPANs • 802.15.4 handles the physical and MAC layer but not upper layers • Can be used with 6LoWPAN and standard IP protocols to build a wireless embedded Internet • 6LoWPAN is the low power IPv6 version developed for small devices
Security Challenges in IoT • Cryptographic security • Traditional tools may not be suitable due to limited processor speed and memory • Key management • Manual key management may not scale • Limited user interfaces will make security deployment difficult • Credentialing • Credentialing users and devices required • may not scale due to the sheer size of the nework • Identity management • A devise identity may need to be mapped to groups of users • Usability is also an issue • Limited user interface • Privacy • Sensitive information on health front • “network guards” may be needed
References • http://prezi.com/aordc8uod3rj/internet-of-things-presentation/ • IEEE Computer, February 2013 • I. Akyildiz and J. Jornet, The Internet of Nano-Things, IEEE Wireless Communications, 2010