Data Security in Unattended Wireless Sensor Network



Similar documents
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Wireless Sensor Networks Chapter 14: Security in WSNs

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A Framework for Secure and Verifiable Logging in Public Communication Networks

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Privacy and Security in library RFID Issues, Practices and Architecture

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Securing wireless sensor networks

Security for Ubiquitous and Adhoc Networks

Your Wireless Network has No Clothes

VoteID 2011 Internet Voting System with Cast as Intended Verification

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems


Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

CPSC 467b: Cryptography and Computer Security

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

A Simulation Game for Teaching Secure Data Communications Protocols

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

A Factoring and Discrete Logarithm based Cryptosystem

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Security Analysis of DRBG Using HMAC in NIST SP

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

A Secure RFID Ticket System For Public Transport

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Secure Network Communications FIPS Non Proprietary Security Policy

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Chapter 16: Authentication in Distributed System

Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle

Full Drive Encryption Security Problem Definition - Encryption Engine

Security in Ad Hoc Network

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

IoT Security Platform

Single Sign-On Secure Authentication Password Mechanism

CSE/EE 461 Lecture 23

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Data Storage Security in Cloud Computing

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Capture Resilient ElGamal Signature Protocols

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

MovieLabs Specification for Enhanced Content Protection Version 1.0

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Cryptography & Network Security

Securing MANET Using Diffie Hellman Digital Signature Scheme

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Near Sheltered and Loyal storage Space Navigating in Cloud

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

CS 3251: Computer Networking 1 Security Protocols I

IoT Security Concerns and Renesas Synergy Solutions

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Overview of Luna High Availability and Load Balancing

Back-end Server Reader Tag

Some Security Trends over Wireless Sensor Networks

Cryptography & Digital Signatures

USB Portable Storage Device: Security Problem Definition Summary

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

EXAM questions for the course TTM Information Security May Part 1

Problems of Security in Ad Hoc Sensor Network

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Improving data integrity on cloud storage services

Network Time Security

Victor Shoup Avi Rubin. Abstract

Transcription:

Data Security in Unattended Wireless Sensor Network Roberto Di Pietro UNESCO Chair in Data Privacy Di Ma UCI Prof. Luigi Mancini Università di Roma La Sapienza Claudio Soriente UCI Angelo Spognardi INRIA Rhone Alpes Prof. Gene Tsudik UCI

Agenda 1. Introduction to UWSN 2. ADV model 3. POSH a. Preliminaries and assumptions b. The protocol c. Analysis 4. Conclusions

A Typical Wireless Sensor Network Many real, alleged and imagined applications Networking Sensor-to-sink communication (opt. sink-to-sensors) Collection method Periodic collection or Event driven or Query based = on-demand 3 Online Sink Real-time off-loading of data

Unattended Wireless Sensor Network (UWSN) Nodes operate in hostile environment Initial deployment might be ad-hoc No ever-present sink Itinerant Periodic data sensing (on-demand, event-driven N/A) Nodes might retain data for a long time Data might be valuable 4 Nodes are left on their own Adversary roams around Challenge: Data Security in UWSNs

Examples WSN deployed in a recalcitrant country to monitor any potential nuclear activity Underground WSN monitoring sound and vibration produced by troop movements or border crossings Anti-poaching WSN 5

New kind of Adversary (ADV) Previous adversaries would corrupt a fixed threshold of the nodes in the network Security protocols were aimed at attack detection The online sink can then mitigate the attack Excluding compromised nodes Our adversary is MOBILE Roams the network and compromises different sets of sensors Given enough time it can subvert the whole network The sink is offline: real-time detection does not help Adv can reach its goal and leave with impunity 6

Does this sound familiar? ADV shares many feature with the well known Crypto Mobile Adversary Ostrovsky &Yung: How to Withstand Mobile Virus Attacks, PODC 91 Proactive Cryptography: Decryption and Signatures Adversary aimed at learning some shared secret Now the problem is different No such secret to hide Less resources (power, storage, ) Brand new solutions required

UWSN Mobile Adversary ADV defined by: goal / operation / visibility Goal: Search-and-erase Search-and-replace Curious Operation: Reactive Proactive Visibility: Stealthy Visible 8

The journey so far Search-and-erase No Crypto Nodes collaborate to hide data location Catch Me (if you can): Data Survival in Unattended Sensor Networks (IEEE PerCom 08) Crypto-enabled sensors Design and evaluation of cryptographic protocol to protect target data in submission Search-and-replace Collaborative authentication ongoing work Curious Co-operative self healing POSH (IEEE SRDS 08) 9

POSH Proactive co-operative Self Healing in Unattended Wireless Sensor Networks

Motivation Curious adversary aims at reading sensor-collected data Encryption does not help Symmetric keys are exposed with node compromise w/ Public Key encryption, the adversary can GUESS the cleartext Randomized encryption helps but only with a TRNG Not currently available (nor foreseeable) Sensor-collected data can be partitioned based on compromise Before Compromise (1) Requires Forward Secure Encryption Scheme During Compromise (2) Not much can be done! After compromise (3) Requires Backward Secure Encryption Scheme 11 Can we protect category (1) and (3) data?

Forward Secrecy Even if ADV learns current key, it is not able to derive PREVIOUS round keys Based on per-round key evolution At the end of round r, the next round key is computed through a one-way function (and the current round key is securely erased) K r+1 =H(K r ) Suitable UWSNs But after compromise, ADV can mimic key evolution process Anyway we will use it K 1 K 2 K 3 K 4 K 5 K 6 K 7 K 4 K 5 K 6 K 7 Sensor compromised at round 4 and then released 12

Backward Secrecy Even if ADV learns current key, it is not able to derive FUTURE round keys Based on per-round key evolution In the literature so far, it requires an online trusted authority Not suitable for UWSNs The sink is offline Sensor can not act as a trusted authority for their peers as any sensor can be easily compromised K 1 K 2 K 3 K 4 K 5 K 6 K 7 13 K 1 K 2 K 3 K 4 Sensor compromised at round 4 and then released

Key Insulated schemes Encryption Schemes that are both BACKWARD and FORWARD secure are known as KEY INSULATED schemes Unfortunately no such scheme is currently available for UWSNs Require online trusted third party Expensive computation K 1 K 2 K 3 K 4 K 5 K 6 K 7 K 4 Sensor compromised at round 4 and then released

POSH: Main Idea Forward secrecy is achieved through key evolution Backward secrecy is achieved through sensor cooperation A sensor can securely regenerate a key unknown to ADV, if it obtains at least one contribution from a non compromised peer sensor

Network Assumptions 1/2 Periodic data collection Time divided in equal and fixed collection rounds and each of the n sensor collects a single data unit per round Unattended Operation An itinerant sink periodically visits the UWSN to collect sensed data. v is the maximum number of collection rounds between successive sink visits. 16 Communication The UWSN is always connected Any two sensors can communicate either directly or through peers

Network Assumptions 2/2 Storage Each sensor has enough storage for O(v) data units Cryptographic Capabilities Cryptographic hashing Symmetric key encryption (unique secret key shared with the sink) Pseudo-Random Number Generator (PRNG) (unique secret seed shared with the sink) 17 Re-initialization At each visit, the sink re-initializes the sensors (secrets refreshing) New secret key New secret seed Empty storage

Adversarial model 1/2 Goal ADV s main goal is to learn from nodes as many secrets as possible (keys or other keying material). Compromise Power ADV can compromise at most 0 < k < n/2 sensors at any round. It reads all storage/memory and listens to all communication of each compromised sensor. Periodic Operation At the end of each compromise round, ADV picks a subset of up to k sensors to compromise in the following round. At the start of each round, the adversary atomically releases the subset from the previous round and compromises the new subset. 18

Adversarial model 2/2 Topology Knowledge ADV knows the entire topology of the UWSN. Minimal Disruption ADV does not interfere with sensors behavior, in order to remain undetected Defense Awareness ADV is fully aware of any scheme or algorithm used by the UWSN. 19

POSH algorithm Contributions to be sent Generic node protocol run (round i): Contributed nodes Normal operating activities Key refresh

Analysis (aka Sensor Coloring) Starting from round 1, ADV compromises k sensors per round: Red sensors (R r ) currently controlled by ADV Yellow sensors (Y r ) have been compromised in some previous round and their current keys are known to ADV Green sensors (G r ) Either they have never been compromised Or they have recovered through POSH

Example 7 r = 13 2 1 3 6 Sensor 1 K 1 2 4 5 K 2 =H(K 1 c 3 c 6 ) K 3 =H(K 2 c 2 ) K 4 =H(K 2 c 4 c 7 )

Sensor transition diagram R =k ADV s goal it to maximize Y + R Network goal: G =n-2k

Two kinds of ADV INF-ADV is always aware of G Unrealistic but very powerful Used as benchmark RR-ADV moves through set of nodes in a round-robin fashion Time based heuristic nodes in Y for a long time could have moved G Realistic but possibly weak Might choose to compromise a yellow sensor

Results ( G against INF-ADV) p = ADV eavesdropping prob. t = 6 results in each sensor receiving at least one contribution on the average Threshold phenomena: e.g. for p=0.2, G remains stable for k/n < 80/400 That is 20% per round!!!

Effect of t Increasing t when G ~ n-2k does not help Further, messages are expensive!

INF-ADV vs RR-ADV No difference if G is close to its optimal value

Dealing w/ real world Message delivery failure Sink synchronization Sensor must store the ID of their contributors Sensor failure If storage becomes unavailable key sensor history cannot be reconstructed Other sensors might depend on the failed one Publik Key Crypto Encrypt round key under the sink PK Use round key for everything else

Example Sensor 4 fails after round 3 7 1 3 6 Sensor 1 K 1 K 2 =H(K 1 c 3 c 6 ) K 3 =H(K 2 c 2 ) K 4 =H(K 2 c 4 c 7 ) 2 4 5 Sink K 2 =H(K 1 c 3 c 6 ) K 23 4 requires K 1 is shared sensors 234 and 67 K 3 =H(K 2 c 2 ) K 4 =H(K 2? c 7 ) Sensor 1 will have contribute to other peers K 1

Conclusion UWSN is a new, exciting field that calls for innovative security solutions No crypto no means no security But. Crypto helps! Role of randomization in UWSN not completely characterized yet

References Catch Me (If You Can): Data Survival in Unattended Sensor Networks R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, G. Tsudik IEEE PerCom 08 POSH: Proactive co-operative Self-Healing in Unattended Wireless Sensor Networks R. Di Pietro, D. Ma, C. Soriente, G. Tsudik IEEE SRDS 08 DISH: distributed self-healing (in unattended sensor networks). D. Ma and G. Tsudik. Cryptology eprint Archive, Report 2008/158, 2008 Playing Hide-and-Seek with a Focused Mobile Adversary: Maximizing Data Survival in Unattended Sensor Networks R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, G. Tsudik Cryptology eprint Archive, Report 2008/292, 2008