A Collusion Attack on Pairwise Key Presdistribution Schemes for - - PowerPoint PPT Presentation

a collusion attack on pairwise key presdistribution
SMART_READER_LITE
LIVE PREVIEW

A Collusion Attack on Pairwise Key Presdistribution Schemes for - - PowerPoint PPT Presentation

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions A Collusion Attack on Pairwise Key Presdistribution Schemes for Distributed Sensor Networks Tyler W Moore University of Cambridge Computer


slide-1
SLIDE 1

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

A Collusion Attack on Pairwise Key Presdistribution Schemes for Distributed Sensor Networks

Tyler W Moore

University of Cambridge Computer Laboratory

IEEE Workshop on Pervasive Computing and Communications Security 2006 Pisa, Italy

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-2
SLIDE 2

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Introduction

Key predistribution schemes considered the safest way to bootstrap trust in a sensor network Main drawback: high storage overhead Key predistribution can actually be quite insecure

Many pre-loaded global secrets strengthen attacker incentive Localised communication helps hide misbehaviour

We describe an attack where colluding nodes reuse selected pairwise keys to create many false identities and hijack majority of communications

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-3
SLIDE 3

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Bootstrapping a sensor network

Constraints for establishing secure communication

Sensors deployed in hostile environments ⇒ global passive adversary No tamper-resistant hardware ⇒ several corrupt nodes Network topology unknown prior to deployment No access to centralised server, trusted third party, etc.

Solution

Assign keys to nodes in advance Must balance security against storage and computing limitations of sensors

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-4
SLIDE 4

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Options for predistributing keys

Single master key predistribution

Inexpensive but susceptible to single compromise

Pairwise key predistribution

Resilient to widespread compromise but storage infeasible for large networks (requires n − 1 keys per node)

Random key predistribution (Eschenauer & Gligor CCS 2002)

Nodes are assigned a random subset of keys from a large key space If nodes share a common key, then a link can be established Probabilistic guarantees based on random graph theory Efficient, though fails badly when a small group of nodes are compromised

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-5
SLIDE 5

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Options for predistributing keys (ctd.)

Random pairwise scheme (Chan et al. IEEE S&P 2003)

Combines the random graph approach with pairwise key assignment More efficient than pure pairwise scheme, but requires much more storage than EG 2003 (each node typically stores between 0.2n and 0.4n keys, depending on parameters) No duplicate keys, so secure against eavesdropping attacks Authors claim that pairwise key assignment enables mutual authentication at no added cost

But is it secure from a colluding attacker?

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-6
SLIDE 6

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Notation and system parameters

Notation

n: Network size n′: expected number of neighbour nodes in radio range p: probability of two nodes sharing a pairwise key N(d): set of neighbours of node d U(d): set of usable pairwise keys for node d

System model

Nodes have limited communication radius Nodes distributed uniformly across a space Nodes pre-loaded with n ∗ p pairwise keys Nodes broadcast their identifiers to neighbours, who check ID to see if they share a pairwise key

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-7
SLIDE 7

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Attack preconditions

Threat model

Attacker compromises a set of nodes A, q = |A|, obtaining keys and controlling all communications Attacker nodes may collude across network via existing routing mechanism or an out-of-band channel Attack targets the integrity and availability of communications

Weaknesses of key predistribution

Many more secrets pre-loaded than actually used for communication (n ∗ p >> n′) Sensors have localised interactions, but global key assignment

Key insight: colluding attackers can exploit latent secrets and communication gaps

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-8
SLIDE 8

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Attack description

Consider two nodes controlled by an attacker, a, b ∈ A

a tells b its secrets b masquerades as a to all of b’s neighbours that a shares a pairwise key with, and vice versa Repeat for all pairs of nodes in A

As more nodes are compromised, more keys can be reused Like a Sybil attack (each node presents multiple identities) Like a node replication attack (multiple copies of same node) Attacker nodes pretend to be different nodes to different neighbours

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-9
SLIDE 9

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Example attack

kah c a d e g b h f i kbe kag legitimate pairwise key colluding pairwise key kag Independence Collusion U(a) {kad} {kad, kbe} U(b) {kbh, kbi} {kbh, kbi, kag, kah}

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-10
SLIDE 10

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Overlap

a b c d e

Only one of nodes a and c should masquerade as b to node e Node c gains nothing by pretending to be a to d Overlap unavoidable as q → n

n′

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-11
SLIDE 11

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Attack Discussion

Integrity, availability of communications targeted, not confidentiality

Many false channels can overwhelm legitimate ones Authentication based on pairwise key possession inadequate Node revocation, redundant routing schemes undermined

Attack variables

Coordination levels: ratio n′

n between average node

neighbourhood and network size Key storage: as p increases, more secrets can be exploited

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-12
SLIDE 12

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Impact Analysis & Measurement

We focus on the number of usable pairwise secret keys available to an attacker

A pairwise key is usable if it is shared between nodes in communication range and it is not already in use within this range

Attack Metrics

Number of usable pairwise keys available to a colluding attacker Ratio of usable keys for attacker to keys available to attacker’s neighbours

Simulations

Nodes uniformly distributed over a plane n = 1000, n′ = 60, p = .25 and varied q, averaging results from 20 rounds

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-13
SLIDE 13

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Increased usable pairwise keys

.02 .04 .06 .08 .10 5,000 10,000 15,000 20,000 25,000 fraction of attacker nodes usable pairwise keys .005 .01 .015 .02 1000 2000 3000 4000 fraction of attacker nodes independence collusion

Measures

a∈A |U(a)| for increasing q

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-14
SLIDE 14

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Per-node usable pairwise keys

.01 .02 .03 .04 .05 .06 .07 .08 .09 .10 50 100 150 200 250 fraction of attacker−controlled nodes pairwise keys independence collusion

As q grows large, each colluding node can establish n ∗ p fake communication channels

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-15
SLIDE 15

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Quantifying attacker penetration

But what is the overall impact of a collusion attack? I(A) =

  • a∈A |U(a)|
  • a∈A
  • b∈N(a) |U(b)|

I(A) compares the number of usable pairwise keys available to an attacker to the keys available to attacker-controlled nodes’ neighbours I(A) reveals the fraction of working communication channels controlled by the attacker

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-16
SLIDE 16

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Quantifying attacker penetration (ctd.)

.01 .02 .03 .04 .05 .06 .07 .08 .09 .10 0.1 0.2 0.3 0.4 0.5 0.6 0.7 fraction of attacker−controlled nodes fraction of usable pairwise keys independence collusion

Corrupting 5% of nodes grants power to half of communication channels Any application requiring honest interaction with majority of neighbours is susceptible

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-17
SLIDE 17

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Storage requirements

How can colluding nodes actually store extra keys?

n ∗ p keys predistributed Up to n ∗ p additional keys from collusion Storing twice as many keys is too onerous

Attack optimisation

Pairwise keys can only be used once by definition After a node shares a pairwise key with another attacker-controlled node, it can delete the key and replace it with keys from the other node So key-sharing becomes key-swapping Attacker nodes still store no more than n ∗ p keys

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-18
SLIDE 18

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Countermeasures

Reduce value of compromised nodes to attackers

Discard unused keys after initialisation phase

No new nodes may join after initialisation

Reduce the number of pre-loaded keys

Exploit geographical proximity (topology foreknowledge) Key infection (weaker attacker model)

Detection mechanisms

Count connected neighbours

For normal usage, should share keys with n′ ∗ p neighbours Attacked node may have up to q ∗ p more Identifying which neighbours are lying is difficult

Require nodes to transmit locations

Key reuse may be detected if nodes recursively ask neighbours for nodes’ locations (Parno et al. 2005) Location broadcast identifies new targets Significant storage and transmission costs

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution

slide-19
SLIDE 19

Introduction & background Key-swapping collusion attack Analysis Discussion & Conclusions

Conclusions

We have presented a collusion attack on the class of pairwise key predistribution schemes Small fraction of compromised nodes required to control majority of communication channels We question the wisdom of assigning global secrets to locally-communicating nodes More research is needed for pairing limited secrets to localised interactions For more, visit http://www.cl.cam.ac.uk/~twm29/

Tyler W Moore A Collusion Attack on Pairwise Key Predistribution