Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A....

14
Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign Annual Computer Security Applications Conference (ACSAC) Dec 9, 2011

Transcript of Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A....

Page 1: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

Reliable Telemetry in White Spaces usingRemote Attestation

Omid Fatemieh, Michael D. LeMay, Carl A. Gunter

University of Illinois at Urbana-Champaign

Annual Computer Security Applications Conference (ACSAC)Dec 9, 2011

Page 2: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Spectrum crunch– Increased demand– Limited supply – Inefficiencies of fixed and long term spectrum assignment (licenses)

• Emerging solution: opportunistic access to unused portions of licensed bands

Opportunistic Spectrum Access

2

Page 3: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Spectrum crunch– Increased demand– Limited supply – Inefficiencies of fixed and long term spectrum assignment (licenses)

• Emerging solution: opportunistic access to WHITE SPACES

• Cognitive Radio: A radio that interacts with the environment and changes its transmitter parameters accordingly

Opportunistic Spectrum Access

3

Primary TransmitterPrimary ReceiverSecondary Transmitter/Receiver(Cognitive Radio)

Page 4: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Allowed by FCC in Nov 2008 (and Sep 2010)– TV White Spaces: unused TV channels 2-51 (54 MHz-698MHz)– Much spectrum freed up in transition to Digital Television (DTV) in 2009– Excellent penetration and range properties

• Applications– Super Wi-Fi– Campus-wide Internet– Rural broadband

(e.g. Claudville, VA)– Advanced Meter

Infrastructure (AMI) [FatemiehCG – ISRCS ‘10]

White Space Networks

4

Page 5: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Spectrum Sensing – Energy Detection– Requires sensing-capable devices -> cognitive radios– Signal is variable due to terrain, shadowing and fading– Sensing is challenging at low thresholds

• Central aggregation of spectrum measurement data– Base station (e.g. IEEE 802.22)– Spectrum availability database (required by the FCC)

How to Identify Unused Spectrum?

No-talk Region for Primary Transmitter

5

Collaborative Sensing

Page 6: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Malicious misreporting attacks– Exploitation: falsely declare a frequency occupied – Vandalism: falsely declare a frequency free

• Why challenging to detect?– Spatial variations of primary

signal due to signal attenuation– Natural differences due to

shadow-fading, etc.– Temporal variations of primary– Compromised nodes may collude

and employ smart strategies to hide under legitimate variations

• How to defend against such coordinated/omniscient attackers?

Malicious Misreporting Attacks

6

Compromised Secondary – Vandalism Compromised Secondary – Exploitation

Page 7: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

Limitations of Previous Work

7

• Initially assume all sensors are equal• Rely only on comparing measurements

• Shadow-fading correlation filters for abnormality detection [MinSH – ICNP ‘09]• Model-based (statistical) outlier detection [FatemiehCG – DySPAN ‘10]• Data-based (classification) attacker detection [FatemiehFCG – NDSS ‘11]

• Resulting drawback: attacker penetration has to be significantly limited for solutions to work

• What if we can have a subset of “super-nodes"?

Page 8: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

A Subset of Trusted Nodes

8

• Remote attestation: A technique to provide certified information about software, firmware, or configuration to a remote party– Detect compromise– Establish trust

• Root of trust for remote attestation– Trusted hardware: TPM on PCs or MTM on mobile devices– Software on chip [LeMayG - ESORICS ‘09]

• Why a subset?– Low penetration among volunteer nodes– Cost: manufacturing, energy, time, bandwidth (see paper for numbers)

Attestation-Capable System

Remote Server

Nonce

Signed[Nonce || System State]

Page 9: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Goal: obtain an estimate of signal power in any cell to compare to threshold

• Cell A: Safety or precision?• Cells B and C: How many regular

nodes to include? Which ones?• Steps

1. A systematic strategy to determine when there is enough data

2. If we need additional data, which ones to add to aggregation pool?

3. Ensure pool not attacker-dominated

Key Observations

9

A B C

Attested Node Regular Node

Page 10: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Sequential intra-cell node selection– Include all attested nodes– Include regular nodes until a

precision goal is met

• Precision goal: Ensure margin of error for aggregate smaller than requirements (e.g. 3dB) with high confidence (e.g. 95%) (unknown distribution)– Mean: Asymptotically efficient

Chow-Robbins sequential procedure:– Median: Find a and b (order statistics):

Intra-cell Node Selection

10

Page 11: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Last step: Classification-basedinter-cell attacker detection– If detected: only use attested data in E

• Median as aggregate:– (+) Less vulnerable to legitimate

variations or minority attackers– (-) Achieving the required precision

requires more data– (-) Majority attackers can move

median while being less ‘abnormal’

• Aggregate: median when attested majority, and mean otherwise

Classification-based inter-cell detection

11

Page 12: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

Evaluation

12

• Hilly Southwest Pennsylvania • TV transmitter data from FCC• Terrain data from NASA • Ground truth: predicted signal

propagation using empirical Longley-Rice model

• Takes into account:– Transmitter power, location,

height, frequency– Terrain and distance

• Added aggressive log-normal shadow-fading variations• Used data to build classifier and evaluate protection against attacks

Page 13: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

Results

13

False Outcome Rate Attack Deterrence Rate(Attested fraction ≈ .25)

Page 14: Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.

• Showed how to use a small subset attestation-capable nodes to improve trustworthiness of distributed sensing results.

• Proposed methods:– Provide quantifiably precise results.– Provide effective protection against attacks with small fraction of attested nodes.– Can lower attestation costs for real deployment.

• Future direction: Developing a framework for formulating costs associated with including regular and attested nodes, and systematically striking a balance between the costs (from spectrum data aggregation and remote attestation) and obtaining precise aggregation results.

Conclusions and Future Work

14