Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?

Similar documents
RT-QoS for Wireless ad-hoc Networks of Embedded Systems

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

Prediction of DDoS Attack Scheme

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Some Security Trends over Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Metrics for Detection of DDoS Attacks

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Demystifying Wireless for Real-World Measurement Applications

Customer Specific Wireless Network Solutions Based on Standard IEEE

CHAPTER 1 INTRODUCTION

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Protocol Design for Neighbor Discovery in AD-HOC Network

Resiliency of Wireless Sensor Networks: Definitions and Analyses

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Energy Efficiency of Wireless Sensor Networks

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Security Solutions for Wireless Sensor Networks

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

CSC 774 Advanced Network Security. Outline. Related Work

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Security for Ad Hoc Networks. Hang Zhao

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

A Non-beaconing ZigBee Network Implementation and Performance Study

A Catechistic Method for Traffic Pattern Discovery in MANET

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

Wireless Sensor Network: Challenges, Issues and Research

Survey on different attacks in Wireless Sensor Networks and their prevention system

Enhancing Wireless Security with Physical Layer Network Cooperation

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Robust protocols for the Industrial Internet of Things

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

Agriculture: Methods and Experiences

observing nodes behavior in IoT validation platforms

Wireless Sensor Network: Improving the Network Energy Consumption

Energy Optimal Routing Protocol for a Wireless Data Network

EKSAMEN / EXAM TTM

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A Transport Protocol for Multimedia Wireless Sensor Networks

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

How To Write A Transport Layer Protocol For Wireless Networks

Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Real-Time (Paradigms) (51)

Wireless Sensor Network Performance Monitoring

6LoWPAN Technical Overview

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Low Power, Low Delay: Opportunistic Routing meets Duty Cycling

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

How To Create A Time Synchronization Protocol With Low Latency Data Collection

Medium Access Layer Performance Issues in Wireless Sensor Networks

Surveillance System Using Wireless Sensor Networks

THE development of media access control (MAC) protocols

(SIGF), a family of configurable secure routing protocols. for Wireless Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

... neither PCF nor CA used in practice

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

A Survey: High Speed TCP Variants in Wireless Networks

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Transcription:

Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds? F. Maraninchi 1, Grenoble INP/Ensimag, VERIMAG mainly summarizing discussions with: Laurent Mounier, Karine Altisen, Stéphane Devismes, Pascal Lafourcade, Raphaël Jamet, Ozgün Pinarer,... November 6, 2014 1 http://orcid.org/0000-0003-0783-9178

Trade-off Between Security and Energy Consumption in Sensor Networks Applications... Energy Consumption Security Lifetime Security () Nov 6, 2014 November 6, 2014 2 / 23

Trade-off Between Security and Energy Consumption in Sensor Networks Applications... Energy Consumption Security Lifetime Choose this point Security () Nov 6, 2014 November 6, 2014 2 / 23

Two Sub-Questions Energy Consumption Security 1 How to evaluate energy consumption of a complete HW/SW solution? 2 How to define and implement measurable security? In such a way that we trust simulations/experiments. We worked on points 1 and 2 in the ANR ARESA and ARESA2 projects, with Orange Labs; and also on point 1 in the ANR HELP project, with STMicroelectronics. () Nov 6, 2014 November 6, 2014 3 / 23

This Talk Brief presentation of one particular security protocol for WSNs, for which security has been evaluated on abstract models of WSNs SR3: Secure Resilient Reputation-based Routing. Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade - IEEE Int. Conf. on Distributed Computing in Sensor Systems (DCOSS 2013) More realistic assumptions and new questions on the attacker models Some (hopefully) more general comments/conclusions/questions () Nov 6, 2014 November 6, 2014 4 / 23

The SR 3 Protocol () Nov 6, 2014 November 6, 2014 5 / 23

The SR 3 Protocol: Expected Attackers Dolev-Yao principles for security = the attacker is the strongest we can imagine, the only thing it cannot do is decrypt a message without the key. () Nov 6, 2014 November 6, 2014 6 / 23

The SR 3 Protocol: Expected Attackers Dolev-Yao principles for security = the attacker is the strongest we can imagine, the only thing it cannot do is decrypt a message without the key. Such a powerful attacker of a WSN will always win. Weaker attackers considered: normal nodes (w.r.t. HW capabilities) whose SW has been compromised Example: a node can start behaving as a blackhole at some point in time. Expected properties of SR 3 : if there are not too many such nodes, the protocol will maintain a good delivery rate, at a reasonable cost. () Nov 6, 2014 November 6, 2014 6 / 23

The SR 3 Protocol: Main Ideas n1 me n4 n2 sink n3 () Nov 6, 2014 November 6, 2014 7 / 23

The SR 3 Protocol: Main Ideas Reputation list 1 2 2 n1 me n4 n2 sink n3 Choice of a neighbor: (i) part of the time: random; otherwise random weighted by reputation list. () Nov 6, 2014 November 6, 2014 7 / 23

The SR 3 Protocol: Main Ideas Reputation List 4 1 1 n1 me blackhole n4 n2 sink n3 () Nov 6, 2014 November 6, 2014 7 / 23

The SR 3 Protocol: Simulations with Sinalgo (A distributed algorithm simulator, ETH Zürich) () Nov 6, 2014 November 6, 2014 8 / 23

The SR 3 Protocol: Simulations with Sinalgo (A distributed algorithm simulator, ETH Zürich) A node that has acquired a good reputation turns into a blackhole: the delivery rate drops, and then SR3 recovers. Size of the reputation list: if increased, better routes, longer time to recover. () Nov 6, 2014 November 6, 2014 9 / 23

The SR 3 Protocol: Energy Consumption For the moment, the Sinalgo models are based on 2 important hypotheses: The radio channel and the MAC layer provide the routing level with an ideal platform (no collisions) Energy consumption is directly related to messages (number of messages sent, length of the routes) () Nov 6, 2014 November 6, 2014 10 / 23

The SR 3 Protocol: Energy Consumption For the moment, the Sinalgo models are based on 2 important hypotheses: The radio channel and the MAC layer provide the routing level with an ideal platform (no collisions) Energy consumption is directly related to messages (number of messages sent, length of the routes) Next step: how would SR 3 behave with more realistic assumptions: Realistic radio channel and MAC protocol Energy consumption related to the behavior of the HW elements (CPU, radio,...) () Nov 6, 2014 November 6, 2014 10 / 23

Experiments with SR 3 Sinalgo WSNET (ideal MAC) () Nov 6, 2014 November 6, 2014 11 / 23

Experiments with SR 3 Sinalgo SensOrLabs testbed WSNET (ideal MAC) More understandable More realistic... () Nov 6, 2014 November 6, 2014 11 / 23

Experiments with SR 3 Sinalgo WSNET (802.11) SensOrLabs testbed WSNET (ideal MAC) + realistic medium More understandable More realistic... () Nov 6, 2014 November 6, 2014 11 / 23

Experiments with SR 3 Sinalgo WSNET (802.11) SensOrLabs testbed WSNET (ideal MAC) + realistic radio (Q. Lampin) T TX consumption/ state + realistic medium More understandable More realistic... () Nov 6, 2014 November 6, 2014 11 / 23

What do We Expect? 1 Degraded performances due to the realistic radio channel + MAC longer routes,... () Nov 6, 2014 November 6, 2014 12 / 23

What do We Expect? 1 Degraded performances due to the realistic radio channel + MAC longer routes,... 2 New behaviors due to interference effects hidden by the ideal communication hypothesis spatial and temporal correlations for the success rate of transmissions, implying weird behaviors of the reputation lists,... We try and build a situation for point 2 (topology, moment when a node becomes a blackhole,...). () Nov 6, 2014 November 6, 2014 12 / 23

Unexpected Observation With a realistic radio channel, it s hard to build an efficient attack! () Nov 6, 2014 November 6, 2014 13 / 23

Unexpected Observation With a realistic radio channel, it s hard to build an efficient attack! () Nov 6, 2014 November 6, 2014 13 / 23

After Some Thought... Very important impact of the attacker s position: Where to put the attacker to make it as strong as possible? An idea: We would like the honest nodes to suffer from the realistic channel, but NOT the attackers! () Nov 6, 2014 November 6, 2014 14 / 23

General Comments () Nov 6, 2014 November 6, 2014 15 / 23

The More Details, The Better? The more details you can put in a reasonably fast simulation, the better? No, because: More details means less understandable results More details in the execution environment (HW+channel+attackers) make it more particular, hence the SW is less robust/secure. () Nov 6, 2014 November 6, 2014 16 / 23

Comments on the Experimental Settings Sinalgo WSNET (ideal MAC) () Nov 6, 2014 November 6, 2014 17 / 23

Comments on the Experimental Settings Sinalgo SensOrLabs testbed WSNET (ideal MAC) More understandable More realistic... () Nov 6, 2014 November 6, 2014 17 / 23

Comments on the Experimental Settings Sinalgo WSNET (802.11) SensOrLabs testbed WSNET (ideal MAC) + realistic medium More understandable More realistic... () Nov 6, 2014 November 6, 2014 17 / 23

Comments on the Experimental Settings Sinalgo WSNET (802.11) SensOrLabs testbed WSNET (ideal MAC) + realistic radio (Q. Lampin) T TX consumption/ state + realistic medium More understandable More realistic... () Nov 6, 2014 November 6, 2014 17 / 23

The Ideal Modeling/Simulation Framework For Embedded+Distributed Systems? (Given) Software (drivers, low level, MAC, routing, application) () Nov 6, 2014 November 6, 2014 18 / 23

The Ideal Modeling/Simulation Framework For Embedded+Distributed Systems? (Given) Software (drivers, low level, MAC, routing, application) (Has to be modeled) Adversary HW of a node radio channel attackers () Nov 6, 2014 November 6, 2014 18 / 23

The Ideal Modeling/Simulation Framework For Embedded+Distributed Systems? (Given) Software (drivers, low level, MAC, routing, application) (Has to be modeled) Adversary HW of a node radio channel attackers Very particular ok () Nov 6, 2014 November 6, 2014 18 / 23

The Ideal Modeling/Simulation Framework For Embedded+Distributed Systems? (Given) Software (drivers, low level, MAC, routing, application) (Has to be modeled) Adversary HW of a node radio channel attackers Very particular ok Unfriendliness should be exagerated () Nov 6, 2014 November 6, 2014 18 / 23

Exagerating Unfriendliness of the Execution Environment (1) Exagerating Unfriendliness of the HW platform: The very goal of transaction-level modeling (TLM) for systems-on-a-chip. Feasible even though the REAL object code runs on rather abstract HW models (bit-accurate models) Example with two timers: Embedded SW: start timer 1 delay 10 start timer 2 delay 20 wait expiration 1 wait expiration 2 () Nov 6, 2014 November 6, 2014 19 / 23

Exagerating Unfriendliness of the Execution Environment (1) Exagerating Unfriendliness of the HW platform: The very goal of transaction-level modeling (TLM) for systems-on-a-chip. Feasible even though the REAL object code runs on rather abstract HW models (bit-accurate models) Example with two timers: Embedded SW: start timer 1 delay 10 start timer 2 delay 20 wait expiration 1 wait expiration 2 HW models of increasing unfriendliness: 1) exact timing: 10, 20 2) loose timing: [8,12], [18,22] 3) no timing: one day, one day If even loose timing is considered too friendly, then untimed models are the only choice to guarantee SW robustness. () Nov 6, 2014 November 6, 2014 19 / 23

Exagerating Unfriendliness of the Execution Environment (2) Exagerating unfriendliness of the attackers in a WSN? We could imagine a mixed simulation mode in which: The honest nodes play by the rules, i.e. they suffer from the imperfections of the radio channel+mac The attackers don t play by the rule, i.e., for them the transmission is perfect. () Nov 6, 2014 November 6, 2014 20 / 23

Exagerating Unfriendliness of the Execution Environment (2) Exagerating unfriendliness of the attackers in a WSN? We could imagine a mixed simulation mode in which: The honest nodes play by the rules, i.e. they suffer from the imperfections of the radio channel+mac The attackers don t play by the rule, i.e., for them the transmission is perfect. For the 2 timers: if even loose timing is considered too friendly, then untimed models are the only choice. () Nov 6, 2014 November 6, 2014 20 / 23

Exagerating Unfriendliness of the Execution Environment (2) Exagerating unfriendliness of the attackers in a WSN? We could imagine a mixed simulation mode in which: The honest nodes play by the rules, i.e. they suffer from the imperfections of the radio channel+mac The attackers don t play by the rule, i.e., for them the transmission is perfect. For the 2 timers: if even loose timing is considered too friendly, then untimed models are the only choice. For the attackers: if any position with the realistic radio channel is too particular/friendly, the only choice is to build an ideal position. () Nov 6, 2014 November 6, 2014 20 / 23

Conclusion (1) We are quite far from trusting views like: Energy Consumption Security Lifetime Security We need frameworks in which we can think in terms of our solution/the execution environment, i.e., the adversary () Nov 6, 2014 November 6, 2014 21 / 23

Conclusion (1) We are quite far from trusting views like: Energy Consumption Security Lifetime Choose this point Security We need frameworks in which we can think in terms of our solution/the execution environment, i.e., the adversary () Nov 6, 2014 November 6, 2014 21 / 23

Conclusion (2) A very useful tool would be a mix of: testbeds and high level models with perturbations = exagerated view of the discrepancies between ideal and real behaviors () Nov 6, 2014 November 6, 2014 22 / 23

Questions? () Nov 6, 2014 November 6, 2014 23 / 23