1 / 52

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security. Topic 7. Wireless Sensor Network Security. Node to node. Group communication. Node to sink. Communication and processing module. Location?. sensor. Wireless Sensor Networks. 1. Network protocol (e.g., routing). 2. Data management (e.g., aggregation).

etilton
Download Presentation

CSC 774 Advanced Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security CSC 774 Adv. Net. Security

  2. Node to node Group communication Node to sink Communication and processing module Location? sensor Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g., aggregation) 3. Localization and time synchronization 4. Energy management, robustness,etc. 5. Security a. Key management b. Broadcast authentication c. Security of fundamental services d. Detection of attacks, etc. CSC 774 Adv. Net. Security

  3. Wireless Sensor Networks (Cont’d) • Composed of • Low cost, low power, and multifunctional nodes • Wireless communication in short distances • Sensor node • Sensing • Data processing • Communication • Unattended CSC 774 Adv. Net. Security

  4. Security in Sensor Networks • Sensor network security • Key management • Point-to-point authentication • Encryption • Broadcast authentication • Secure localization • Secure clock synchronization • … CSC 774 Adv. Net. Security

  5. Challenges in Sensor Network Security • Resource constraints • Limited storage, computation, and communication • Expensive mechanisms such as public key cryptography is not practical • Depletable resources (e.g. battery power) • Resource consumption attacks • Threat of node compromises • Sensor nodes are usually deployed in an unattended fashion • Subject to node captures CSC 774 Adv. Net. Security

  6. Challenges (Cont’d) • Local computation/communication v.s. global threat • Sensor network applications often depend on local computation and communication due to resource constraints • A determined attacker may • Attack any node in a network, and • Use information gathered from compromised nodes to attack non-compromised ones CSC 774 Adv. Net. Security

  7. Research Problems • Cryptographic services • Broadcast authentication • Key management • Security mechanisms for fundamental services • Clock synchronization • Secure location discovery • Secure aggregation and in-network processing • Cluster formation/cluster head election CSC 774 Adv. Net. Security

  8. Research Problems (Cont’d) • Securing sensor network applications • Intruder detection • Tracking of moving targets • … • Intrusion detection • A desirable component • Require different solutions than traditional techniques • Others CSC 774 Adv. Net. Security

  9. CSC 774 Network Security Topic 9.1 Key Pre-distribution in Wireless Sensor Networks CSC 774 Adv. Net. Security

  10. Establishing Pairwise Keys in Sensor Networks • Traditional techniques are not practical in sensor networks • Public cryptography: not practical • Key distribution centers (KDC): not practical CSC 774 Adv. Net. Security

  11. Probabilistic Key Pre-Distribution CSC 774 Adv. Net. Security

  12. i A set of random keys j Probabilistic Key Pre-Distribution • Basic idea • Assign a random subset of keys of a key pool to each node • Two nodes can establish secure communication if they have at least one common key CSC 774 Adv. Net. Security

  13. Probabilistic Key Pre-Distribution (Cont’d) • Key distribution (three phases) • Key pre-distribution • Shared-key discovery • Path-key establishment CSC 774 Adv. Net. Security

  14. Probabilistic Key Pre-Distribution (Cont’d) • Key pre-distribution • Generate a large pool of P keys and their ids • For each sensor, random draw k keys out of P without replacement • This forms the key ring of the sensor • Load the key ring into the memory of the sensor • Save the key ids of each key ring and the sensor id on a trusted controller • For each node, load the i-th controller node with the key shared with that node. CSC 774 Adv. Net. Security

  15. Probabilistic Key Pre-Distribution (Cont’d) • Key pre-distribution (Cont’d) • Parameters k and P are critical • Only a small number of keys need to be placed on each node’s key ring • Any two nodes share at least a key with a chosen probability CSC 774 Adv. Net. Security

  16. Probabilistic Key Pre-Distribution (Cont’d) • Shared-key discovery • Each node discovers its neighbors in wireless communication range with which it shares keys • Method 1: • Each node broadcasts the list of key ids on its key ring • Give an adversary additional knowledge of key distribution • No direct ways to comprise keys CSC 774 Adv. Net. Security

  17. Probabilistic Key Pre-Distribution (Cont’d) • Shared-key discovery (Cont’d) • Method 2 (private shared-key discovery) • For each key on a key ring, each node broadcasts a list • , EKi(), i= 1, …, k, where  is a challenge • If a node receives this list, it tries to decrypt each cipher-text with every key it has • The node establishes a shared key if it can successfully decrypt a cipher-text CSC 774 Adv. Net. Security

  18. Probabilistic Key Pre-Distribution (Cont’d) • Path-key establishment • Assign a path-key to selected pairs of nodes that • Are in wireless communication range • Do not share a common key • But are connected by two or more links at the end of shared-key discovery • Established through those links CSC 774 Adv. Net. Security

  19. Probabilistic Key Pre-Distribution (Cont’d) • Revocation • Revoke the entire key ring of a compromised node • A controller node broadcasts a single revocation message containing a signed list of key ids for the revoked key ring • The controller generates a signature key Ke, and unicasts it to each node by encrypting it with the key they share. • Each node verifies the signed list of key ids, and removes those key from its key ring CSC 774 Adv. Net. Security

  20. Probabilistic Key Pre-Distribution (Cont’d) • Re-keying • Restart shared-key discovery and path-key discovery CSC 774 Adv. Net. Security

  21. Analysis • Model a sensor network as a random graph • All the sensor nodes are the vertices in the graph • There is an edge between two vertices if the corresponding nodes share a common key • Analysis questions • What should be the expected degree (d) of a node so that a sensor network with n nodes is connected? • Given d and the size of a neighborhood (n’), what should be the key ring size (k) and key pool size (P) for a network with n nodes? CSC 774 Adv. Net. Security

  22. Analysis (Cont’d) • What should be the expected degree (d) of a node so that a sensor network with n nodes is connected? • Answered by random graph theory • G(n, p): a graph of n nodes for which the probability that a link exists between two nodes is p. • d = p * (n-1): expected degree of a node (i.e. the average number of edges connecting that node with its neighbors). • Erdös and Rényi’s Equation: • Given a desired probability Pc for graph connectivity and number of nodes, n, the threshold function p is defined by: • where CSC 774 Adv. Net. Security

  23. Analysis (Cont’d) CSC 774 Adv. Net. Security

  24. Analysis (Cont’d) • Given d and the size of a neighborhood (n’), what should be the key ring size (k) and key pool size (P) for a network with n nodes? • p’: probability of sharing a key between any two nodes in a neighborhood (p’=d/(n’-1)) • p’ = 1  Pr[two nodes do not share any key] • Simplify with Stirling’s approximation CSC 774 Adv. Net. Security

  25. Analysis (Cont’d) CSC 774 Adv. Net. Security

  26. Improvements for the Probabilistic Key Pre-Distribution • q-composite key pre-distribution • Two nodes have to have at least q shared keys to derive a valid pairwise key • Better resilience when the number of compromised nodes is small • Multi-path enforcement • Derive each path key through multiple node-disjoint paths, each of which derives one sub-key • Path key is the XOR of all sub keys • Better resilience to compromised nodes in key paths CSC 774 Adv. Net. Security

  27. Random Pairwise Keys Scheme • Approach • Calculate the smallest probability p of two nodes being connected so that the entire network is connected with a high probability. • Consider a network of n nodes • Each node needs to store np pairwise keys • Limitation • The network size is limited by n=m/p, where m is the available memory on each node for keys CSC 774 Adv. Net. Security

  28. Polynomial Pool Based Key Pre-Distribution CSC 774 Adv. Net. Security

  29. Outline • Background • Polynomial based key predistribution • A framework for key predistribution in sensor networks • Polynomial pool based key predistribution • Two efficient key predistribution schemes • Random subset assignment • Grid based key predistribution • Efficient implementation in sensor networks • Conclusion and future work CSC 774 Adv. Net. Security

  30. Polynomial Based Key Predistribution • By Blundo et al. [CRYPTO ‘92] • Developed for group key predistribution • We consider the special case of pairwise key predistribution • Predistribution: • The setup server randomly generates where f (x,y) = f (y, x) • Each sensor i is given a polynomial sharef(i, y) • Key establishment: • Node i computes f (i, y = j) = f (i, j) • Node j computes f (j, y =i) = f (j, i) = f (i, j) CSC 774 Adv. Net. Security

  31. Polynomial Based Key Predistribution (Cont’d) • Security properties (by Blundo et al.) • Unconditionally secure for up to t compromised nodes • Performance • Storage overhead at sensors: (t +1)log q bits • Computational overhead at sensors: t modular multiplications and t modular additions • No communication overhead • Limitation • Insecure when more than t sensors are compromised • An invitation for node compromise attacks CSC 774 Adv. Net. Security

  32. Polynomial Pool Based Key Predistribution • A general framework for key predistribution based on bivariate polynomials • Let us use multiple polynomials • A pool of randomly generated bivariate polynomials • Two special cases • One polynomial in the polynomial pool • Polynomial based key predistribution • All polynomials are 0-degree ones • Key pool by Eschenauer and Gligor CSC 774 Adv. Net. Security

  33. f1(x,y), f2(x,y), …, fn(x,y) A subset: {fj(i, y), …, fk(i, y)} i Random polynomial pool F Polynomial Pool Based Key Predistribution (Cont’d) • Phase 1: Setup • Randomly generates a set F of bivariate t-degree polynomials • Subset assignment: Assign a subset of polynomials in F to each sensor CSC 774 Adv. Net. Security

  34. Polynomial Pool Based Key Predistribution (Cont’d) • Phase 2: Direct Key Establishment • Polynomial share discovery: Communicating sensors discover if they share a common polynomial • Pairwise keys can be derived if they share a common polynomial. • Two approaches: • Predistribution: • Given predistributed information, a sensor can decide if it can establish a direct pairwise key with another sensor. • Real-time discovery: • Sensors discover on the fly if they can establish a direct pairwise key. CSC 774 Adv. Net. Security

  35. Polynomial Pool Based Key Predistribution (Cont’d) • Phase 3: Path Key Establishment • Establish pairwise keys through other sensors if two sensors cannot establish a common key directly • Path discovery • Node i finds a sequence of nodes between itself and node j such that two adjacent nodes can establish a key directly • Key path: the above sequence of nodes between i and j • Two approaches • Predistribution • Node i can find a key path to node j based on predistributed information • Real-time discovery • Node i discover a key path to node j on the fly CSC 774 Adv. Net. Security

  36. f1(x,y), f2(x,y), …, fn(x,y) Random Subset Assignment Scheme • An instantiation of the polynomial pool-based key predistribution. • Subset assignment:random A random subset: {fj(i, y), …, fk(i, y)} i Random polynomial pool F CSC 774 Adv. Net. Security

  37. Random Subset Assignment (Cont’d) • Polynomial share discovery • Real-time discovery Broadcast a list of challenges. Broadcast IDs in clear text. fj, …, fk , Ekv(), v = 1, …, m. i i CSC 774 Adv. Net. Security

  38. i j k Random Subset Assignment (Cont’d) • Path discovery • i and j use k as a KDC • Alternatively, i contacts nodes with which it shares a key; any node that also shares a key with j replies. • Each key path has 2 hops CSC 774 Adv. Net. Security

  39. Probability of Sharing Direct Keys between Sensors • s: polynomial pool size • s’: number of polynomial shares for each sensor • p: probability of sharing a polynomial between two sensors CSC 774 Adv. Net. Security

  40. Probability of Sharing Keys between Sensors • d: number of neighbors • p: probability that two sensors share a polynomial • ps: probability of sharing a common key Note: each key path is at most two hops CSC 774 Adv. Net. Security

  41. Dealing with Compromised Sensors • Comparison with basic probability and q-composite schemes • Probability to establish direct keys p = 0.33 • Each sensor has storage equivalent to 200 keys CSC 774 Adv. Net. Security

  42. Dealing with Compromised Sensors (Cont’d) • Comparison with random pairwise keys scheme • Assume perfect security against node compromises • Each polynomial is used at most t times in our scheme • Each sensor has storage equivalent to 200 keys CSC 774 Adv. Net. Security

  43. Grid Based Key Predistribution • Create a mm grid • Each row or column is assigned a polynomial • Assign each sensor to an interaction • Assign each sensor the polynomials for the row and the column of its intersection • Sensor ID: coordinate • There are multiple ways for any two sensors to establish a pairwise key CSC 774 Adv. Net. Security

  44. Grid Based Key Predistribution (Cont’d) • Order of node assignment CSC 774 Adv. Net. Security

  45. Grid Based Key Predistribution (Cont’d) • Polynomial share discovery • No communication overhead Same column Same row CSC 774 Adv. Net. Security

  46. Grid Key Predistribution (Cont’d) • Path discovery • Real-time discovery • Paths with one intermediate node • Paths with two intermediate nodes • They know who to contact! CSC 774 Adv. Net. Security

  47. Properties • Any two sensors can establish a pairwise key when there is no compromised node; • Even if some sensors are compromised, there is still a high probability to establish a pairwise key between non-compromised sensors; • A sensor can directly determine whether it can establish a pairwise key with another node. CSC 774 Adv. Net. Security

  48. Dealing with Compromised Sensors • Comparison with basic probabilistic scheme, q-composite scheme, and random subset assignment scheme • Assume each sensor has storage equivalent to 200 keys CSC 774 Adv. Net. Security

  49. Dealing with Compromised Sensors (Cont’d) • Probability to establish pairwise keys when there are compromised sensors • d: number of non-compromised sensors to contact • Assume each sensor has storage equivalent to 200 keys CSC 774 Adv. Net. Security

  50. Key: n bits l bits each f1(i,y) f2(i,y) fr(i,y) Polynomials over Fq’ Same storage as 1 polynomial over Fq Sensor ID j Implementation • Observations • Sensor IDs are chosen from a field much smaller than cryptographic keys • Field for cryptographic keys: Fq • Field for sensor IDs: Fq’ • Special fields: q’=216+1, q’ = 28+1 • No division operation is needed for modular multiplications CSC 774 Adv. Net. Security

More Related