Security of MICA*-based / ZigBee Wireless Sensor Networks



Similar documents
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

An Overview of ZigBee Networks

MOTEWORKS. Key Features. Overview

Synapse s SNAP Network Operating System

Demystifying Wireless for Real-World Measurement Applications

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

SPINS: Security Protocols for Sensor Networks

Thingsquare Technology

REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Hacking US Traffic Control Systems. Cesar CTO at IOActive Labs

Introduction to Wireless Sensor Network Security

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

Security Sensor Network. Biswajit panja

Problems of Security in Ad Hoc Sensor Network

Mac Protocols for Wireless Sensor Networks

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I ERDİNÇ YILMAZ

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

Security & Trust in Wireless Sensor Networks

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Waspmote Encryption Libraries. Programming guide

THE INTEL MOTE PLATFORM: A BLUETOOTH * -BASED SENSOR NETWORK FOR INDUSTRIAL MONITORING

Questions from The New SensorTag - IoT Made Easy Webinar

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

Using IPv6 and 6LoWPAN for Home Automation Networks

CSC 774 Advanced Network Security. Outline. Related Work

Design of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks

Testing Overview [Document subtitle]

Home Automation and Cybercrime

ZigBee Technology Overview

Implementation of Wireless Gateway for Smart Home

Wireless Sensor Networks Chapter 14: Security in WSNs

Embedded Java & Secure Element for high security in IoT systems

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

A Transport Protocol for Multimedia Wireless Sensor Networks

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Portable Wireless Mesh Networks: Competitive Differentiation

Security vulnerabilities in the Internet and possible solutions

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

Data Management in Sensor Networks

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Recommended Wireless Local Area Network Architecture

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

Logitech Advanced 2.4 GHz Technology With Unifying Technology

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Logitech Advanced 2.4 GHz Technology

Secure data aggregation in mobile sink wireless sensor networks

BLUETOOTH SMART CABLE REPLACEMENT

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security in Wireless Mesh Networks

DKWF121 WF121-A B/G/N MODULE EVALUATION BOARD

How To Write A Transport Layer Protocol For Wireless Networks

Wireless Communication With Arduino

R-Win. Smart Wireless Communication Management System

Microchip Technology. February 2008 Valerio Moretto Slide 1

UG103.8 APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS

Side Channel Analysis and Embedded Systems Impact and Countermeasures

A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks

Wireless Sensor Network for Performance Monitoring of Electrical Machine

Authentication and Security in IP based Multi Hop Networks

Z-Monitor: A Monitoring Tool for IEEE Wireless Personal Area Networks

Customer Specific Wireless Network Solutions Based on Standard IEEE

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Client Server Registration Protocol

6LoWPAN Technical Overview

Security Goals Services

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

WASP User Manual. Revision: 1.6. (c) 2012 North Pole Engineering, Inc.

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Introduction to Network Security Lab 1 - Wireshark

Transcription:

Security of MICA*-based / ZigBee Wireless Sensor Networks Cambridge University Computer Lab and myself also Brno University of Technology Department of Intelligent Systems 28 December 2008

Our approach What we did 1 Development of systems for monitoring large civil structures 2 Analysis of off-the-shelf products 3 Interviewing owners and/or operators of the structures 4 Implementing attacks

The kit Our approach MICAz motes purchased as part of a Xbow kit Stargate embedded Linux box with a MICAz connector USB programmers / receivers for MICAz Hardware debugger Atmel JTAG ICE VMware and serveral Linux/Win boxes Most results applicable to Iris, Tmote, Intel Mote and Intel Mote 2 devices. They also use TinyOS software or its commercial versions.

Three-tier architecture Your standard three-tier network topology back-end system with database (off-site) Comms: ADSL where possible, GPRS middle: gateway (on-site) Comms: IEEE 802.15.4 / RS-232 bottom: sensor nodes (multi-hop ad-hoc network) Actual hardware components Crossbow backend system (with PostgreSQL database) Stargate (embedded Linux box as a gateway) Crossbow MICAz (802.15.4 motes) TinyOS 1.1 / XMesh (OS for MICAz motes)

The myth of smart dust... and security

The myth of smart dust... and security

The myth of smart dust... and security

The myth of smart dust... and security

Security properties by civil structures operators What the operators want Confidentiality Not really an issue (bridge, underground) Do not rule encryption out but use it by default Availability Becomes critical if used be quick response mechanisms Reliability is however a basic requirement What stroke us was that managers we talked to were not able to predict future applications. However, overloading existing infrastructures was common (answers to direct questions).

Security properties Short-term integrity False negatives hard to exploit if only few true positives! False positives more disruptive; but viewed with suspicion Medium-term integrity Month-scale analysis helps budgetting for maintenance costs Continuous monitoring gives quantitative answers Long-term integrity ( up to 100+ years) Scale of decades: allows previously impossible research The most valuable data System to be designed for portability and continuous upgrades

Attackers / Risks This is for now (imagine a future when you can use ZigBee networks to... ) Terorists? No, they will target bridges and tunnels directly Competitors, resourceful attackers? Not likely Curious hackers Possibly, to play a bit with the technology

Attackers / Risks Risk of attacks not amplified by WSN. But may be differnet for water pipes. It is quite easy to get through a pad lock.

Attackers / Risks Risk of attacks not amplified by WSN. But may be differnet for water pipes. It is quite easy to get through a pad lock.

Classes of attacks Three basic attack classes Remote attacks from the Internet Vicinity attacks wireless, within communication range Physical attacks physical access to targeted devices Physical attacks are difficult to do (Becher, Benenson, and Dorseif in 2006) What about just connecting to a mote s connector??

Classes of attacks Three basic attack classes Remote attacks from the Internet Vicinity attacks wireless, within communication range Physical attacks physical access to targeted devices Physical attacks are difficult to do (Becher, Benenson, and Dorseif in 2006) What about just connecting to a mote s connector??

why?

XMesh commercial variant of TinyOS Disassemble XMesh code (15k ASM lines) and use variable names from TinyOS if (ptable-> flags&nbrflag_valid){ if (ptable->flag&nbrflag_valid) && (ptable->parent!= TOS_L &&(ptable->parent!=-1) && (ptable->cost!=-1) && (ptable->childliveliness==0)) computecost(ptable->cost, ptable->sendest, ptable->recei ulnbrlinkcost, ulnbrtotalcost); if (ptable==gpcurrentparent){ poldparent=ptable; oldparentcost=ulnbrtotalcost; oldparentlinkcost=ulnbrlinkcost; } else { if (ulnbrtotalcost < ulmintotalcost){ ulmintotalcost = ulnbrtotalcost; pnewparent = ptable; Dan Cvrcek, } Matt Lewis, and Frank Stajano

Routing metrics Our approach Routing is based on 1 link cost ratio of successfully received / sent messages 2 route cost sum of link costs to a gateway The basis of all computations are message counters 1 XMesh does not include counters into data messages

Function UpdateNbrCounters sdelta = seqno - pnbr->seqno - 1 if (seqno!=1) { sdelta-- //the only change from TinyOS } if (sdelta >= 0) { pnbr->missed+=sdelta pnbr->received++ } else { // sdelta was < 0 if (sdelta < -20) { // forget and reinitialise the record } else { return TRUE } pnbr->lastseqno = seqno

XComand vulnerability XCommand feature Xbow s extension of TinyOS Direct commands from a gateway to all / selected motes No routing but broadcast instead How to stop rebroadcasting? Messages have msgids Each mote keeps internal counter (e.g., motecntr) Mote does not process if motecntr msgid The problem is motecntr is not the last seen msgid but the number of processed XCommand messages

XComand vulnerability XCommand feature Xbow s extension of TinyOS Direct commands from a gateway to all / selected motes No routing but broadcast instead How to stop rebroadcasting? Messages have msgids Each mote keeps internal counter (e.g., motecntr) Mote does not process if motecntr msgid The problem is motecntr is not the last seen msgid but the number of processed XCommand messages

Attacks

Hardware limits Our approach Memory is limited all data structures are size-limited! Counters Tables Crypto information Not always necessary

Jamming Our approach Jamming Power used by attacker power wasted by victim Or can it be used for smart attacks?

Jamming Our approach Jamming Power used by attacker > power wasted by victim Or can it be used for smart attacks?

Jamming Our approach Jamming Power used by attacker = power wasted by victim Or can it be used for smart attacks?

Jamming Our approach Jamming Power used by attacker < power wasted by victim Or can it be used for smart attacks?

Jamming Our approach Jamming Power used by attacker << power wasted by victim Or can it be used for smart attacks?

Jamming Our approach Jamming Power used by attacker power wasted by victim Or can it be used for smart attacks?

Jamming Our approach

Selective jamming Jamming always possible no news More interesting selective jamming Jam packets from mote X Jam packets for mote Y Jam packets of type Z Jam packets with content C Simple but effective implementation compile criterion into attacking mote s code Deploy the mote and let it listen If a message meets the criterion, jam

Low cost selective jamming Can we use just one mote to listen and jam selectively? Problem IEEE 802.15.4 radio chips work over buffers.

Low cost selective jamming Solution debug mode

Low cost selective jamming The final code well below 100 lines of NesC (C macro language) Jamming transmitting fixed bytes on the same channel.

Protection?

Routing table manipulation XMesh nodes broadcast neighbour lists with link quality info Nodes update own routing tables by according to messages (no crypto) Scapy extension to manipulate/inject messages One cen indirectly rewrite routing table of victim Sleep deprivation attack 1 Create a routing loop between two victims 2 Watch them zip messages back and forth (if you want) 3 Let them drain batteries (duty cycle < 1 % >> 10 %)

Frame formats Our approach

Msg replays - counter overflow Messages rejected if the msg counter < expected value BUT If the msg counter > expected value, it will be accepted (also if msg counter = NOUGHT) Counter size 16 bits let s cause overflow Inject fake message the victim will forward (data msgs no counter) Create a routing loop (quickly eating up counter values) Jam ACK frames the victim will retransmit Combine any of the three. Or, as the routing table size is 16, just add as many new neighbours.

Msg replays - counter overflow Messages rejected if the msg counter < expected value BUT If the msg counter > expected value, it will be accepted (also if msg counter = NOUGHT) Counter size 16 bits let s cause overflow Inject fake message the victim will forward (data msgs no counter) Create a routing loop (quickly eating up counter values) Jam ACK frames the victim will retransmit Combine any of the three. Or, as the routing table size is 16, just add as many new neighbours.

analysis

The exterior Our approach

Network topology

Network topology over 24 hours

What can one play with analysis allows Topology never encrypted Routes to gateway partially encrypted Data encrypted

What is out there? TinySec crypto library allowing encryption and MACing Only MICA2 motes not ZigBee motes We had to port TinySec for MICAz motes first! RF chip [ Tx/Rx TinySec Tx/Rx Processing ] - 1 byte for MICA2 (868/916 MHz RF) - 1 frame for MICAz (2.4GHz / 802.15.4 RF)

What is out there? TinySec crypto library allowing encryption and MACing Only MICA2 motes not ZigBee motes We had to port TinySec for MICAz motes first! RF chip [ Tx/Rx TinySec Tx/Rx Processing ] - 1 byte for MICA2 (868/916 MHz RF) - 1 frame for MICAz (2.4GHz / 802.15.4 RF)

Types of cryptographic problems Correctness of implementation Computational limitations Usage limits / errors

Implementation errors Processing of eight-bytes block: CBC-MAC for (i = 0; i < msglen; i++) { // unroll partial[pos++] ^= msg[i]; if (pos == 7) { if (!call BlockCipher.encrypt (&context->cc, partial, partial)) { return FAIL; } pos = 0; }

Hardware limits for crypto Personally, I don t think there are any. TinyOS MAC length 4 bytes Power efficient symmetric ciphers Public key cryptography? Power consumption of computations v communication MAC overhead, synchronisation,...

Hardware limits for crypto Personally, I don t think there are any. TinyOS MAC length 4 bytes Power efficient symmetric ciphers Public key cryptography? Power consumption of computations v communication MAC overhead, synchronisation,...

Cryptographic boundary TinySec is excellent because it s transparent for gateway Different treatment of wireless and wired interfaces

A few words from Xbow A few points from communication with Xbow Our customers are universities (i.e., they only want to play) We agree that security issues highlighted must be solved We are not interested in security until we have customers Project webpage: http://www.cl.cam.ac.uk/research/security/sensornets/

A few words from Xbow A few points from communication with Xbow Our customers are universities (i.e., they only want to play) We agree that security issues highlighted must be solved We are not interested in security until we have customers Project webpage: http://www.cl.cam.ac.uk/research/security/sensornets/

A few words from Xbow A few points from communication with Xbow Our customers are universities (i.e., they only want to play) We agree that security issues highlighted must be solved We are not interested in security until we have customers Project webpage: http://www.cl.cam.ac.uk/research/security/sensornets/