Ad Hoc Networks Mira Vrbaski [email protected]. Introduction Attacks and Treats in WSN Information...
-
Upload
barry-blake -
Category
Documents
-
view
222 -
download
3
Transcript of Ad Hoc Networks Mira Vrbaski [email protected]. Introduction Attacks and Treats in WSN Information...
![Page 2: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/2.jpg)
IntroductionAttacks and Treats in WSNInformation and node authenticationHolistic security approach and ISAQuiz – questions and answers
![Page 3: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/3.jpg)
IntroductionAttacks and Threats in WSNInformation and node authenticationHolistic security approach and ISAQuiz – questions and answers
![Page 4: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/4.jpg)
WSN applications are: deployed in military, national security... mission-critical tasks deployed in hostile environments more difficult to secure than in wired communication
networks, the Internet or MANETs (Wireless mobile ad hoc networks) due to the resource limitations of sensor nodes: Nodes can be physically removed by an adversary very easily Small storage Limited computational power
monitoring actively their surroundings, and it is often easy to deduce information other than the data monitored
open to packet injection by an adversary
![Page 5: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/5.jpg)
Monitoring patients conditions
Tracking medical equipments
Tracking patients Personal, confidential
and sensitive data Data and time accuracy
and reliability
![Page 6: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/6.jpg)
For example: Perimeter defence
![Page 7: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/7.jpg)
Battlefield sensor networks high security and real-time response to fast changing events
![Page 8: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/8.jpg)
security mechanisms directly impact system performance
strong need to develop a rigorous analytical framework for measuring the security-performance tradeoffs of arbitrary key distribution schemes
[2004] Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks –R. Kannan, L. Ray, A. Durresi and S. S. Iyengar security
performance
![Page 9: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/9.jpg)
Sensor motes (Field devices) – Field devices are mounted in the process and must me capable of routing packets on behalf of other devices.
Gateway – enables communication between the Host and field devices
Network Manager -configures the network, schedules, monitors and reports on the health of the network.
Security Manager – generates, stores and manages keys.
![Page 10: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/10.jpg)
The physical layer – determines frequency selection, carrier frequency generation, signal detection, and signal processing and data encryption.
The data link layer - requires multiplexing of data streams, data frame detection, medium access flow control and error control. It ensures reliable point-to-point and point-to-multipoint connections in a communication network.
The network layer - specifies the assignment of addresses and how packets are forwarded – Routing.
The transport layer - helps to maintain the flow of data if the sensor networks application requires it.
![Page 11: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/11.jpg)
IntroductionAttacks and Threats in WSNInformation and node authenticationHolistic security approach and ISAQuiz – questions and answers
![Page 12: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/12.jpg)
Each sensor network layer has specific attacks
Threats in Wireless Sensory Networks (WSN):Battery drainingNetwork control lossData leakage and ambiguity
![Page 13: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/13.jpg)
Some more common attacks:1. Node capture2. Sybil attack3. Cloning attack4. Wormhole5. Key interception6. Denial of Service - DoS7. Replay
![Page 14: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/14.jpg)
attacker picks out a node and runs any cryptanalysis on its material
leaks all secret materials, and/or
allows reconfiguration to serve attacker
captured
Leaks, serves attacker
![Page 15: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/15.jpg)
introduces multiple entities for a single node
does not gain hardware advantage
undermines protocols in the network (leader election, voting, etc)
aimed against trust and reputation systems
![Page 16: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/16.jpg)
inserts multiple physical nodes
provides hardware advantage
in hybrid approach, the malicious nodes gain their own identity
original node still functions -> attacker uses additional node with the same identity for own purposes
![Page 17: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/17.jpg)
In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them into the network.
The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems.
For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication.
![Page 18: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/18.jpg)
• Demonstration of a wormhole attack:• X and Y denote the wormhole
nodes connected through a long wormhole link. As a result of the attack, nodes connected through a long wormhole link. As a result of the attack, nodes in Area A consider nodes in Area B their neighbours and vice versa.
For example, traffic between nodes like a and e can now take a one-hop path via the wormhole instead of a multi-hop path. If the wormhole is placed carefully by the attacker and is long enough, it is easy to see that this link can attract a lot of routes.
![Page 19: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/19.jpg)
the key is compromised by physical extraction from the captured node, or
by breach in protocol the attacker can use a
powerful equipment (for example laptop)
threat to the communication and fake nodes
Captured node
receiver
Attacker modifies message
senderreceive
r
Powerful equipment
Attacker modifies message
![Page 20: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/20.jpg)
performs on protocols overloading with
unnecessary operations an attacker possesses
many cloned nodes can perform Distributed DoS-> difficult to localize and
lock out WSN – battery drainage ruined trust
![Page 21: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/21.jpg)
![Page 22: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/22.jpg)
IntroductionAttacks and Threats in WSNInformation and node authenticationHolistic security approach and ISAQuiz – questions and answers
![Page 23: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/23.jpg)
Shared authentication where the originator of the
information uses a secret to mark the data in a way that allows verification of data by any other owners of the secret
One common secret among all
leak from single party
Each communication pair owns unique secret exponential growth in
storage requirements
Originator S
Owner of the S
S
Owner of the S
S
Originator S1,
S2
Owner of the S1
S1
Owner of the S2
S2
![Page 24: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/24.jpg)
In node to node communication data can be substituted with other information
Can be alleviated with MAC – Message Authentication Code: Form of fingertip that can be
calculated by both communication parties.
Chaining protocols – set of chained data packages that are transmitted at different times.
The whole chain can be trusted if each element can be trusted.
Deferred disclosure – wait for key to understand the message
originator
receiver
1. MAC(M,K) where M-message, K-key
2. Give me K
3. Here is the K
originator
receiver
1. At t=t1 MAC(M,K) where M-message, K-key
2. At t=t2 K
![Page 25: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/25.jpg)
TESLAµTESLAHash-chained authenticationMerkele trees authentication
![Page 26: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/26.jpg)
TESLA protocol for broadcast authentication – data does not have to be authenticated at the moment of reception
For broadcast authentication
Sender can be associated with more powerful base node
Responsibility shift to sender
sender receiverMAC(r)
MAC temporarily accepted and stored in receiver bufferMAC generated using value r, known only by sender
t>timeout r NOT received => drop all MACs
r r r rt packets
![Page 27: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/27.jpg)
Takes in consideration ad-hoc nature of WSN Allows bootstrapping of a new receiver at any time To join the network a node needs to verify the
authentication of one, any already used key from sender’s key chain and get loosely time synchronized.
![Page 28: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/28.jpg)
ALPHA protocol:• Sender S choose random ho
and computes h1, h2 ... hn
• n depends on storage capacity• Each result is stored in
memory, hn made known to receiver R
• That means if R knows hi can calculate hi-1 by H(hi-1) = hi
Good for: broadcasting protocols unwanted traffic dropped
at the very first relaying node ->saves bandwidth
network protection against overloading
Bad for: memory size linear f(n)
where n-number of signatures
S R
S1(MAC(hi-1|| M)) sends MAC and hi-1
A1(hi,hjR) acknowledges with hi and hjR
S2(hi-1,M)
hi=H(hi-1)
![Page 29: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/29.jpg)
Merkele tree MT is a plain binary tree Limits required memory size to log(n) where n is number of
leaves in the tree
r=H(hi-1||no||n1)
![Page 30: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/30.jpg)
Each entity has two keys: Secret key to be used for
authentication Publically known for
verification by the information recipient
Existing problems: Availability of public keys Dealing with compromised
secret keys Complex system Large numbers-> storage
problems
requester
originator
1. Request signed
2. message
![Page 31: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/31.jpg)
Rabin schemaDiffie –Hellman key exchange
![Page 32: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/32.jpg)
Data sent from sensor to more powerful base station, the base station utilized this disproportion and applied similar asymmetric operation to assure security of data.
Very effective method for encryption and signature verification.
Private key is a pair of large distinct primes (p, q)
Public key is their product n=pq
Decryption complex requires p and q
Sensing network
Base station
Gathered encrypted data
Authenticated commands
c= M²modnM=√cmodp
q
![Page 33: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/33.jpg)
Allows two nodes communication in open text to agree on a common secret
Two parameters publicly known: the generator g and prime modulus p.
A calculate Xa and send to B, a is a secret number of A
B calculate Xb and send to A, b is a secret number of B
A B
![Page 34: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/34.jpg)
IntroductionAttacks and Threats in WSNInformation and node authenticationHolistic security approach and ISAQuiz – questions and answers
![Page 35: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/35.jpg)
Advantages: Easy to develop Protocols of different layer
can be modified independently
Reducing inter layer interaction
Disadvantages: Redundant security (waste
of system resources) Lack of self adaptive
services De-integrated solution Cost and energy effective
![Page 36: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/36.jpg)
Cross layer security Routing energy efficient
(network layer), minimize number of packets, retransmission (link layer) and put energy transceivers on/off.
Key management schemas make sure that all nodes possess required keys and packets reach destination.
![Page 37: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/37.jpg)
1. Przmyslaw Blaskiewicz, Miroslaw Kutylowski “Security and Trust in Sensor Networks”
2. Hemanta Kumar Kalita1 and Avijit Kar “Wireless sensor network security analyzes” 2009
3. T.Kavitha, D.Sridharan “Security Vulnerabilities in Wireless in Sensor Networks: Survey”
4. Adrian Perrig, John Stankovic, and David Wagner “Security in Wireless Sensor Networks”
5. Kuldeep, Kalpana Sharma and M.K. Ghose “Wireless Sensor Networks Security: A New Approach”
6. Peng Ning and Donggang Liu “Broadcast Authentication and Key Management for Secure Sensor Networks”, north Carolina State University, Raleigh, North Carolina
7. Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi and John Pinkston “Security for Sensor Networks”
8. R. Kannan, L. Ray, A. Durresi and S. S. Iyengar ”Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks”
9. Ritesh Maheshwari, Jie Gao and Samir R Das Department of Computer Science, Stony Brook University “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information”
10. Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, and David B. Johnson, Member, IEEE“Wormhole Attacks in Wireless Networks”
![Page 38: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/38.jpg)
IntroductionAttacks and Threats in WSNInformation and node authenticationKey managementHolistic security approach and ISAQuiz – questions and answers
![Page 39: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/39.jpg)
[Q1]Shared authentication can be done in two ways: one common secret among all and each pair shares its own secret. Explain the advantages and disadvantages of both approaches taking in consideration WSN limitations. (draw the picture)
[A1] One common secret among all:[disadvantage: leak from single party], [advantage: small number of keys]
Each communication pair owns a unique secret:[disadvantage: exponential growth in storage requirements],[advantage: more security]
![Page 40: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/40.jpg)
[Q1]Explain how a wormhole attack occurs and the threats that attack produces
[A1] In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network.
The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems.
For example, traffic between nodes like a and e can now take a one-hop path via the wormhole instead of a multi-hop path. If the wormhole is placed carefully by the attacker and is long enough, it is easy to see that this link can attract a lot of routes.
![Page 41: Ad Hoc Networks Mira Vrbaski mvrbaski@gmail.com. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach.](https://reader038.fdocuments.in/reader038/viewer/2022103023/56649dff5503460f94ae85c5/html5/thumbnails/41.jpg)
Explain how the Diffie-Hellman key exchange protocol works. Explain and show calculations if prime numbers are given: p=3 and g=2.