an overview of trust naming and addressing and
play

An overview of Trust, Naming and Addressing and Establishment of - PowerPoint PPT Presentation

An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models; naming and addressing; key establishment in sensor networks; key establishment in ad hoc


  1. An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; • attacker models; • naming and addressing; • key establishment in • sensor networks; key establishment in ad • hoc networks exploiting  physical contact  node mobility  vicinity Security and Cooperation in Wireless Networks Georg-August University Göttingen

  2. Trust Trust: The belief that another party will behave according to a set of well-  established rules and thus meet one’s expectations. The trust model of current wireless networks is rather simple  – subscriber – service provider model – subscribers trust the service provider for providing the service, charging correctly, and not misusing transactional data – service providers usually do not trust subscribers, and use security measures to prevent or detect fraud In the upcoming wireless networks the trust model will be much more complex  – entities play multiple roles (users can become service providers) – number of service providers will dramatically increase – user – service provider relationships will become transient – how to build up trust in such a volatile and dynamic environment? Georg-August University Göttingen 1 Trust, Naming and Addressing and Establishment of security associations

  3. Reasons to trust organizations and individuals Moral values  – Culture + education, fear of bad reputation Experience about a given party  – Based on previous interactions Rule enforcement organization  – E.g. police or spectrum regulator Usual behavior  – Based on statistical observation Rule enforcement mechanisms  – Prevent malicious behavior by appropriate security mechanisms and encourage cooperative behavior – It is much easier to encrypt the communication than to deploy police force everywhere to check that no one is eavesdropping Georg-August University Göttingen 2 Trust, Naming and Addressing and Establishment of security associations

  4. Trust vs. security and cooperation  trust pre-exists security – all security mechanisms require some level of trust in various components of the system – E.g. if I trust that my computer is not compromised and the security mechanisms I am using is not (yet) broken --> then I can do my online transactions with the legitimate belief of not being defrauded.  cooperation reinforces trust – trust is about the ability to predict the behavior of another party – I see the other party’s cooperative behavior --> so I would believe that she will continue being cooperative --> this encourages me to be cooperative --> she will trust in me Georg-August University Göttingen 3 Trust, Naming and Addressing and Establishment of security associations

  5. Misbehaviors: Malice and selfishness Malice: willingness to do harm no matter what  Selfishness: overuse of common resources (network, radio spectrum,  etc.) for one’s own benefit A misbehavior consists in deliberately departing from the prescribed  behavior in order to reach a specific goal A misbehavior is selfish (or greedy, or strategic) if it aims at obtaining an  advantage that can be quantitatively expressed in the units (bitrate, joules, or coverage) or in a related incentive system (e.g., micropayments); any other misbehavior is considered to be malicious.  traditionally, security is concerned only with malice  but in the future, malice and selfishness must be considered jointly if we want to seriously protect wireless networks Georg-August University Göttingen 4 Trust, Naming and Addressing and Establishment of security associations

  6. Who is malicious? Who is selfish?  Examples of malice and selfish behavior: • A technique aiming at increasing one’s share of the bandwidth (in general at the expense of other users) is selfish. • An attack aiming at obtaining information about another user of the network is malicious. • The attack aiming at dropping another node’s packets in order to save own power is selfish. Security mechanisms: to thwart malicious behavior Game theory: to model and prevent selfish behavior There is no watertight boundary between malice and selfishness  Both security and game theory approaches can be useful Georg-August University Göttingen 5 Trust, Naming and Addressing and Establishment of security associations

  7. Naming and Addressing naming and addressing are fundamental for networking  – notably, routing protocols need addresses to route packets – services need names in order to be identifiable, discoverable, and useable attacks against naming and addressing  – address stealing • adversary starts using an address already assigned to and used by a legitimate node – Sybil attack • a single adversarial node uses several invented addresses • makes legitimate nodes believe that there are many other nodes around – node replication attack • dual of the Sybil attack • the adversary introduces replicas of a single compromised node using the same address at different locations of the network Georg-August University Göttingen 6 Trust, Naming and Addressing and Establishment of security associations

  8. Illustration of the Sybil and node replication attacks Z Y D C B Sybil nodes A X E I C F A X G X B D H J replicated nodes Georg-August University Göttingen 7 Trust, Naming and Addressing and Establishment of security associations

  9. Cryptographically Generated Addresses (CGA)  aims at preventing address stealing  general idea: – generate node address from a public key – corresponding private key is known only by the legitimate node – prove ownership of the address by proving knowledge of the private key  example in case of IPv6: Georg-August University Göttingen 8 Trust, Naming and Addressing and Establishment of security associations

  10. Thwarting the Sybil attack  note that CGAs do prevent an attacker from stealing or spoofing an address already chosen by another node  CGAs do not prevent the Sybil attack – an adversary can still generate addresses for herself  a solution based on a central and trusted authority – the central authority vouches for the one-to-one mapping between an address and a device – e.g., a server can respond to requests concerning the legitimacy of a given address  other solutions take advantage of some physical aspects – e.g., identify the same device (when it is using a new fake address) based on radio fingerprinting or using geographic location Georg-August University Göttingen 9 Trust, Naming and Addressing and Establishment of security associations

  11. Thwarting the node replication attack (1/2)  a centralized solution – each node reports its neighbors’ claimed locations to a central authority (e.g., the base station in sensor networks) – the central authority detects if the same address appears at two different locations – assumes location awareness of the nodes A D E A @ (x2, y2) A base C station A @ (x1, y1) B Georg-August University Göttingen 10 Trust, Naming and Addressing and Establishment of security associations

  12. Thwarting the node replication attack (2/2)  a decentralized variant – neighbors’ claimed location is forwarded to witnesses – witnesses are randomly selected nodes of the network – if a witness detects the same address appearing at two different locations then it broadcast this information and the replicated nodes are revoked Georg-August University Göttingen 11 Trust, Naming and Addressing and Establishment of security associations

  13. Analysis of the decentralized variant total number of nodes in the network is n  average number of neighbors is d (network degree)  A broadcasts its location to its neighbors  each neighbor of A forwards A’s location claim with probability p to g  randomly selected witnesses average number of witnesses receiving A’s location claim is p.d.g  Assume the attacker inserts L replicas of node A  The probability that p.d.g recipients of claim l1 do not receive any of the  p.d.g copies of claim l2 is: P nc1 =(1-(p.d.g)/n) (p.d.g) The probability that the 2 p*d*g recipients of claims l1 and l2 do not  receive any of the p.d.g copies of claim l3 is: P nc2 =(1-(2p.d.g)/n) (p.d.g) In the same way, the probability of no collisions is:  P nc = П (1-(i.p.d.g)/n) (p.d.g) (1 <= i <= (L-1)) Using (1+x)<=e^x we have: P nc <=exp( - L(L-1)(p.d.g) 2 / 2n) Georg-August University Göttingen 12 Trust, Naming and Addressing and Establishment of security associations

  14. Analysis of the decentralized variant  then for the probability of detection: (1- P nc =)P det > 1 – exp( - L(L-1)(p.d.g) 2 / 2n)  numerical example: n = 10000, d = 20, g = 100, p = 0.5 L = 2  P det ~ 0.63 L = 3  P det ~ 0.95 Georg-August University Göttingen 13 Trust, Naming and Addressing and Establishment of security associations

  15. Establishment of security associations: Outline Key establishment in sensor networks Exploiting physical contact Exploiting mobility Exploiting the properties of vicinity and of the radio link Georg-August University Göttingen 14 Trust, Naming and Addressing and Establishment of security associations

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend