End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich



Similar documents
Providing End-to-end Secure Communications in Wireless Sensor Networks

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Client Server Registration Protocol

Chapter 10. Network Security

Wireless Sensor Networks Chapter 14: Security in WSNs

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Introduction to Computer Security

TLS/SSL in distributed systems. Eugen Babinciuc

Security Sensor Network. Biswajit panja

Chapter 7 Transport-Level Security

Security Solutions for Wireless Sensor Networks

Introduction to Wireless Sensor Network Security

Network Security Protocols

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Introduction to Computer Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Network Security Spring 2014

Computer Networks. Secure Systems

Network Security Essentials Chapter 5

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Annual review FLORENCE WP4 Network: prototypes

CSE/EE 461 Lecture 23

SSL/TLS: The Ugly Truth

Single Sign-On Secure Authentication Password Mechanism

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Using BroadSAFE TM Technology 07/18/05

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Stateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT)

Cryptography and Network Security

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Security vulnerabilities in the Internet and possible solutions

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Overview. SSL Cryptography Overview CHAPTER 1

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Security Policy Revision Date: 23 April 2009

Transport Layer Security Protocols

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Introduction to Cryptography

CRYPTOGRAPHY IN NETWORK SECURITY

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Transport Level Security

Web Security Considerations

International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN

Securing MANET Using Diffie Hellman Digital Signature Scheme

Network Security Fundamentals

Network Access Security. Lesson 10

Chapter 17. Transport-Level Security

Foundation University, Islamabad, Pakistan

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Some Security Trends over Wireless Sensor Networks

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IoT Security Platform

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security for Ad Hoc Networks. Hang Zhao

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Authenticity of Public Keys

Lecture 9 - Network Security TDTS (ht1)

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict All rights reserved

Packet Level Authentication Overview

Computer security Lecture 9

Three attacks in SSL protocol and their solutions

About the Authors Preface Acknowledgements List of Acronyms

What is Web Security? Motivation

The Secure Sockets Layer (SSL)

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

IoT Security. Introduction. Threat Model

CS 4803 Computer and Network Security

Security Considerations for DirectAccess Deployments. Whitepaper

How To Secure My Data

Embedded Security: From Sensor Networks to Internet of Things (IoT)

An Introduction to Cryptography as Applied to the Smart Grid

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Chapter 3. Network Domain Security

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Recommended Wireless Local Area Network Architecture

Wireless Sensor Network: Challenges, Issues and Research

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

Monitoring Data Integrity while using TPA in Cloud Environment

STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW

Implementing Cisco IOS Network Security v2.0 (IINS)

End-to-end Secure Data Aggregation in Wireless Sensor Networks

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Associate Prof. Dr. Victor Onomza Waziri

How To Protect Your Data From Attack

Attestation and Authentication Protocols Using the TPM

How To Understand And Understand The Security Of A Key Infrastructure

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Securing IP Networks with Implementation of IPv6

Transcription:

End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 2

Motivation Growing importance of Wireless Sensor (WSNs) Many works devoted to hop-by-hop security Only a few consider end-to-end security Interesting security challenges due to different preconditions Future: Different directions and solution approaches High influence by applications 3

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 4

The Notion of «Security» Definition of (end-to-end) security depends on context «Inexistence of (successful) attacks» [3] «The state of being free from danger or threat» [4] To provide security, we need Confidentiality, authenticity, integrity and privacy! System security vs. network security 5

Symmetric Encryption Bob c Alice c = f(m, k) Eve? = f 1 (c,? ) m = f 1 (c, k) m {0, 1} n = message k = shared secret key c {0, 1} n = cipher text f = cryptographic function 6

The Key Distribution Problem secure channel share secret key Approaches: 1. Secure key exchange over insecure connections (e.g. Diffie-Hellman) 2. Use two keys for encryption / decryption Asymmetric encryption (e.g. RSA) 7

Asymmetric Encryption Bob c 1 Alice c 2 c 1 = f m 1, PU A m 2 = f c 2, PR B Eve? m 1 = f c 1, PR A c 2 = f(m 2, PU B ) PR x = private key of x PU x = public key of x c 1, c 2, PU A, PU B 8

Message Authentication Bob Alice c 1 Hi, I m Bob. Take this message! Eve c 1 = f m 1, PU A m 1 = f c 1, PR A Alice has no chance to ensure the authenticity of the message! 9

Message Authentication Code (MAC) Bob c 1 = f c m, PU A t 1 = f t c 1, k t (c 1, t 1 ) (c 1, t 1 ) (c 2, t 1 ) Eve Alice m 1 = f c c 1, PR A t 1 = f t c 1, k t t 1 = t 1 m 2 = f c 2, PR A t 2 = f c 1, k t t 2 t 1 c 2 = f c m 2, PU A 10

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 11

Internet-of-Things Network of uniquely identified objects Firstly defined in 1999 by Kevin Ashton Virtual representation of «things» in an internet-like structure Support daily processes by minimizing differences between real and virtual world Internet IP communication WSNs are an integral part of the IoT! From point-to-point to end-to-end communication 12

WSN Applications Monitoring! Deploy a WSN over a region to monitor some phenomenon Geo fencing Military: intrusion detection Structural health monitoring Natural disaster prevention (e.g floods) Health Care Traffic management Smart grid 13

WSNs vs IP Massive resource constraints Computational power (slower CPUs) Main memory (often in the range of B-KB) Power supply (batteries) «Young» technology, hence expect growing Importance Number of application scenarios Variety of requirements and contexts 14

Challenges in WSNs Key exchange: existing protocols are not feasible Asymmetric encryption (e.g. RSA) need lots of computations Trade-off between end-to-end security and information aggregation Deployment of ISO/OSI protocol stack difficult (resources) Current technologies (e.g. SSL/TLS) not feasible in WSNs 15

WSNs: Hop-by-Hop Security Sensors Sink WSN Encrypted links Use hop-by-hop principle to generate end-to-end security 16

WSNs: End-to-End Security Sensors User Internet WSN Sensor-to-sensor Sensor-to-user 17

E2E Security in WSNs: Summary Sensor-to-sensor: End-to-end: Sensors in-between cannot decrypt messages. No information aggregation possible Hop-by-Hop: Any two sensors need a shared secret key to communicate! Transmission radius is also important. Sensor-to-user: For communication over the Internet 18

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 19

The Key Distribution Problem - Reloaded Equip sensors with secret keys before deployment Key space K consists of a set of different keys. Sensors i and j Provide each sensor i with a random set K i k k K i K j i and j can communicate. K. Is referred to as key pre-distribution. 20

Key pre-distribution Secure? From a theoretical point of view, no Are the security flaws of practical relevance? Context-dependent Inherent trade-off Resilience ( probability of a sensor s attack resistence) Resources (can t distribute arbitrary many keys) and effect of node capturing 21

Key pre-distribution What if there is no such key k? Figure from [1] Differentiated key pre-distribution [1] 22

Example 1: Differentiated Key pre- Distribution (1) + Defines node classes and distributes the secret keys accordingly + Much more sophisticated, theoretically well-founded + Improves link resilience and probability of secure communication No breakthrough Mainly work arounds for existing problems/flaws No information about authentication and integrity provisioning 23

Example 1: Differentiated Key pre- Distribution (2) Figures from [1] Pe2e: Probability of secure message transmission between sensor and sink Nc: Number of sensors disclosed to an attacker r: Radius of communication for each sensor in meters GPSR (Greedy Perimeter Stateless Routing) and minhop: Routing schemes 24

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 25

Example 2: E2E Secure Communication between WSNs and the Internet (1) Proxy model Reduces the burden of sensors Decreases scalability Increases complexity (e.g. need for application specific proxies WSNs as an extension of the Internet IP! No proxy, but an edge-router for forwarding «Real» end-to-end security, edge-router sees no clear text 26

Example 2: E2E Secure Communication between WSNs and the Internet (2) Deployment and four phases Deployment phase: before actual deployment, exchange information for services and secure communication 1. User registration phase: users of the system get certificates and access passports 2. Request phase: the gateway verifies the request of the user Check the access rights 3. Session key agreement phase: exchange of security credentials 4. Key confirmation phase: verify the completion of the hand-shake Complicated protocol, for detailed explanation and analysis, consult [2] 27

Example 2: E2E Secure Communication between WSNs and the Internet (3) Sensor node Gateway Service Provider User CERT, AUTH Access control Id sensor, CERT Send different values such that the user can compute the shared key Verify the shared keys, secure connection established 28

Example 2: Properties (according to the authors) Mutual authentication Access control Mutual key confirmation Key freshness Privacy protection DDoS resistance Replay attacks still possible security flaws due to concrete implementations!? Performance: At least better than standard TLS!? Still assumes a secure pre-deployment phase! 29

Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless Sensor 4. Examples 1. Example 1: Differentiated Key pre-distribution 2. Example 2: End-to-End Secure Communication between WSNs and the Internet 5. Conclusion 30

Summary: P2P vs WSN End-to-End Security (1) Asymmetric Encryption Standards Key Distribution after Deployment Experience Authenticity Integrity Privacy Conventional WSN Sensor-to- Sensor Matured technologies Approaches exist Poor/no support 31

Summary: P2P vs WSN End-to-End Security (2) Two main security criteria Hardware and resources Application and context Challenge: Provision of security under massive resource constraints End-to-End Intermediate sensors perform only forwarding of cipher text. Privacy, authenticity, integrity Confidentiality: Data is not revealed at forwarding nodes! 32

References [1] W. Gu, N. Dutta, S. Chellappan, X. Bai, Providing End-to-end Secure Communications in Wireless Sensor, IEEE Transactions on Network and Service Management, IEEE, New York, NY, USA, Vol. 9, No. 3, pp. 205-215, 2011 [2] H. Yu, J. He, T. Zhang, P. Xiao, Y. Zhang, Enabling End-to-end Secure Communications between Wireless Sensor and the Internet, Journal World Wide Web, Springer, New York, NY, USA, Vol.16, Issue 4, pp. 515-540, 2013 [3] U. Maurer, Cryptography, Lecture Notes of the Course «Cryptography» taught at ETH Zurich, p. 3, 2014 [4] Definition from the Oxford Dictionaries (Online Version), http://www.oxforddictionaries.com/definition/english/security, 2014 33

Discussion H1: The concept of key pre-distribution will not be replaced in the next 10 years. 34

Discussion H2: Optimization of current asymmetric encryption schemes will become a long-term solution due to technical advances in sensor design. The introduction of entirely new schemes is likely unnecessary. 35

Discussion H3: The WSN research community needs to introduce new schemes to provide user privacy before the paradigm of the Internet-of-Things (IoT) or Web-of- Things become reality. 36

Discussion H4: The manifold deployment scenarios of WSNs make the definition of multiple standards inevitable. 37

Discussion What is your opinion about WSNs? Smart traffic management Computer controlled cars Smart home or any other application? 38

39

Deployed Solutions 6LoWPAN as WSN version of IPv6 IPSec mandatory in IPv6, integration in 6LoWPAN in progress MicroSSL for 8-bit flash micro controller (1.3 KB) Sizzle: security architecture (using SSL and HTTP) Uses public key encryption, but is proxy based 40