1 / 49

The Sybil Attack in Sensor Networks: Analysis & Defenses

The Sybil Attack in Sensor Networks: Analysis & Defenses. James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian. Outlines. Introduction Three Dimensions of Sybil Attack Taxonomy Attacks Known & New attacks Defenses Radio Resource Testing Random Key Predistribution

Download Presentation

The Sybil Attack in Sensor Networks: Analysis & Defenses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian

  2. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  3. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  4. Introduction • Security in Sensor Network • Wireless network natures • Sensor nodes constraints • Sybil Attacks • First described in peer-to-peer networks. • An attack against identity. • A particularly harmful attack in sensor networks.

  5. Definition of Sybil Attack • In this paper • A malicious device illegitimately takes on multiple identities. • The additional identities are called Sybil nodes. • Question: • How does an attacker create Sybil nodes and use them?

  6. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  7. Sybil Attack Taxonomy • Dimension I – Direct vs. IndirectCommunication • Direct Communication • Legitimate nodes can communicate with Sybil nodes directly. • Indirect Communication • One or more of the malicious devices claims to be able to reach the Sybil nodes. • Messages sent to a Sybil node are routed through one of these malicious nodes.

  8. Sybil Attack Taxonomy • Dimension II – Fabricated vs. Stolen Identities • Fabricated • Simply create arbitrary new Sybil identities. • Stolen • Assign other legitimate identities to Sybil nodes. • May go undetected if attacker destroys or disable them. Identity Replication Attack The same identity is used many times and exists in multiple places in the network. Is it a Sybil Attack???

  9. Sybil Attack Taxonomy • Dimension III – Simultaneity • Simultaneous • All Sybil identities participate in the network at once. • Non-Simultaneous • Only act as a smaller number of identities at any given time by: • Letting different identities join and leave • Or only using each identity once. • Having several physical devices swap identities. Each device may present different identities at different times!

  10. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  11. Attacks How the Sybil Attack can be used in wireless sensor networks?

  12. Known Attacks • Distributed Storage • Defeat replication and fragmentation mechanisms • Routing • Attack routing algorithm • Geographic routing • Evade misbehavior detection mechanisms

  13. New Attacks • Data Aggregation • With enough Sybil nodes, an attacker may be able to completely alter the aggregate reading. • Voting • Depending on the number of identities the attacker owns, he may be able to determine the outcome of any vote. • Either claim a legitimate node is misbehaving or Sybil nodes can vouch for each other…

  14. New Attacks • Fair Resource Allocation • Using Sybil attack, a malicious node can obtain an unfair share of any resource shard in per-node manner. • Consequently, cause DoS to legitimate node, and also give the attacker more resources to perform attacks. • Misbehavior Detection • Sybil nodes could “spread the blame” . • Even action is taken to revoke the offending nodes, the attacker can continue using new Sybil identities to misbehave.

  15. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  16. Defenses How can we defend against the Sybil Attack?? Identity Validation

  17. Defenses • Two types of ways to validate an identity • Direct validate • Indirect validate

  18. Defenses • Previous Defense • Resource testing By verifying that each identity has as much of the tested resource as a physical device. • Computation, storage • and communication • Unsuitable for wireless sensor networks • WHY? The attacker may use a physical device with much higher computation and storage ability! The replies converging at the verifier will result in that part of network becoming congested!!!

  19. New Defenses in this paper • Radio Resource Testing • Random Key Predistribution • Registration • Position Verification • Code Attestation

  20. New Defenses in this paper • Radio Resource Testing • Random Key Predistribution • Registration • Position Verification • Code Attestation

  21. Radio Resource Testing • Direct validation • Assumptions • Any physical device has only one radio • A radio is incapable of simultaneously sending or receiving on more than one channel. • The basic idea: • A node assigns each of its n neighbors a different channel. • By challenging a neighbor node on the exclusively assigned channel, a sensor node can detect Sybil nodes with a certain probability.

  22. Radio Resource Testing with enough channels • Suppose: • s Sybil nodes out of n neighbors. • One channel for each neighbor. • Pr (choose a channel is not being transmitted on) = • Pr (not detecting a Sybil node) = • Repeat test for r round Pr (no Sybil nodes being detected) =

  23. Radio Resource Testing with limited channels • In case of limited channels, only subset of its neighbors can be tested at one time. • Suppose : • n neighbors, s Sybil nodes, m malicious nodes, and g good nodes. • only c neighbors are tested at once, of which there are S Sybil nodes, M malicious nodes, and G good nodes. • The probability of a Sybil node being detected is : A malicious node not in the subset being tested can cover for a Sybil node that is being tested by transmitting on the channel that the Sybil node is supposed to be transmitting on…

  24. Radio Resource Testing with limited channels • Repeating this test for r rounds The probability of a Sybil node being detected is Effective defense against simultaneous direct-communication Variant of the Sybil attack.

  25. New Defenses in this paper • Radio Resource Testing • Random Key Predistribution • Registration • Position Verification • Code Attestation

  26. Random Key Predistribution • Random Key Predistribution • Each node is assigned a random set of keys or key-related information. • In key set-up phase, each node can discover or compute the common key it shares with its neighbors… • Node-to-node secrecy.

  27. Random Key Predistribution • Key ideas: • Associating the node identity with the keys assigned to the node. • Key validation, i.e., the network being able to verify part or all of the keys that an identity claims to have. • Direct or Indirect Validation? • Different variants • Key pool • Single-space pairwise key distribution • Multi-space pairwise key distribution

  28. Key Pool • Key Pool Scheme • Randomly assigns k keys to each node from a pool of m keys. • During the initialization phase, any two neighbors sharing q common keys can establish a secret link. • Suppose Each node’s identity is the indices in sorted order of keys that it holds. • What’s the problem? with multiple compromised keys, the attacker can use any combination of the compromised keys to generate new identity!!!!

  29. Key Pool • An Extension • Let be the set of keys assigned to ID, • ID is the identity of the node, and is the index of its ith key in the key pool, • The set of keys that node ID possesses are determined by: • where H is a hash function, and PRF is a pseudo random function. • The index of a node’s ithkey, is determined by a pseudo random function with H(ID) as the function’s key, and i as its input.

  30. Key Pool • An example • Node ID = 30 • Key set = { K1, K8, K12, K78, …} • Rule: pick the 3rd indices • How to validate this node ID (= 30) ?? • Test whether PRF H(30) (3) = 12 ?? • What properties does this scheme have? Given 12, it is hard to find the key, H(30), for PRF to yield exactly 12. Even known the value of H(30), it s still hard to find that ID = 30.

  31. Key Pool • What can the attacker do? • Capture legitimate nodes and read off the keys, • Build up a compromised key pool S, • Fabricate usable Sybil identitiesID’ to use in Sybil attack, which means ID’ must be able to pass the validation by other nodes. • Question: • Given a set of compromised keys S • How difficult for an attacker to generate a usable Sybil identity? • How to evaluate the difficulty?

  32. Key Pool • How to evaluate the difficulty? • Thetime complexityto generate a usable Sybil node ID given a set of compromised nodes could be expressed in terms of theprobability pthat a random identity is a usable Sybil identity. • So,the expected number of timesan attacker has to try to find a usable Sybil identity is1/p. • Notation:

  33. Key Pool • In Full validation case… • Verify every key the identity claims to have. • How does the randomly generated identity ID’ survive the full validation? • ID’ has to satisfy : • Therefore…

  34. Key Pool • In case each identity is challenged by d nodes. Condition over t, where

  35. Key Pool • Each identity is challenged by d nodes.

  36. Key Pool If tolerate threshold is 2-64 , • Full validation: 150 nodes; • Partial validation with d = 30, only 30 nodes. However… • No node-to-node authentication • An attacker may compromise a sufficient fraction of keys

  37. Random Key Predistribution • In contrast, Pairwise key distribution • Assigns a unique key to each pair of nodes… • Single-space Pairwise Key Distribution • Multi-space Pairwise Key Distribution

  38. Single-space Pairwise Key Distribution • A sensor node i stores - unique public information Ui and private information Vi, • In bootstrapping phase • nodes exchange public information, • node i compute its key with node j with f(Vi, Uj) , • where f(Vi, Uj) = f(Vj, Ui) • -secure property (Given c compromised nodes) if c <= , a simple direct validation is sufficient; if c > , prone to the Sybil attack. • With Perfect resilience • Sensor node’s memory constraint

  39. Multi-space Pairwise Key Distribution • To further enhance the security of single-space… • In this scheme, each sensor node will be assigned k out of the m key spaces. • Key computation • Use single-space scheme, if they have one or more key spaces in common. • Properties • Without validation • Prone to the indirect-communication Sybil attack. • With validation • Indirect validation is necessary to ensure a globally consistency..

  40. Random Key Predistribution – Multiple-space Pairwise Key Distribution • Probability of fabricating Sybil identities with the multispace scheme. Si– the event that space i be compromised Then, given ccompromised nodes, So, we have:

  41. Summary of Random Key Predistribution • Key Pool • One-way function • Indirect validation • Single-space pairwise key distribution • -secure property • Direct validation ensures globally consistent outcome. • Multi-space pairwise key distribution • Has to compromise far more than nodes to compromise one space • And compromise k spaces with a probability of around 0.05. • The best among these three approaches.

  42. New Defenses in this paper • Radio Resource Testing • Random Key Predistribution • Registration • Position Verification • Code Attestation

  43. Other Defenses • Identity Registration • Based on a trusted central authority • However, • Attacker may be able to control the good list. • Need maintain the deployment information • Position Verification • Assume network is immobile. • Verify the physical position of each node. • How to securely verify a node’s exact position is still an open question. • Mobile attacker’s identity needs to be verified simultaneously.

  44. Other Defenses • Code Attestation • Code running on a malicious node must be different form that on a legitimate node. • The technique is not readily applicable to wireless network. • High cost • Energy consumption

  45. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  46. Comparison and Discussion • All these Sybil Defenses… * Assume that nodes can only verify the position that they directly communicate with; ** Key predistribution can not stop an attacker from using stolen identities… but it does make it more difficult for the attacker to steal identities in the first place.

  47. Outlines • Introduction • Three Dimensions of Sybil Attack Taxonomy • Attacks • Known & New attacks • Defenses • Radio Resource Testing • Random Key Predistribution • Other Defenses • Discussion • Conclusion

  48. Conclusions • The first paper that systematically analyzes the Sybil attack and its defenses in sensor networks. • It introduces a taxonomy of the different forms of the Sybil attack. • Several new defenses are proposed.

  49. Conclusions • In radio resource testing • Based on the assumption that each node has only one channel and can’t send and receive simultaneously on more than one channel. • How a sensor node assigns the radio channels to its neighbors? • The testing process may consumes a lot of battery power • In random key predistribution • If some keys are compromised, the attacker may be able to falsely claim the identities of many non-compromised sensor nodes. • It’s not practical in a mobile wireless network environment. • Other defenses • Have their own drawbacks and not very applicable in wireless sensor networks…

More Related