Taddeo - PhD Review Methodology For Securing Networked Self-Adaptive Embedded Systems Antonio Vincenzo Taddeo antonio.taddeo@alari.ch Academic Advisor: Prof. Mariagiovanna Sami sami@alari.ch Research Advisor: Dr. Alberto Ferrante ferrante@alari.ch ALaRI Faculty of Informatics Università della Svizzera Italiana - 09.12.08
Problem Statement Self-Adaptive Systems (SAS) introduce new security challenges Need for new security principles and design Solution: (Self-)Adaptive Security My research work is part of the AETHER - FET FP6 EU Project on Self-Adaptive Embedded Technologies for Pervasive Computing Architectures http://www.aether-ist.org 2
Why is the subject innovative? Typically, security mechanisms are designed as static and non-flexible Adaptation focuses on a single security aspects Self-adaptive embedded systems require innovative dynamic and adaptive security approaches characterized by strong resource constraints (processing capacity, memory space, energy availability ) To be adopted at run time, in real time 3
My contributions (1) A new model of SAS Defined through coordinated management of HW & SW self-adaptivity (2) A framework for security self-adaptation instance of the model in (1) run-time adaptation of security services (3) Enhancement of (2) for networked SAS Dynamic Service Negotiation Guarantee of Services 4
(1) New SAS Model Decentralized control algorithm RTE as interface between SW and HW. Separation of adaptivity concerns at each level. Each level uses MCA paradigm to handle self-adaptation. Recommender module as coordination mechanism. Extensive simulations have been performed to validate and evaluate the recommender module. 5
Simulation Results (Recommender) 6
(2) Security Self-Adaptation How can we have self-adaptive security? MCA Paradigm Goals: Satisfy the Application requirements; Maximize the # of Running Applications; Minimize the Cost of Security Configurations; Monitorable Space: Running Application; Current Cost; System Cost Threshold; Adaptation Space: Requirement satisfaction; Running Applications; Security Configurations; 7
Security Self-Adaptation: Configurations and Costs Different sets of security configuration are enforced at different instants of time A cost is associated with each configuration e.g. power consumption A cost threshold is introduced as the maximum cost for the current system status. Each application has its specific requirements, hard or soft Multiple applications run on a given ES Critical applications have precedence over non critical ones. 8
Security Self-Adaptation Logic Searches a cost sub-optimal solution that: Satisfies the Application requirements; Maximizes the # of Running Applications; Minimizes the Cost of Security Configurations; by means of: Exact solutions (coverage table); Heuristic solutions (branch and bound); Cost reached is below the system threshold Extensive simulations have been performed to validate and evaluate the adaptive security framework 9
(3a) Security Services Negotiation Nodes establish an agreement for secure communication How can nodes select the most efficient security services? Are the used security services the cheapest? Are the used security services the most secure? 10
Security Service Negotiation Protocol Nodes provides different security services Symmetric cipher, hash algorithms,... Services are organized in homogeneous groups Same functionalities different performances Each data transmission has associated a price. 11
Security Service Price Cost?? Each node computes its costs for each security service Identical services can have different costs on different nodes Each node has a global budget that can be consumed A portion of the global budget is assigned to each transmission session 12
Service Selection Concept Apply Linear Programming (LP) to minimize the cost for transmission of bytes between the two nodes. subject to: Security services must be available in both nodes cost paid by each node must be below node's budget 13
(3b) GoS Trusting Protocol Will the node perform the tasks assigned to it? 14
Trusting computation A node is trusted if respects service agreements Reputation-based protocol By mixing Personal experience Indirect experience Update using: 15
Simulation Results 50% of nodes are 10% faulty The others have different level of faultiness 16
Evaluation of protocol w.r.t attacks Bad mounting attack a large number of malicious nodes are required to perform an efficient attack On-Off attack Nodes quickly reach a trust value of 7 Sybil attack Prevented by using identity check mechanism (not in our case) Conflicting behavior influences systems where there is a rating of the recommender (not in our case) 17
Publications (1/2) Journals Derin Onur, Alberto Ferrante, and Antonio V. Taddeo, Coordinated Management of Hardware and Software Self-adaptivity, to appear in Elsevier Journal of Systems Architecture. (Authors appear in alphabetical order). Antonio Vincenzo Taddeo, Alberto Ferrante, Scheduling Small Packets in IPSec Multi-accelerator Based Systems, in Journal of Communications (JCM). Academy Publisher, Mar. 2007, vol. 2, no. 2, pp. 53 60. Conferences and Workshops Antonio Vincenzo Taddeo, Alberto Ferrante, A Security Service Protocol for MANETs, to appear as a short paper in IEEE CCNC 2008, Las Vegas, 10-13 January 2009. Alberto Ferrante, Roberto Pompei, Anastasia Stulova, Antonio Taddeo, A Protocol for Guarantee of Service in Pervasive Distributed Systems, 2 nd AETHER-Morpheus Workshop (AMWAS 08), Lugano, October 2008.(Authors appear in alphabetical order). Alberto Ferrante, Roberto Pompei, Anastasia Stulova, Antonio Taddeo, A Protocol For Pervasive Distributed Computing Reliability,. In proceedings of SecPri_WiMob 2008, Avignon, France, October 12, 2008. (Authors appear in alphabetical order). Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagiovanna Sami, Fabrizio Mantovani, and Jurijs Fridkins, Self-adaptive Security at Application Level: a Proposal, in ReCoSoC 2007. Montpellier, France, Jun. 2007. A. Ferrante, A. V. Taddeo, O. Derin. Security in self-adaptive systems, 1 st AETHER-Morpheus Workshop (AMWAS 07), Paris, October 2007. Antonio Vincenzo Taddeo, Alberto Ferrante, and Vincenzo Piuri, Scheduling Small Packets in IPSec-based Systems, in IEEE CCNC 2006. Las Vegas, NV, USA: IEEE, 8 Jan. 2006. 18
Publications (2/2) Conferences and Workshops (minor research on e-learning) Alessandro Bozzon and Tereza Iofciu and Wolfgang Nejdl and Antonio Vincenzo Taddeo and Sascha Tonnies."Role Based Access Control for the interaction with Search Engines" in COOPER Workshop in conjunction with ECTEL07 Conference, 17 September 2007.(Authors appear in alphabetical order). Bas Giesbers and Antonio Vincenzo Taddeo and Wim van der Vegt and Jan van Bruggen and Rob Koper. "A Question Answering service for information retrieval in Cooper" in COOPER Workshop in conjunction with ECTEL07 Conference, 17 September 2007. Carola Salvioni and Antonio Vincenzo Taddeo. "Remote Cooperation on Project-centred Learning: a Working Implemented Solution in Academia", in COOPER Workshop in conjunction with ECTEL07 Conference, 17 September 2007.(Authors appear in alphabetical order). Aldo Bongio, Jan van Bruggen, Stefano Ceri, Valentin Cristea, Peter Dolog, Andreas Hoffmann, Maristella Matera, Marzia Mura, Antonio V. Taddeo, Xuan Zhou, and Larissa Zoni. "COOPER: Towards a Collaborative Open En-vironment of Project-Centred Learning. In Innovative Approaches for Learning and Knowledge Sharing", volume Volume 4227/2006 of Lecture Notes in Computer Science, pages 561 566. Springer Berlin / Heidelberg, 2006..(Authors appear in alphabetical order). 19