Distributed Detection of Node Replication Attacks in Sensor Networks
320 likes | 585 Views
Distributed Detection of Node Replication Attacks in Sensor Networks. Bryan Parno, Adrian Perrig Virgil Gligor. Carnegie Mellon University. University of Maryland. Sensor Networks.
Distributed Detection of Node Replication Attacks in Sensor Networks
E N D
Presentation Transcript
Distributed Detection of Node Replication Attacksin Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon University University of Maryland
Sensor Networks • Thousands of nodes, each with a CPU, ~4 KB of RAM, a radio and one or more sensors (e.g., temperature, motion, sound) • Applications: burglar alarms, emergency response, military uses • Node Characteristics: • Low cost • No tamper resistance • Limited battery life • Easy to deploy
Attacks on Sensor Networks • Replication Attacks • Capturing many nodes is hard • Instead, capture one node and copy it • Other attacks not in scope of this work • Introducing nodes with new IDs - this is readily preventable: • Admin provides each node with a certificate • ID based on keys • Other Sybil defenses [Newsome04] • Jamming attacks • Partitioning attacks • We assume legitimate nodes form a connected component
Replication is Easy • Only need to capture one node • Offline attack to extract node’s secrets • Transfer secrets to generic nodes • Deploy clones
Repercussions • Clones know everything compromised node knew • Adversary can … • Inject false data or suppress legitimate data • Spread blame for abnormal behavior • Revoke legitimate nodes using aggregated voting • Monitor communication
Our Contributions • Thwart replication attacks using entirely distributed mechanisms • First use of emergent algorithms to provide robust security properties in sensor networks • Resilient even against an adaptive adversary (i.e. adversary knows the protocol and can selectively compromise additional sensors) • Relies on the Birthday Paradox and the network topology • No central points of failure • Efficient Solutions • Comparable to centralized detection
Outline • Introduction • Problem Statement & Previous Work • Our Solution • Evaluation • Discussion
Assumptions • Public key infrastructure • Occasional elliptic curve cryptography is reasonable [Malan04] • Can be replaced with symmetric mechanisms • Network employs geographic routing • Does not require GPS! [Doherty01] • Works with synthetic coordinates [Rao03, Newsome03] • Nodes are primarily stationary
Goals • Detect replication with high probability • After protocol concludes, legitimate nodes have revoked replicas • Secure against adaptive adversary • Unpredictable to adversary • No central points of failure • Minimize communication overhead
Previous Approaches Insufficient • Central Detection [EscGli02] • Each node sends neighbor list to a central base station • Base station searches lists for duplicates • Disadvantages • Some applications may not use base stations • Single point of failure • Exhausts nodes near base station (and makes them attack targets)
Previous Approaches Insufficient • Localized Detection [ChPeSo03] • Neighborhoods use local voting protocols to detect replicas • Disadvantage • Replication is a global event that cannot be detected in a purely local fashion
Outline • Introduction • Problem Statement & Previous Work • Our Solution • Overview • Randomized Multicast Protocol • Line-Selected Multicast Protocol • Evaluation • Discussion
Emergent Properties • Properties that only emerge through collective action of multiple nodes • Highly robust • No central point of failure • Difficult for adversary to attack • Emergent behavior is an attractive approach for thwarting an unpredictable and adaptive adversary
Approach Overview • Step 1: Announce locations • Each node signs and broadcasts its location to neighbors • Location = (x,y), virtual coordinates, or neighbor list • Nodes must participate or neighbors will blacklist them • Step 2: Detect replicas • Uses emergent protocol • Ensures at least one “witness” node receives two conflicting location claims • Step 3:Revoke replicas • Witness floods network with conflicting location claims • Signatures prevent spoofing or framing
Randomized Multicast Protocol • Each node signs and broadcasts its location to neighbors • Each neighbor forwards location to “witness” nodes • Witness chosen at random by selecting random geographic point and forwarding message to node closest to the point • Each neighbor selects ~ witnesses for a total of • Birthday Paradox implies location claims from a cloned node and its clone will collide with high probability • Conflicting location claims are evidence for revoking clones • Signatures prevent forgery of location claims
Randomized Multicast Detection Conflict Detected!
PDetect > 1 – e -R Randomized Multicast Analysis • High probability of detection • 2 replicas (R=2), w = n, PDetect ≥ 95%, • Decentralized and randomized • Moderate communication overhead • Each node’s location sent to n witnesses • Path between two random points in the network is O( n ) hops on average • Results in O(n) message hops per node
Line-Selected Multicast Protocol • In a sensor network, nodes route data as well as collect it • Again, neighbors forward location claim to “witness” nodes • Each intermediate node checks for a conflict and forwards the location claim • If any two “lines” intersect, the conflicting location claims provide evidence for revoking clones
Line-Selected Multicast Detection Conflict Detected!
Line-Selected Multicast Analysis • High probability of intersection for two randomly drawn lines in the plane • Only need a constant number of lines (e.g. for 5 lines/node, PDetect ≥ 95%) • Decentralized and randomized • Minimal communication • Line segments O( n) on average • Only requires O( n) message hops per node
Outline • Introduction • Problem Statement & Previous Work • Our Solution • Evaluation • Discussion
Evaluation Setup • Simulated network of sensor nodes deployed uniformly at random • Measured average communication per node and maximum communication of any node • Varied # of nodes from 1,000 to 10,000 • Varied density of nodes so average # neighbors varied from 10-70, with little effect
Detection in Irregular Topologies • Line-selected Multicast relies on topology to detect replicas, so we ran simulations on irregular topologies
Probability of Detection in Irregular Topologies 2500 nodes, 1 duplicate 5 witnesses/node
Probability of Detection in Irregular Topologies 2500 nodes, 1 duplicate 10witnesses/node
Probability of Detection in Irregular Topologies 2500 nodes, 2 duplicates 5 witnesses/node
Outline • Introduction • Problem Statement & Previous Work • Our Solution • Evaluation • Discussion
Timing Issues • Admin can select frequency of protocol activation • Between runs, nodes only remember results • Time Slots • Divide protocol run into slots and assign each a range of IDs • During each slot, nodes with IDs in the specified range announce their location IDs: 0-9 10-19 20-29 30-39 0 t 2t 3t T Time
Conclusion • Node replication attacks pose a serious threat • We address inherent limitations of centralized and localized solutions • Our algorithms use emergent properties to detect global events in a distributed fashion • High probability of detection and revocation • Resilient to adaptive adversary • Minimal communication overhead • Emergent solutions well adapted to provide security in sensor networks • Algorithms generally applicable to other settings
Thank you! parno@cmu.edu