Title: Cryptographic Protocols in Wireless Sensor Networks
1Cryptographic Protocols in Wireless Sensor
Networks
- Petr venda
- Faculty of Informatics, MU Brno
- Laboratory of Security and Applied Cryptography
- joint work with Dan Cvrcek, Jirà Kur, Václav
Matyá, Luká Sekanina
2Wireless Sensor Network
- Basic technology
- 8 bit CPU, 1 kB RAM, 102 kB flash
- short range radio, battery powered
- condition sensor (temperature, pressure, )
- xBow MicaZ, TMote Sky, Philips smart node,
- currently 100 or more (should be around 1)
- Applications
- medical monitoring
- scientific (animal monitoring, geologic)
- industry monitoring (bridge/tunnel conditions
monitoring) - agriculture (field condition monitoring)
- emergency response networks (fire detection)
- military (enemy movement, snipers, vehicles)
3Large scale Wireless Sensor Networks
- Network of nodes and few powerful base stations
- 102 106 sensor nodes
- particular nodes deployed randomly, e.g., from
plane - Network characteristics
- covering large areas - distributed
- ad-hoc position/neighbours not known in advance
- flat or hierarchical topology
- multi-hop communication
- data locally aggregated
4Where do we need security in WSN?
- Sensitive data are often sensed/processed
- military application
- medical information, location data (privacy)
- Commercially viable information
- information for sale cost for owner of the
network - know-how - agriculture monitoring
- Protection against vandalism
- distant non-existing fires blocks fireman
- Early stage of WSN allows to build security in
rather - than as late patch
- as is the case with Internet today
5Differences from classical networks
- Running on battery (limited resource)
- days for personal network
- we dont like to change battery too often
- years for large scale monitoring network
- we dont like to visit all nodes in forest every
month - communication and computation is energy-expensive
- Nodes can be captured by an attacker
- and returned back as malicious node
- all secrets can be extracted as nodes are not
tamper resistant - to maintain reasonable cost of network
- Links can be temporal, network often disconnected
- by design, by necessity
6Security threats
- Eavesdropping capture of transmitted data
- Message injection/modification/replay
- Impersonation fake identity, clones
- Denial of Service (DoS)
- jamming (malicious nodes)
- secure routing (multi-hop communication)
- battery exhaustion
- Traffic analysis who is communicating with whom
- Side-channel analysis unexpected leaks of
information - ...
- All kinds of threats that are hard to prevent
even in classical networks with powerful
computers - but here limited performance, decentralized,
lack of physical control
7Why not use classical solutions?
- Often cannot be used without modifications
- platform limitations (energy, memory, speed)
- Key establishment is basic building block
- for most security protocols including secure
routing - Some classical solutions do not work
- single network-wide key (single point of failure)
- pairwise keys each with every (high memory
requirements) - asymmetric crypto, trusted third party (high CPU,
battery) - Tamper resistant hardware is not panacea
- is expensive and skilled attacker can break it
anyway Ko98 - memory card (SLE4428) - 1, crypto card
(SLE66/88) 10-30 - New ideas needed and some already emerged
8Power analysis device
9Reverse engineering
(bytecode) sload_1 ifeq_w L2 L1
getfield_a_this 0 sconst_0
sconst_0 bastore goto L3 L2
getfield_a_this 0 sconst_0
sconst_1 bastore goto L3 L3
- may reveal sensitive info
- keys, internal branches,
(source code) if (key 0) m_ram10 1 else
m_ram10 0
compiler
(power trace, key ! 0)
(power trace, key 0)
- Better to design protocols tolerant to partial
compromise
10Probabilistic key pre-distribution
- Randomized key pre-distribution EG02, CPS03
- based on birthday paradox
- key selection without replacement from large key
pool - 100 keys from 10000 (60 probability at least one
key shared) - memory efficient, scalable
- relatively low node capture resilience (NCR)
- depends on pool size, ring size and captured
- Multi-space pairwise polynomial keys DDHV03,
FKZZ05 - basic idea Bloms threshold secure scheme
- Increasing ring size moderately allows to
increase pool size highly, resulting node capture
resilience is better - idea behind hypercube LN03, group supported
SM07 extensions
11Key Infection distribution model
- More realistic attacker model ACP04, CS05
- not able to eavesdrop the whole network (for
short period) - key is exchanged in plaintext between neighbours
(contact) - Secrecy amplification protocols
- able to secure compromised link eavesdropped by
attacker - transport of fresh link key over secure path
- can be used for probabilistic pre-distribution as
well - Published amplification protocols
- PUSH model ACP04
- PULL secrecy amplification CS05
- multi-hop/path versions
PUSH
PULL
12Node-oriented protocol (example)
4-party PULL RNG N3 R1 SND N3 N1 R1 R1 SND N3 N4
R1 R1 SND N4 N2 R1 R1
N1
N3
N3
N2
N4
N4
Total protocols runs 11 x combNum(12, 2) 11 x
66, 2000 messages
13Communication overhead
- Node-oriented protocols are deployment
independent - Lets introduce geographic position into protocol
- minimum radio strength to communicate
- approximate distance to node
- Parties identified by distance from central node
and its special partner (lower value, closer the
node) - e.g. N 0.32_0.15 gt position in real deployment
- Can we achieve comparable fraction of secure
links?
14Group-oriented protocol
RNG NP Rt11 SND NP N0.00 0.00 Rv11 Rt12 SND N0.35
0.67 NC Rv12 Rt2
min(Np1 NC Nx)2 (Np2 NP Nx)2
NP
NC
NP
NP
NC
NP
NC
Total protocols runs 11, 100 messages
15Evolution of SA protocols SSM09
16Results found by evolution node-oriented
- 4 parties, 200 instructions, small population
size, no crossing, rapid mutation (10) - Reinvented all published protocols
- pruning technique used to detect relevant
instructions - Evolved protocol better then all published
- polymorphic instruction, when 3rd party is
missing
17Results found by evolution group-oriented
(0.070) 00 SND N0.33 0.68 NP Rv6 Rt8 (0.070) 01
SND N0.35 0.67 NC Rv6 Rt2 (0.334) 02 RNG NP
Rt11 (0.010) 03 SND N0.59 0.11 NP Rv7
Rt3 (0.007) 04 SND NP N0.75 0.70 Rv6 Rt1 (0.334)
05 SND NP N0.01 0.00 Rv11 Rt12 (0.003) 06 SND
N0.01 0.00 NC Rv1 Rt5 (0.334) 07 SND N0.01 0.00
NC Rv12 Rt6 (0.014) 08 RNG N0.03 0.00
Rt1 (0.014) 09 SND N0.48 0.33 NP Rv1 Rt7 (0.077)
10 RNG N0.01 0.00 Rt6 (0.017) 11 SND N0.69 0.68
NC Rv1 Rt7
NC
NP
NC
NP
min(Np1 NC Nx)2 (Np2 NP Nx)2
18Success rate of evolved protocols
19Automatic attack strategy - motivation
- Fundamental asymmetry between the attacker and
the defender - attacker needs to find only one attack path
- defender should secure all of them
- Brute-force search over the space of possible
attack paths - suitable approach for the defender
- Informed search for possible attacks without
inspecting all possibilities - suitable for an attacker
20Basic concept
21Malicious routing in WSNs
- Misbehaving attacker nodes
- search for attacks against standard routing
- elementary actions store/load value, send
message, time counters - triggers binded on specific action (type of
message in air) - goals like increase fraction of non-delivered
messages, message hops, messages routed over
malicious node - Minimum cost forwarding (MCF) YCLZ01
- minimum spanning tree based with base station as
a root, - periodic broadcast of beacons, BS has cost 0
- cost based on distance and remaining energy of
node - Implicit geographic forwarding (IGF) BHSS03
- next hop selected based on geographic positions
of the nodes and base station, remaining energy
and random element
22Malicious routing - results
- Usually hard to analyze
- complex behavior and interleaving of elementary
actions - pruning - actions without impact on fitness are
discarded - still, we were unable to fully interpret all
details - Minimum cost forwarding
- impersonation of BS, forging beacons
- selective message forwarding/dropping
- Implicit geographic forwarding
- immediate answer to Open Request To Send
- malicious node is always selected as a next hop
- selective MAC layer collisions
- to maximize number of hops / undelivered messages
- overloading of neighbours message buffers
message drop
23Conclusions
- Novel approaches for WSN are needed
- specific environment platform limitations
- Security is always tradeoff between resources
spent and value of resources protected - WSN seems to be an environment where
probabilistic approach to security fits better - Protocols should be tolerant to partial
compromise - Automated approaches are welcome due to diversity
of usage scenarios - network topology, hardware characteristics,
compromise pattern, ...
24References
- Ko98 P. Kocher, J. Jaffe, D. Jun. Introduction
to differential Power Analysis and Related
attacks. 1998 - EG02 L. Eschenauer, V. D. Gligor. A
key-management scheme for distributed sensor
networks. 2002 - DDHV03 W. Du, J. Deng, Y. S. Han, P. K.
Varshney. A pairwise key pre-distribution for
wireless sensor networks. 2003. - CS05 D. Cvrcek, P. venda. Smart dust security
- Key Infection revisited. 2005 - SM07 P. venda, V. Matyá. Authenticated key
exchange with group support for wireless sensor
networks. 2007 - SSM09 P. venda, L. Sekanina, V. Matyá,
Evolutionary Design of Secrecy Amplification
Protocols for Wireless Sensor Networks, 2009 - YCLZ01 F. Ye, A. Chen, S. Lu, L. Zhang. A
scalable solutions to minimum cost forwarding in
large sensor networks. 2001 - BHSS03 B. Blum, T. He, S. Son, J. Stankovic.
IGF A state-free robust communication protocol
for wireless sensor networks. 2003
25Thank you for your attention.
26(No Transcript)
27How probabilistic pre-distribution fails
28Overview
- Basic introduction to WSNs
- and differences from classical networks
- Need for novel security solutions
- probabilistic pre-distribution
- Key Infection
- Automated approaches welcome
- Automated search for attacks
29Node capture resilience cohesion
Node capture resilience
ring size (30 - 500)
net. density (7-40)
key sharing probability
compromised fraction of pool
pool size (103 -107)
connectable neighbors (3-40)
captured nodes (100-104)
- Increasing ring size moderately allows to
increase pool size highly - resulting node capture resilience is better
- Idea behind hypercube LN03, group supported
SM07 extensions - different assumptions about network topology and
compromise knowledge
30Automatic attack strategy concept
- Inspired by ability of EA to find our own bugs
- Knowing attacks allows us to build better
defenses - fruitful even if we cannot prove that no attack
against system exits - Categories of generated attacks
- re-combination of the existing attacks
- put existing attacks together in meaningful order
- e.g., capture packet, forge IP, replay packet
- improvement (optimization) of known attack
strategy - principle is known, tuning of parameters
- e.g., which subset of nodes should be captured
- finding novel attack strategies
- attacks composed from very simple actions
- e.g., set/store byte X of message, transmit Y
millisec., - Attack generator and execution environment
31Attack 2 Malicious routing
- Misbehaving attacker nodes
- search for attacks against standard routing
- fitness options non-delivered messages, message
hops, messages routed over malicious node, ... - elementary actions store/load value, send
message, time counters - triggers of response code on specific action
- Multiple network deployments
- partly avoids optimization of a strategy on a
single topology - Usually hard to analyze
- complex behavior and interleaving of elementary
actions - pruning - actions without impact on fitness are
discarded - still, we were unable to fully interpret all
details
32Attack 1 Selective node capture
- Probabilistic pre-distribution with overlapping
key sets - Attacker goes for maximum advantage with fixed
number of captured nodes - compromised links, carried keys, impact on data
aggregation, - with information about actual deployment
- Example attack settings
- probabilistic pre-distribution (3 keys at
minimum) - secrecy amplification protocol run atop
- Compared for several deterministic algorithms
33Selective node capture - results