A middleware to support security in Wireless Sensor Network



Similar documents
WINSOME: a Middleware Platform for the Provision of Secure Monitoring Services over Wireless Sensor Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Introduction to Cyber Security / Information Security

Introduction to Wireless Sensor Network Security

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Wireless Sensor Network: Challenges, Issues and Research

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Efficient Data Transmission For Wireless Sensor Networks

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Securing Data on Microsoft SQL Server 2012

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

About the Authors Preface Acknowledgements List of Acronyms

Secure Routing in Wireless Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Foundation University, Islamabad, Pakistan

MS-55096: Securing Data on Microsoft SQL Server 2012

Security Sensor Network. Biswajit panja

Intrusion Detection via Machine Learning for SCADA System Protection

Curran, K. Tutorials. Independent study (including assessment) N/A

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Wireless Sensor Networks Chapter 14: Security in WSNs

CHAPTER 1 INTRODUCTION

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Data Security in Unattended Wireless Sensor Network

Chapter 17. Transport-Level Security

IT Networking and Security

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Center of Academic Excellence Cyber Operations Program 2013 Application

Lecture II : Communication Security Services

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Security for Ad Hoc Networks. Hang Zhao

Wireless Network Security Spring 2014

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Security Solutions for Wireless Sensor Networks

How To Manage Security On A Networked Computer System

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Single Sign-On Secure Authentication Password Mechanism

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Advanced Authentication

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Implementing Cisco IOS Network Security v2.0 (IINS)

Module 1: e- Learning

SCP - Strategic Infrastructure Security

Chapter 1 The Principles of Auditing 1

A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks

IT Networking and Security

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

LIST OF FIGURES. Figure No. Caption Page No.

How To Write A Transport Layer Protocol For Wireless Networks

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

SPINS: Security Protocols for Sensor Networks

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

CISA TIMETABLE (4 DAYS)

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Computer and Network Security

A Review on Zero Day Attack Safety Using Different Scenarios

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Fundamentals of Network Security - Theory and Practice-

Intelligent. Data Sheet

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Network Security Administrator

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

QoS Management in SOAs. Service-Oriented Architectures

Role of Anomaly IDS in Network

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Information and Communications Technology Courses at a Glance

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

DDS-Enabled Cloud Management Support for Fast Task Offloading

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

A Review on Network Intrusion Detection System Using Open Source Snort

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Online Network Traffic Security Inspection Using MMT Tool

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

A Systems Engineering Approach to Developing Cyber Security Professionals

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Dept. of Financial Information Security

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Key Management and Distribution

Implementing Cisco IOS Network Security

A Security Architecture for. Wireless Sensor Networks Environmental

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Embedded Java & Secure Element for high security in IoT systems

CSC 774 Advanced Network Security. Outline. Related Work

Transcription:

A middleware to support security Stefano Marchesani Centre of Excellence DEWS Università degli Studi dell'aquila, Italy IPSN Ciclo PhD Forum XXVI 2013

OVERVIEW Introduction Middleware Security Middleware Agilla TAKS IDS Future works Conclusions 2/22

OVERVIEW Introduction Middleware Security Middleware Agilla TAKS IDS Future works Conclusions 3/22

INTRODUCTION (1/3) What is a middleware? SW package intermediary between the application and underlying infrastructure (OS or HW) What is a middleware for WSN? SW package providing [1] [2]: a suitable view of a network of nodes an interface to access some services: Configure/program nodes System services Manage application-layer problems (QoS, Discovery services, etc.) 4/22

INTRODUCTION (2/3) Classification by programming/configuring [1] [2] Virtual machine: the system injects and distributes the modules through the network using tailored algorithms and the VM then interprets the modules Database: this approach views the whole network as a virtual database system and It provides an interface that lets the user issue queries to the network to extract the data of interest Modular (agent-based): the key to this approach is that applications are as modular as possible to facilitate their injection and distribution through the network using mobile code Application-driven: this approach introduces a new dimension in middleware design by supplementing an architecture that reaches the network protocol stack Message-oriented: uses the publish-subscribe mechanism to facilitate message exchange between nodes and the sink nodes 5/22

INTRODUCTION (3/3) What is (network) security? Network security goals: data Confidentiality, Integrity and Authentication (CIA) system Availability How is it possible to ensure security? Good encryption (and decryption) schemes ensure CIA To ensure availabity is more complex Detection and Reaction 6/22

OVERVIEW Introduction Middleware Security Middleware Agilla TAKS IDS Future works Conclusions 7/22

MIDDLEWARE Goal: a middleware to support security in WSN Useful interface for the WSN programmer Suitable for real-world applications Compliant to security requirements (CIAA) Proposed approach Embed selectable encryption schemes and an Intrusion Detection System (IDS) into an agent-based middleware Agent-Based MW Encr/Decr IDS 8/22

MIDDLEWARE: AGENT-BASED MW Why agent-based MW? Network reprogramming without service interruption Agents are useful for both network maintenance and WSN programmer Agents can be used for IDS (Reaction) Agilla [3] Developed at the Washington University in St. Luis It is stable and open source (TinyOS 1.x) We are evaluating its suitability for real-world application Power consumption, Routing, etc. 9/22

MIDDLEWARE: ENCRYPTION (1/3) WSN encryption schemes Symmetric vs Asymmetric schemes Symmetric solutions are preferred because their performance [5] In Symmetric schemes we have key distribution issue Proposed approach Topology Authenticated Key generation Scheme (TAKS) A planner defines a planned network topology Local admissible network is stored in each node TAKS dynamically generates keys on this information Each message can be Topology Authenticated 10/22

MIDDLEWARE: ENCRYPTION (2/3) Topology Authenticated Key generation Scheme (TAKS) T(i) set of topology vector L(i) set of local key component 2 3 1 4 T(1) = k t2, k t3 T(2) = k t1, k t3 T(3) = k t1, k t4 T(4) = k t3 L(1) = k l1 L(2) = k l2 L(3) = k l3 L(4) = k l4 k t = f(k l ) TAK ij = g(k ti,k lj ) = h(k tj,k li ) 11/22

MIDDLEWARE: ENCRYPTION (3/3) Example from [4] Let n i and n j be a node pair Let b be a scalar in GF(q), a i, a j, m and c vectors in vector space over GF(q) k k k k li ti lj tj i aib k k + k k 0 j m (a + c) m aib j a b m (a + c) m a b j m a m a i j TAK i li tj lj ti = k li k tj TAK j k lj k ti 12/22

MIDDLEWARE: IDS (1/5) Intrusion Detection System A functional component to detect and eliminate intrusions [6] Block diagram Intrusion Detection Intrusion Reaction Logic Intrusion Reaction Application Configuration Data Audit Data 13/22

MIDDLEWARE: IDS (2/5) Intrusion Detection System Two types of Intrusion Detection Anomaly based models normal behavior (+FP and -FN) Misuse based models threat behavior (-FP and +FN) Proposed approach Misuse based approach Difficulty to model normal behavior Threat behavior is a Weak Process Model (WPM) 1 (1,6) 2 (3,4) 3 (2,4) 4 (3,5) 5 (1,3,6) 14/22

MIDDLEWARE: IDS (3/5) How does an attack can be modeled? An attack is a sequence of operations aim to break security It is an unknown FSM that we can observe through some anomalies Hidden Markov Model (HMM) and Viterbi algorithm HMM observable is associated to the probability to be in a certain state Viterbi algorithm is too expensive 2 1 p 11 1 p 21 1 p 61 1 4 1 2 p 12 3 p 13 2 2 p 22 3 p 23... 6 2 p 62 3 p 63 3 5 4 p 14 5 p 15 4 p 24 5 p 25 4 p 64 5 p 65 15/22

MIDDLEWARE: IDS (4/5) How does an attack can be modeled? Relax HMM to Weak Process Model (WPM) Each observable is associated to the possibility to be in a certain state Weighing state transitions Viterbi algorithm can be simplified Scoring mechanism and threshold 1 (1,6) 2 (3,4) 4 (3,5) 1 1 5 2 3 3 2 4 5 3 (2,4) 5 (1,3,6) 4 2 3 5 4 6 1 5 16/22

MIDDLEWARE: IDS (5/5) Misuse-based Intrusion Detection We designed WPM for 3 types of threats Hello flooding, sinkhole and wormhole 17/22

OVERVIEW Introduction Middleware Security Middleware Agilla TAKS IDS Future works Conclusions 18/22

FUTURE WORKS Agilla Reverse engineering Porting in TinyOS 2.x Encryption Performance evaluation in Agilla Intrusion Detection System Implementation and validation IRL and IRLA definition Database enhancing 19/22

CONCLUSIONS It is proposed a middleware to support security in Wireless Sensor Networks The proposed middleware is Useful for WSN programmer Gifted of innovative security facilities Works will be done to make it suitable for real-world applications 20/22

REFERENCES [1] Salem Hadim, and Nader Mohamed, Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks (2006) [2] Miao-Miao Wang, Jian-Nong Cao, Jing Li, and Sajal K. Das, Middleware for Wireless Sensor Networks: A Survey (2008) [3] Agilla website http://mobilab.wustl.edu/projects/agilla/ [4] S. Marchesani, L. Pomante, M. Pugliese, and F. Santucci. WINSOME: A Middleware Platform for the Provision of Secure Monitoring Services over Wireless Sensor Networks (2013) [5] Wander, A. S., Gura, N., Eberle, H., Gupta, V., Shantz, Sh. Ch.: Energy analysis of public-key cryptography for wireless sensor networks (2005) [6] M. Pugliese, Managing Security Issues in Advanced Applications of Wireless Sensor Networks (2008) 21/22

THANKS YOU! ANY QUESTIONS? 22/22