Inte Integrating Subjectiv grating Subjective T Trust into ust - - PowerPoint PPT Presentation

inte integrating subjectiv grating subjective t trust
SMART_READER_LITE
LIVE PREVIEW

Inte Integrating Subjectiv grating Subjective T Trust into ust - - PowerPoint PPT Presentation

Inte Integrating Subjectiv grating Subjective T Trust into ust into Netw Network orked Infrastructures d Infrastructures Mark D. Heileman, Ph.D., Modus Operandi, Inc. Gregory L. Heileman, Ph.D., AHS Engineering Services Jong S. Hwang, Air


slide-1
SLIDE 1

Inte Integrating Subjectiv grating Subjective T Trust into ust into Netw Network

  • rked Infrastructures

d Infrastructures

Mark D. Heileman, Ph.D., Modus Operandi, Inc. Gregory L. Heileman, Ph.D., AHS Engineering Services Jong S. Hwang, Air Force Research Laboratory P d f SSTC 2009 22 A il 2009 Prepared for SSTC 2009 – 22 April 2009

SSTC 2009 Slide 1 of 32

slide-2
SLIDE 2

Acknowledgements

The information presented is the result of work on a Small Business Innovation Research (SBIR) Phase I project. This work was funded in whole or in part by Department of the Air Force C FA8650 08 M 1441 Contract FA8650-08-M-1441. The Air Force Research Laboratory’s Distributed Collaborative Sensor System Technology Branch (AFRL/RYTC) personnel provided guidance and support for the project support for the project.

SSTC 2009 Slide 2 of 32

slide-3
SLIDE 3

Presentation Agenda

Objectives Progress Requirements Demonstrations Recommendations Discussion

What we were trying to solve (Objectives). What we did (Progress). What the results were (Requirements). How we did it (Demonstrations). What we learned from the project What we learned from the project (Recommendations). Questions and comments (Discussion).

SSTC 2009 Slide 3 of 32

slide-4
SLIDE 4

OSD08-IA4: Assuring Trust between the Edges

Objectives Progress Requirements Demonstrations Recommendations Discussion

Phase I Vision: Investigate and propose an architecture to determine/measure and convey th t t l l f th i l t i the trust level of the various elements in a distributed or federated network. Provide architectural and design documents of a system architectural and design documents of a system concept that demonstrates the feasibility of the concept. p

SSTC 2009 Slide 4 of 32

slide-5
SLIDE 5

Phase I Research Objectives

Objectives Progress Requirements Demonstrations Recommendations Discussion

  • 1. Investigate and propose an architecture for

determining and conveying trust to the various determining and conveying trust to the various elements in a GIG-like architecture. (from call)

  • 2. Provide architectural and design documents of a
  • 2. Provide architectural and design documents of a

system that demonstrate feasibility. (from call)

  • 3. Further validate our approach through a

pp g prototype that exhibits some initial functionality.

SSTC 2009 Slide 5 of 32

slide-6
SLIDE 6

Progress Review

Objectives Progress Requirements Demonstrations Recommendations Discussion

Task 1: Ontology Creation Task 2: Decision Support Task 3: HW/SW Technologies Support Task 4: Trust Services Task 5: Prototype Development Task 6: Final Technical Report Task 6: Final Technical Report

SSTC 2009 Slide 6 of 32

slide-7
SLIDE 7

Proposed Solution

Objectives Progress Requirements Demonstrations Recommendations Discussion

Green Wave – an open architectural framework for determining and conveying trust to the various l t i GIG lik t k elements in a GIG-like network. Features:

  • Flexible distributed architectural framework for

h experimenting with trust.

  • Use of semantic technologies incorporated into

h b id b d t t t t a hybrid-based trust management system.

SSTC 2009 Slide 7 of 32

slide-8
SLIDE 8

Proposed Solution

Objectives Progress Requirements Demonstrations Recommendations Discussion

E i f Environment for trust

SSTC 2009 Slide 8 of 32

slide-9
SLIDE 9

Architectural Requirements Review

Objectives Progress Requirements Demonstrations Recommendations Discussion

Driving requirement: Reasoning about trust computationally means we need a machine

conveyable & actionable measure for conveyable & actionable measure for trust.

This implies: A (formal) model for trust (what p ( ) ( computers need). This requires: A method for expressing the trust d l ( li l ) model (a policy language). This allows: the calculation of a trust measure. Thi t th f t t i d i i This supports: the use of trust in decision making (beyond the scope of this proposal).

SSTC 2009 Slide 9 of 32

slide-10
SLIDE 10

Architectural Requirements Review

Objectives Progress Requirements Demonstrations Recommendations Discussion

Requirement 1. Trust Measure. The trust measure must be quantifiable, allowing for different levels of trust. trust. Requirement 2. Method for Expressing and

Calculating Trust. Trust policies must be

ibl i f th t b d b t k expressible in a form that can be used by a network entity to calculate a trust measure. Requirement 3 Use of Trust in Decision- Requirement 3. Use of Trust in Decision

  • Making. Ultimately, we want to have some policy

for detailing how trust measures should be used in decision making decision-making.

Beyond the scope of the current research. Important to recognize this requirement, as it provides

the moti ation fo the calc lation of t st to begin ith

SSTC 2009 Slide 10 of 32

the motivation for the calculation of trust to begin with.

slide-11
SLIDE 11

Architectural Design – Trust Model

Objectives Progress Requirements Demonstrations Recommendations Discussion

Trust Sources – all trust in a system emanates

from identifiable trust sources

certification authorities certification authorities peer assessments

Dynamic – trust evolves over time y

as new information is obtained as resources change their behavior

E id b d

b bl ti ( l k

Evidence-based – observable actions (or lack

thereof) are the basis for direct trust measures

Composable

ability to combine trust

Composable – ability to combine trust

measures from different network elements allows for indirect trust measures

SSTC 2009 Slide 11 of 32

slide-12
SLIDE 12

Prototype Demonstrations

Objectives Progress Requirements Demonstrations Recommendations Discussion

  • 1. Demonstration of how semantic technologies,

trust policies, trust calculations, and decision ki b i t t d i T t E l ti making can be integrated in Trust Evaluation Architecture

  • 2. Demonstration of how these technologies can

be implemented in a next generation be implemented in a next-generation networking infrastructure.

SSTC 2009 Slide 12 of 32

slide-13
SLIDE 13

Demonstration Scenario

Objectives Progress Requirements Demonstrations Recommendations Discussion

Use Case 5 (from kickoff briefing): Proximate

sensors in a sensor network are providing disparate

  • information. Which sensors do you believe? A
  • information. Which sensors do you believe? A

functioning sensor can provide spurious values. Are there really chemical weapons on the battlefield? More importantly can we account for battlefield? More importantly, can we account for the trust (and provenance) of information within the decision-making framework? Can we show that “d t ” d i i li f f t th t a “downstream” decision relies on a few facts that have low trust?

Elaboration of Use Case 5 – Perimeter monitoring Elaboration of Use Case 5

Perimeter monitoring system with two sensor networks using semantic technology in trust management.

SSTC 2009 Slide 13 of 32

slide-14
SLIDE 14

Use Case 5 – UML

Objectives Progress Requirements Demonstrations Recommendations Discussion

SSTC 2009 Slide 14 of 32

slide-15
SLIDE 15

Use Case 5: Sensor Networks

Objectives Progress Requirements Demonstrations Recommendations Discussion

Trust Calculation Trust Polic

Perimeter Monitoring System

Policy Trust Calculation Trust Policy Trust Calculation Trust Policy

NW NE

Ch i l S M ti S Chemical Sensors Motion Sensors

Sensor Network Sensor Network

SSTC 2009 Slide 15 of 32

slide-16
SLIDE 16

Semantic Technology & Trust

Objectives Progress Requirements Demonstrations Recommendations Discussion

Harmonization Sensor Sensor

Chemical Sensor Motion Sensor

Capability

Event Capture

Chemical Detection

Capability

Event Capture

Motion Detection

Chemical Detection Motion Detection

Common Vocabulary

SSTC 2009 Slide 16 of 32

y

slide-17
SLIDE 17

Semantic Technology & Trust

Objectives Progress Requirements Demonstrations Recommendations Discussion

Trust Calculation T t

Semantic Assistance in Policies Concepts S Concepts S

Trust Policy

  • Sensor
  • Capability
  • Event Capture
  • Chemical
  • Sensor
  • Capability
  • Event Capture
  • Motion

NW NE

Chemical Sensors Motion Sensors

Chemical Motion

Chemical Sensors

Sensor Network

Motion Sensors

Sensor Network

SSTC 2009 Slide 17 of 32

slide-18
SLIDE 18

Use Case 5: Activity Diagram

Objectives Progress Requirements Demonstrations Recommendations Discussion

SSTC 2009 Slide 18 of 32

slide-19
SLIDE 19

Demonstration 1

Objectives Progress Requirements Demonstrations Recommendations Discussion

Fuel Depot at Cape Canaveral AFS

Sensor Network A – chemical sensors

S N t k B t llit d t

Sensor Network B – satellite data

Front-end involves integration with geospatial data to incorporate proximity into trust policies data to incorporate proximity into trust policies. Makes use of Web Information Quality Assessment (WIQA) Framework for the policy Assessment (WIQA) Framework for the policy language. Represents the trust ontology using the TriG Represents the trust ontology using the TriG syntax.

SSTC 2009 Slide 19 of 32

slide-20
SLIDE 20

Demonstration 2

Objectives Progress Requirements Demonstrations Recommendations Discussion

Based on the Transient Network Architecture: Persistent Identification

Global Uniqueness Certification and Name Resolution Instance (red) Local (yellow) Global (green) Instance (red), Local (yellow), Global (green) Green implies yellow implies red

Distributed Control-Plan Functionality

Supports unstructured networks Persistent Identifier (PI)

ld f d h h k

Holds information associated with each network entity Control-Plane Provisioning Uses the ghost/shell model

SSTC 2009 Slide 20 of 32

g /

slide-21
SLIDE 21

Transient Network Architecture

Objectives Progress Requirements Demonstrations Recommendations Discussion

SSTC 2009 Slide 21 of 32

slide-22
SLIDE 22

Transient Network Architecture

Objectives Progress Requirements Demonstrations Recommendations Discussion

Three levels of resolution and certification

  • Instance or Red: Ghost

Instance or Red: Ghost

  • Local or Yellow: AoI
  • Global or Green: Green Networks

SSTC 2009 Slide 22 of 32

slide-23
SLIDE 23

Transient Network Architecture

Objectives Progress Requirements Demonstrations Recommendations Discussion

Complete network layer, replacing IP . Routing based on PIs. Entities interact with Persistent Identifier Networking Layer (PINL) via a Neutral Environment Language for Operation (NELO) Environment Language for Operation (NELO). Provided Interfaces:

PILOW - routing component.

g p

Agent Service - general ghost service. Discovery Module – allows entities to discover one

another another.

Routing Module – accepts packets from PILOW, and

routes based on PI.

SSTC 2009 Slide 23 of 32

slide-24
SLIDE 24

PINL Layer

Objectives Progress Requirements Demonstrations Recommendations Discussion

SSTC 2009 Slide 24 of 32

slide-25
SLIDE 25

PINL Layer

Objectives Progress Requirements Demonstrations Recommendations Discussion

SSTC 2009 Slide 25 of 32

slide-26
SLIDE 26

Demonstration 2

Objectives Progress Requirements Demonstrations Recommendations Discussion

dm_pi

De cision Maker Chemical Ne twork Mana ge r Motion Ne twork Manager

cnm_pi mnm_pi cs_1 cs_2 cs_3 ms_1 ms_2 ms_3

Chemical S Motion S

SSTC 2009 Slide 26 of 32

Se ns ors Sensors

slide-27
SLIDE 27

Use Cases

U C 4 (f

ki k ff b i fi ) A i bl

Objectives Progress Requirements Demonstrations Recommendations Discussion

Use Case 4 (from kickoff briefing): An enemy is able

to compromise network elements in order to inject spurious information. We do not want to allow the t “ l t ” tt k b t t enemy to “escalate” an attack, but we are not sure if it really is an attack? Typically, if a network element is “suspect”, it is excluded from the net

  • k e en tho gh it ma

still possess some network, even though it may still possess some informational value. E.g., an enemy has corrupted a machine’s database, but the GIS unit on the machine is still sending information that can be machine is still sending information that can be validated via message digests.

Elaboration of Use Case 4 – HW dongle used in

t f b d i ti d i t d i t

  • ut-of-band communication, and incorporated into

trust calculations.

SSTC 2009 Slide 27 of 32

slide-28
SLIDE 28

Use Case 4: Enemy Compromise

Objectives Progress Requirements Demonstrations Recommendations Discussion

Decision-maker

sensor

User-level

query data

  • ut-of-band

Application

sensor data request

Sensor

Driver-level process

raw data

Dongle Authentication Mechanism

signature hash

SSTC 2009 Slide 28 of 32

Mechanism

slide-29
SLIDE 29

Recommendations

Objectives Progress Requirements Demonstrations Recommendations Discussion

We view the Phase I work as one cycle through an iterative and incremental development process (spiral model) aimed at creating a Trust process (spiral model) aimed at creating a Trust Evaluation Architecture. Iteration 1:

Elicit initial requirements. Design a preliminary architecture. Prototype pieces of the architecture to validate ideas Prototype pieces of the architecture to validate ideas.

Iteration 2..n:

Continue to iteratively develop the Trust Evaluation Continue to iteratively develop the Trust Evaluation

Architecture, building upon the previous iterations.

Allows for extensive feedback/input from project

sponsors.

SSTC 2009 Slide 29 of 32

sponsors.

slide-30
SLIDE 30

Specific Recommendations

1 F ll d l f l d l f A f ll ifi d f l

Objectives Progress Requirements Demonstrations Recommendations Discussion

1. Fully develop formal model for trust. A fully specified formal model for trust allows for:

  • Determination of limits of what the Trust Evaluation Architecture.
  • Proofs for the correctness of its operation under various threat models.
  • p

2. Create a complete trust policy specification language on top of the formal model, along with query capabilities with respect to these trust policies:

Integrate previous trust research

  • Integrate previous trust research.
  • Allow a decision-maker to specify arbitrarily complex policies, and to

reason over these policies.

  • The use of semantic technologies within this reasoning framework should

also be more fully explored also be more fully explored.

3. Develop a communications framework that allows trust calculations to be integrated at various levels within a communications protocol stack, and within sensor networking environments (sandbox) environments (sandbox).

  • Initial work demonstrated how trust calculations can be integrated into an

experimental communications substrate.

  • The Trust Evaluation Architecture must leverage state-of-the-art advances

in security and networking

SSTC 2009 Slide 30 of 32

in security and networking.

slide-31
SLIDE 31

Discussion

Objectives Trust Research Requirements Preliminary Design Case Studies Discussion

SSTC 2009 Slide 31 of 32

slide-32
SLIDE 32

Acronyms and Terms

AoI Area of Interest Ghost Generic host GIG Global Information Grid NELO Neutral Environment Language for Operation PI Persistent Identifier PILOW P i t t Id tifi T bl PILOW Persistent Identifier Tables PINL Persistent Identifier Networking Layer SBIR Small Business Innovation Research TNA Transient Network Architecture WIQA Web Information Quality Assessment Framework

SSTC 2009 Slide 32 of 32