Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of...

17
Security in Wireless Ecosystems Security in Wireless Ecosystems Wade Trappe

Transcript of Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of...

Page 1: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

Security in Wireless Ecosystems Security in Wireless Ecosystems

Wade Trappe

Page 2: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Wireless Ecosystems represent the next generation of Wireless Ecosystems represent the next generation of pervasive computing systemspervasive computing systems

Integrating the physical world with the Internet– Ability to view, search and interact with the physical world– Pervasively deployed mobile and embedded computing devices

A set of evolving ”wireless ecosystems” emerge– Weaving information into the fabric of human lives

Characteristics of pervasive ecosystems– 10s of billions of wireless devices connected to the global network– Scale is 2 orders of magnitude greater than today’s internet– Licensed and Unlicensed Spectrum– New challenges in enabling technologies, system architecture and human-centric design

Communications/Networking with Cognitive Radios– Design of hierarchical, distributed, decentralized and adaptive protocols– Spectrum Coexistence in dense wireless networks– Efficient integration with the future internet

Security and Privacy– Personal nature of use of technologies– Ubiquitous nature of use of technologies

Page 3: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

[3] WINLAB

Vehicles with Sensors & Wireless

Hospital with Embedded Monitoring

Robotics Application

Smart Public Space

Autonomous Wireless Clusters(“ecosystems”)

Physical World with Embedded Wireless

Network Connectivity& Computation

Autonomous software agents

Application Management & Control Software

Control Module

Control Module“Human in the Loop”

From Sensors

Virtualized physicalworld object

Content & LocationAware Routers

Computation& Storage

Protocolmodule

Ambient interfaces

Cognitive Intelligence Module

Global Pervasive Network(Future Internet)

Multiple radio standards,Cognitive radios

To Actuators

Wireless Ecosystems represent the next generation of Wireless Ecosystems represent the next generation of pervasive computing systemspervasive computing systems

Page 4: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Spectrum Policy–

Economics–

Regulation–

Legal–

Business

Cooperative Communications–

Information & Coding Theory–

Statistical Signal Processing–

Game Theory/Microeconomics–

MAC & Networking Algorithms

Platforms/Prototypes–

WiNC2R Programmable agile radios

GNU platforms–

Cognitive Radio Network Testbeds

Spectrum Policy Server

rate4

rate1

rate2 rate3

“Wireless Ecosystems”

Wireless Ecosystems are a multiWireless Ecosystems are a multi--dimensional activity dimensional activity at WINLABat WINLAB

Page 5: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Confidentiality Wireless is easy to sniff. We still need encryption services and key management. Key freshness is an issue.

Integrity Wireless hardware/equipment need to be safe from modification. Data/control info should not be modified before or during transit.

Forensics Wireless networks will be the platform of choice for attacks. Should the network keep track of forensic evidence?

Privacy Perpetual connectivity can mean constant surveillance! With snooping one can monitor mobility and handoffs between networks.

Location Location is a new form of information provided by wireless systems that will facilitate new services. Location information needs to be trusted.

Intrusion The pervasiveness of the wireless networks should not mean that just anyone can participate! Example: Rogue APs

Availability The value of a wireless network is its promise of ubiquitous connectivity. Unfortunately, wireless networks are easy to “break” (e.g. jam, denial of service)

Non-repudiation RF energy radiates, and wireless entities within the radio coverage pattern may serve as witnesses for the actions of the transmitter.

WINLAB has a holistic approach to addressing security WINLAB has a holistic approach to addressing security issues in emerging wireless systemsissues in emerging wireless systems

Page 6: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Security can be achieved by exploiting unique properties of Security can be achieved by exploiting unique properties of the wireless physical layer (SEVILLE)the wireless physical layer (SEVILLE)

Wireless channels are “open” and hence more susceptible to eavesdropping, intrusion and spoofing…Interestingly, wireless channel properties (“RF signatures”) can be exploited for authentication and to identify attackersProject on protocols and algorithms for security functions; also experimental validation

Page 7: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Use channel reciprocity to build highly correlated data sets

– Probe the channel in each direction– Estimate channel using recd. probe

Eve receives only uncorrelated information as she is more than λ/2 away Level crossings are used to generate bitsAlice and Bob must exchange msgs over public channel to create identical bitsWhat if channel is not already authenticated?

– Requires additional sophistry to prevent man-in-the-middle attack.

– It is possible using the correlated data collected from received probes.

PROBE

PROBE

PROBE

Get channel estimates

Locations of excursions

Locations in agreement

Key Key

Positive excursion

Negative excursion

SEVILLE exploits the physical layer to achieve new forms of SEVILLE exploits the physical layer to achieve new forms of key establishmentkey establishment

Page 8: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Experimental setup:– Alice = AP – Bob = Client– Eve = Client on same channel

Alice Bob: PING REQUEST Bob Alice: PING REPLY20 packets per secondEve overhears packets from both legitimate users(RSSI, timestamp) from recd. packet headers are pulled out by each userMesg. exchange protocol uses the locations of excursions to distil identical bits~1 bit/sec in typical indoor environments with no errors.

Alice Eve

Bob Eve

Alice Bob

Bob Alice

Bob Alice

Alice Bob

SEVILLESEVILLE’’ss key establishment has been validated in real key establishment has been validated in real customized and COTS systemscustomized and COTS systems

Page 9: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Goal: to maintain wireless network connectivity in the presence of wireless interference (i.e. jamming)Strategies:

– Channel Surfing: Adapt network channel allocations in an on-demand manner– Spatial Retreats: Use mobility to evade interference sources and re-establish network connectivity– Anti-jamming Timing Channels: Failed packet reception events may be modulated to establish a

low-rate jamming resistant communication channel– Radio Teaming: A team of transmitters exploits multipath environments to perturb angular receiver

patterns, in spite of SINR levels of -10dB or worse.

(Effect of a jammer on a network of Chipcon

1100 Radios) (Channel Surfing adjusts channels to re-establishes the network)

DARWIN seeks to defend wireless networks from adversarial DARWIN seeks to defend wireless networks from adversarial wireless interferencewireless interference

Page 10: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Objective:Objective:–– Create a Create a low bitlow bit--rate overlayrate overlay that exists on that exists on

the conventional physical/linkthe conventional physical/link--layers layers in spite in spite ofof a broadband interferer.a broadband interferer.

Approach: Modulate the Approach: Modulate the interarrivalinterarrival time time between packet transmissions to convey between packet transmissions to convey informationinformation

–– Jammed packets are detectableJammed packets are detectable

time

……

t1 t2 t3 t4 t5 ti ti+1

τ1 τ2 τ3

τ4

τi

Network

Datalink

Physical

Network

Datalink

Physical

4Oz Overlay4Oz Overlay

Timing channel

Overlay Framing

Error Correct

Overlay Authent.

Virtual Bitpipe

Timing channel

Overlay Framing

Error Correct

Overlay Authent.

Virtual Bitpipe

Sender Receiver

Network

Datalink

Physical

Network

Datalink

Physical

4Oz Overlay4Oz Overlay

Timing channel

Overlay Framing

Error Correct

Overlay Authent.

Virtual Bitpipe

Timing channel

Overlay Framing

Error Correct

Overlay Authent.

Virtual Bitpipe

Sender ReceiverThe Timing Channel Overlay

A nonA non--jammablejammable timing channel remains when the physical timing channel remains when the physical layer is being jammedlayer is being jammed

Page 11: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Jammer

Jammer

Target

Receiver

Motivation:• Units moving through “urban canyons”

experience complex link quality conditions• Adversarial scenarios, involving jammers, further complicate conditions

Increasing transmit power may not

be an option…

Team solutions are needed• Can we do beamforming

or cooperative communications?• Can we utilize the “RF Clutter”

to convey information?

Communication is Jammed + Blocked

SINR = -15dB

“Help me!”

What’s this RF Clutter?

Radio transmitters can team to overcome radio interference Radio transmitters can team to overcome radio interference by nonby non--coherently perturbing receiver coherently perturbing receiver beampatternbeampattern

Page 12: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

MIAMI: MIAMI: MMobile obile IInfrastructures for nfrastructures for AAdvancing dvancing MMilitary ilitary IInformation Technologies involves security analysis of MIMOnformation Technologies involves security analysis of MIMO

DoD is reliant on wireless networks to support critical communications

– Mobile Ad Hoc Networks– Pervasive monitoring of valuable military

assets (such as artillery or food supplies)

MIAMI seeks to address issues of performance, adaptability and reliability for three different wireless scenarios

– Design of Active RFID Systems for Inventory Management.

– Development of a Protocol Architecture for Cognitive Radio Networks.

– Design and Evaluation of Military MIMO Systems.

Task-1 emphasis is on tactical MIMO systems– Modeling of MIMO channels– Integrating ray-tracing and MIMO channel

models with ns-2– Threat analysis of tactical MIMO radios

TARGET

high density, no mobility and low traffic zone

STAGE 1

Group 1

Group 2

Group 3low density, mobile and high traffic zone

STAGE 2

high density, low mobility and high traffic zone

STAGE 3

Initial meeting stage

Approaching the target

Congregation at the target

XTARGET

high density, no mobility and low traffic zone

STAGE 1

Group 1

Group 2

Group 3low density, mobile and high traffic zone

STAGE 2

high density, low mobility and high traffic zone

STAGE 3

TARGET

high density, no mobility and low traffic zone

STAGE 1

Group 1

Group 2

Group 3low density, mobile and high traffic zone

STAGE 2

high density, low mobility and high traffic zone

STAGE 3

Initial meeting stage

Approaching the target

Congregation at the target

X

Initial meeting stage

Approaching the target

Congregation at the target

X

Basic adversarial MIMO setting, where Eve seeks to interfere with Alice and Bob’s communication.

MIMO tactical scenarios will be integrated into a custom ns-2 simulator tool.

Page 13: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Expose the lower-layers of the protocol stack to researchers, developers and the “public”– scan the available spectrum, select from a wide range of operating frequencies– adjust modulation waveforms, perform adaptive resource allocation

An ideal platform for abuse since the lowest layers of the wireless protocol stack are accessible to programmers.

1. Poor programming: 1. CR protocols will be complex, it will be easy to write buggy implementations2. Runaway software processes…

2. Greedy exploitation:Decrease back-off window in an 802.11 (or comparable) implementationIgnore fairness in spectrum etiquette (many co-existence protocols assume honest participants, or honest data)

3. Simply Ignoring EtiquettePrimary user returns… so-what???

4. Economic/Game-theoretic ModelsStandard economic models for spectrum sharing seek to support cooperation– but cooperation does not ensure trusted operation!Security is an anti-social topic!

Cognitive Radios are an emerging wireless system with Cognitive Radios are an emerging wireless system with many potential security threatsmany potential security threats

Page 14: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

WINLAB is developing AUSTIN: WINLAB is developing AUSTIN: AAssssuuring ring SSoftware Radios oftware Radios have have TTrusted rusted InInteractionsteractions

Goal: to regulate the future radio environment, ensure trustworthy cognitive radio operation (Team: Rutgers, Virginia Tech, UMass)How — two complementary mechanisms – On-board enforcement – restrict any violation attempt from accessing the radio:

Each CR runs its own suite of spectrum etiquette protocolsOnboard policy checking verifies actions occur according to “spectrum laws”

– An external monitoring infrastructure:Distributed Spectrum Authority (DSA) — police agent observes the radio environmentDSA will punish CRs if violations are detected via authenticated kill commands.

Research

Page 15: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Approach:To address threats across all of the separate and interacting layers in the MANET, CARMEN involves a holistic suite of security mechanisms to assure proper operation of each layer. Some components that will be developed include:• PHY/Link-Layer Assurance:

Anti-jamming Channel Adaptation Methods will reconstruct network link connectivity to recover the network in the presence of interference• Routing-Layer Assurance: Multipath “Security Control” for Byzantine-Robust Forwarding will automatically re-allocate traffic around Byzantine nodes• Transport and Resource Assurance: Byzantine-Secure Accounting and Pin-pointing of Malicious Insiders will recognize when nodes utilize an unfair portion of system-wide network resources

CARMEN: A CARMEN: A CCollaborative, ollaborative, AAssurablessurable, and , and RReliable eliable MMobilobilee NNetwork for Tactical Operations addresses MANET securityetwork for Tactical Operations addresses MANET security

Video Surveillance Sensor Network

Forward Observer

Communications Satellite

Relay Alpha

Broadband Relay Bravo

Satellite Link

Enemy jammerblocks link to Bravo!

Alpha is captured by enemy, and becomes malicious!

Relay Charlie Enemy

FO Mission is to deliver Intel observations to Satellite.

Network must support multiple traffic types.

Innovative Technology:• The CARMEN effort is centered on a novel

architecture, involving a Secure Management Plane (SMP) that will support consistent and observable security control information across the entire MANET.

• Advantages of CARMEN-SMP: (1) may utilize a separate radio link, optimized for

reliability and radio range (not bandwidth).(2) provides a common method/framework for

exchanging security audit information; (3) separate out signaling from the

normal traffic/data plane (4) can be fed directly into trusted

computing components(5) Reduction in hops on control plane increases

provability of security for protocols

SMP

Data Plane

Implementation:The SMP is possible through a separate radio link optimized for reliability not bandwidth:• Possible on dual-radio nodes (e.g. multiple 802.11 interfaces, with SMP using low-rate, more resilient modulation)

•For single-radio nodes it is possible to implement as a TDMA-overlay on 802.11•Forward-looking vision: JTRS and other software radios can easily support multiple radio interfaces

Page 16: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Characteristics– Authenticate RREQs/RREPs/RERRs– Based on symmetric key cryptography– Public key cryptography is only used in initial bootstrap phase– Sequence #’s and hop counts are protected through the use of a one-way function– Route errors are protected through a variation of TESLA

Each node maintains 2 hash chains for itself to use– Authenticator hash chain– TESLA key chain

Authenticator Hash Chain: What basically happens is…– Each individual hop for each even sequence number should have a corresponding hash value– Odd sequence number only needs one hash value– Nodes who have an even sequence number have the corresponding next higher odd sequence number– Intermediate nodes cannot increase the sequence number or decrease the hop count

h0 ,h1 …,hn-2m-1 , …, hn-m-2 , hn-m-1 , hn-m ,hn-m+1 … ,hn-1 , hn

Generation

Seq#0 Seq#1

m+1

Seq#3Seq#2

m+1

Hop0 Hop1For RERRs

SEAR addresses known security weaknesses in secure AODV SEAR addresses known security weaknesses in secure AODV protocols (SAODV, ARAN)protocols (SAODV, ARAN)

Page 17: Security in Wireless Ecosystemswireless networks are easy to “break” (e.g. jam, denial of service) Non-repudiation. RF energy radiates, and wireless entities within the radio coverage

WINLAB

Rethink the RFID problem from bottom up using state-of-art technology

– Simple (cheap!) tags, sophisticated readers– Continuous inventory, not portals– Route to extreme miniaturization—works for items of all sizes

NSF STTR support and strong industry connections. – Initial target: jewelry supply/sales chain (Retail only:

~$50B/yr)

RFID tags only responds when queried.Easily shielded intentionally or by environment.Only “seen” when pass a portal

RFID tags are complex.Many have processors, memory, and other features.

Long life tags are passiveShort range, poor link qualityHigh power base stations (~5W each!)

MRTs announce their status continuously.User knows immediately when/where

they are moved.Network connectivity allows remote

access.MRTs only announce serial number

All other complexity is in the network and database.

Long life with active radioLong range, good link qualityPassive Basestations

MRT: MicroRadio

TagTMRFID: Radio Frequency IDentification

New Active RFID technology targets advancing stateNew Active RFID technology targets advancing state--ofof--the the art in inventory management with unique security issuesart in inventory management with unique security issues

Research