CSC 774 Advanced Network Security. Outline. Related Work



Similar documents
How To Create A Time Synchronization Protocol With Low Latency Data Collection

SPINS: Security Protocols for Sensor Networks

Security & Trust in Wireless Sensor Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Secure Time Synchronization Service for Sensor Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Wireless Network Security Spring 2014

Security Sensor Network. Biswajit panja

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks

Prediction of DDoS Attack Scheme

Secure Routing in Wireless Sensor Networks

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

About the Authors Preface Acknowledgements List of Acronyms

Chapter 6 CDMA/802.11i

How To Secure A Wireless Sensor Network

Enhancing Base Station Security in Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks

Security in Wireless and Mobile Networks

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

Midterm. Name: Andrew user id:

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Overview of ZigBee Networks

Introduction to Wireless Sensor Network Security

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Accurate Clock Synchronization for IEEE Based Multi-Hop Wireless Networks

Supporting VoIP in IEEE Distributed WLANs

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

How To Make A Multi-User Communication Efficient

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

How To Analyze The Security On An Ipa Wireless Sensor Network

Client Server Registration Protocol

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Tema 5.- Seguridad. Problemas Soluciones

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

How To Secure My Data

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Efficient Data Transmission For Wireless Sensor Networks

Multimedia Data Transmission over Wired/Wireless Networks

2.0 System Description

Security of MICA*-based / ZigBee Wireless Sensor Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

6LoWPAN Technical Overview

Secure and Efficient Data Collection in Sensor Networks

Controlled Random Access Methods

Some Security Trends over Wireless Sensor Networks

Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks

Overview of EnOcean Security features EXPLANATION OF ENCEOAN SECURITY IN APPLICATIONS

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Security Policy Revision Date: 23 April 2009

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

EPL 657 Wireless Networks

Neighborhood-Based Security Protocol for Wireless Sensor Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control

Protecting Communication in SIEM systems

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Transcription:

CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time ynchronization Conclusion and Future Work 2 Related Work NTP and GP are not practical for sensor networks. Recent time synchronization techniques. ingle-hop Pair-wise Time ynchronization. Receiver-Receiver based schemes. Elson et al., ACM IGOP 02; ender-receiver based schemes. Ganeriwal et al., enys 03; t1 t2 t2 1 2 1 2 t1 ender-receiver based Global Time ynchronization. Clock distribution schemes, Maroti et al., enys 0; Clock agreement schemes. Li and Rus, INFOCOM 0; t1 t2 R t t3 ender-receiver based 3 1

Threats ingle-hop Pair-wise Time ynchronization. No message authentication. Manzo et al., AN 05; Ganeriwal et al., Wise 05 Time sensitive. Jam and Replay attacks: Ganeriwal et al., Wise 05 Global Time ynchronization. Insider attacks Malicious Node Victim Nodes Our Contributions TinyeRync: Phase I ecure single-hop pair-wise time synchronization Phase II ecure and resilient global time synchronization 5 Phase I: ecure ingle-hop Pair-wise Time ynchronization 6 2

1 2 3 a1 a2 a3 a 0 Vcc1 GND 0 b1 b2 b3 b 5 6 7 8 Overview Goal: Achieve time difference between two neighbor nodes in hostile environment. Existing work ecure TPN (Ganeriwal et al., Wise 05) Problems with secure TPN Our work: Prediction-based MAC layer timestamp. Hardware-assisted, authenticated MAC layer timestamp. 7 ecure TPN Ganeriwal et al., Wise 05 Estimate time difference and transmission delay. A t1 M1={A,B,t1,Req, MIC[KAB](A,B,t1,Req)} B ( t2! t1)! ( t! t3) " = is the time difference. 2 ( t2! t1) + ( t! t3) d = is half of the transmission delay. 2 t M2={B,A,t2,t3,Rep, MIC[KAB](B,A,t2,t3,Rep)} t2 t3 ecurity condition: d < maximum expected delay. time K AB : secret key shared between A and B. MIC: message integrity code 8 Problems in ecure TPN Authenticated MAC layer timestamp. MIC must be available when radio sends the MIC field. oftware solution in ecure TPN Calculate MIC using Tinyec (Karlof et al. enys 0) Works for low data rate radio (e.g., 38. kbps in CC1000 used by MICA2). Does not work for high data rate radio (e.g., 250kbps in CC220 used by MICAz). CPU... MIC CRC 9 3

Prediction-based MAC Layer Timestamp ender side: When channel is clear, it add sending time = current time + constant delay. = 399.29 us. Receiver side: When the FD field is received, it records the time as receiving time. 10 Delay Uncertainty cpu Accessing and adding timestamp, Accessing timestamp ender Radio then send TXON command Interrupt handling Antenna Encoding symbol periods and preamble Encoding FD Decoding of FD Propagation of FD Propagation of FD Antenna Encoding of FD Receiver Radio Decoding of FD Encoding symbol periods and preamble Interrupt handling Accessing and adding timestamp, cpu Accessing timestamp then send TXON command t2 t3 11 Hardware-assisted, Authenticated MAC Layer Timestamp Hardware security support in CC220 Two modes stand-alone mode: 128 bit AE encryption on message in stand-alone buffer. in-line mode: begin encryption when message are being sent out; begin decryption after the whole message is received. Using in-line mode, CC220 can generate a 12-byte MIC on 98-byte message in 99 us 12

Distribution of ecure ingle-hop Pair-wise ynchronization Error Experimental result (1 tick = 8.68us) 80% 70% 67.76% 60% Percentage 50% 0% 30% 20% 19.8% 10% 0% 0.00% 0.01% 0.71% 8.3% 3.15% 0.09% 0.01% - -3-2 -1 0 1 2 3 ynchronization Error (tick) 13 Phase II: ecure and Resilient Global Time ynchronization 1 Overview Goal: a network-wide time synchronization. The algorithm. Local broadcast authentication utela (Perrig et al., IEEE &P 01) Our work: short delayed utela 15 5

ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. 1 2 3 5 6 7 8 9 16 ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. For each neighbor node j, node i maintains a single-hop pair-wise time difference δ i,j. 1 2 3 5 6 7 8 9 17 ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. For each neighbor node j, node i maintains a single-hop pair-wise time difference δ i,j. A source node broadcasts its local time C periodically. 1 2 3 5 6 7 8 9 18 6

ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. For each neighbor node j, node i maintains a single-hop pair-wise time difference δ i,j. A source node broadcasts its local time C periodically. Each direct neighbor node i of node can obtain a source clock difference δ i, from node directly. Then, it broadcasts δ i,. 1 2 3 5 6 7 8 9 19 ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. For each neighbor node j, node i maintains a single-hop pair-wise time difference δ i,j. A source node broadcasts its local time C periodically. Each direct neighbor node i of node can obtain a source time difference δ i, from node directly. Then, it broadcasts δ i,. For other nodes, to tolerate up to t malicious neighbor nodes, each node i needs to obtain at least 2t+1 source time differences through different neighbor nodes. Node i chooses the median one as δ i,. Then it broadcasts δ i,. 1 2 3 5 6 7 8 9 20 ecure and Resilient Global Time ynchronization Algorithm Each node i maintains a local clock time C i. For each neighbor node j, node i maintains a single-hop pair-wise time difference δ i,j. A source node broadcasts its local time C periodically. Each direct neighbor node i of node can obtain a source time difference δ i, from node directly. Then, it broadcasts δ i,. For other nodes, to tolerate up to t malicious neighbor nodes, each node i needs to obtain at least 2t+1 source time differences through different neighbor nodes. Node i chooses the median one as δ i,. Then it broadcasts δ i,. Each node i can estimate the global clock C by C = C i +δ i,. 1 2 3 5 6 7 8 9 21 7

How to Distribute Global ynchronization Messages? Unicast Messages authenticated by secure pair-wise key. Conclusion: too heavy communication overhead and substantial message collisions. calability problem Broadcast Can reduce the communication overhead. Require local broadcast authentication. Digital signature is too expensive for sensor nodes. utela 22 Overview of utela Perrig et al., IEEE &P 01 ender: Generate one-way key chain, K i =F(K i+1 ), 0 i n-1 Release the commitment K 0 Use key K i for all messages sent in time interval I i, and disclose K i in I i+d F F F... F F K0 K1 K2 Kn-1 Kn I1 I2... In-1 In Time T0 T1 T2 Tn-2 Tn-1 Tn Receiver: ecurity condition: the key has not been disclosed by the sender when the messages are received. Verify K i =F(K i+1 ) 23 Using utela in Time ynchronization? Problems: 1. utela itself requires loose pair-wise time synchronization. 2. Delayed authentication causes clocks drift away again. 2 8

hort Delayed utela Tight single-hop pair-wise time synchronization. Too short time intervals waste a lot of keys in a key chain. Interleaved short and long intervals. hort interval (r) : A sender broadcasts authenticated synchronization message. Long interval (R) : A sender discloses the key used in last short interval. r R r R r R r R ender A Time Receiver B Mi ti Ki Time 25 hort Delayed utela (Cont.) Receiver: ecurity condition: the message is sent in the sender s last short interval. (t i -T 0 + +δ max ) < i*(r+r)+r. : single-hop pair-wise time difference δ max : maximum synchronization error Verify K i =F(K i+1 ) 26 ecurity Property External attacks Message authentication. ecurity condition. Internal attacks Use the median of 2t+1 source clock differences through different neighbors to tolerate up to t insiders. 27 9

Experimental Evaluation oftware package TinyeRync MICAz motes running TinyO 35 files Providing 8 interfaces Code size in MICAz Memory RAM Program memory Bytes 1961 281 Parameters # of MICAz nodes pair-wise synchronization interval global synchronization interval Tolerance (t) utela short interval utela long interval key chain length 60 seconds 10 seconds 0, 1, 2, 3, 10 ms 1 second 100 28 Network Deployment 29 Data Collection ink node Broadcast reference messages to all the nodes. Query each node one by one at different time. All the nodes When receiving a reference message Records the current global time when the message is received at MAC layer. When receiving a query message end the buffered global time information to the sink node. 30 10

ynchronization Error Precision achieved: tens of microseconds 16 ynchronization Error (tick) 1 12 10 8 6 2 Avg. Error Max. Error 0 0 1 2 3 Tolerance (t) 1 tick = 8.68 us 31 ynchronization Rate When t=, 95% in 3 rounds 100 95 90 Percentage 85 80 75 70 65 One Round Two Rounds Three Round 60 0 1 2 3 Tolerance (t) 32 Communication Overhead Number of messages 10600 1000 10200 10000 9800 9600 900 100 9720 9200 5 10 Global synchronization interval (seconds) Number of message each node sends per hour. 33 11

Incremental Deployment Average synchronization error (left Y-axis) ynchronization rate when t=2 (right Y-axis) microseconds 1.E+10 1.E+09 1.E+08 1.E+07 1.E+06 1.E+05 1.E+0 1.E+03 1.E+02 1.E+01 1.E+00 Avg ync Error ync Rate 100 90 80 70 60 50 0 30 20 10 0 percentage 0:09:00 0:09:10 0:09:20 0:09:30 0:09:0 0:09:50 0:10:00 0:10:10 0:10:20 0:10:30 0:10:0 0:10:50 0:11:00 0:11:10 0:11:20 0:11:30 0:11:0 0:11:50 0:12:00 time (hh:mm:ss) 3 Conclusion TinyeRync: ecure single-hop pair-wise time synchronization Between two nodes The building block of global time synchronization. ecure and resilient global time synchronization In the whole network Future work Adapting the linear regression technique to compensate the constant clock drifts. 35 12