robust probabilistic fake packet injection for receiver
play

Robust Probabilistic Fake Packet Injection for Receiver-Location - PowerPoint PPT Presentation

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy Ruben Rios 1 , Jorge Cuellar 2 , Javier Lopez 1 1 NICS Lab University of Mlaga 2 Siemens AG, Munich E SORI CS 2012 10-14 Se pt. Pisa (I ta ly)


  1. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy � Ruben Rios 1 , Jorge Cuellar 2 , Javier Lopez 1 � 1 NICS Lab – University of Málaga � 2 Siemens AG, Munich � E SORI CS 2012 – 10-14 Se pt. Pisa (I ta ly)

  2. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 1

  3. Introduction � � Wireless Sensor Networks (WSN) are ad hoc networks: � – Sensor nodes: battery-powered devices with limited capabilities � • measure physical phenomena � • communicate with nearby nodes using radio interfaces � • provide routing capabilities � – Base station: resourceful data sink � • collects and analyses all data from sensors � • communication interface to the network � 2

  4. Introduction � � WSNs are used in applications where sensor nodes are unobtrusively embedded into systems: � – Monitoring � – Tracking � – Collecting � – Reporting � � By sectors, WSNs are used in: � – Environmental, agriculture, farming, � – Industrial, critical Infrastructure, � – Logistics, retailing, � – Home automation, smart metering, e-health, � – Homeland security, battle fi eld monitoring � 3

  5. Introduction � � WSN solutions are designed to maximize the lifetime of the network � – Data is transmitted using shortest-path routing algorithms � � Routing protocols introduce pronounced traf fi c patterns, which reveal the location of relevant network nodes � – Source-location privacy � – Receiver-location privacy � � � 4

  6. Introduction � � The criticality of location privacy is evident in the following scenario � � � � Motivation � – Physical protection � – Strategic information � � � � � These problems are extensible to any WSN scenario because they are caused by a network design � 5

  7. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 6

  8. Related Work � � Deng et al. (2006) proposed multi-parent routing which selects the next hop randomly from neighbours closer � – Always in the direction of the base station � � Fractal Propagation (2006) and Malestrom (2011) create hot-stops to attract adversaries � – Once reached they can be discarded � � Ying et al. (2011) propose to make every node transmits the same amount of traf fi c � – Best protection but at the maximum cost � � Jian et al. (2008) send packets towards the sink with a biased probability and inject fake traf fi c in the opposite direction � – Fake traf fi c is always sent in the opposite direction � 7

  9. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 8

  10. Problem Statement � � We assume a WSN with the following features � – Sensor nodes are deployed in a vast area � – The network consists of hundreds of sensor nodes � – The connectivity of the network is high � – There is a single base station � – Event-driven monitoring application � – Sensor nodes share keys and perform cryptographic operations � – Real messages are indistinguishable from fake messages � � � 9

  11. Problem Statement � � We assume the adversary � – Has a partial view of the communications ( ) � – Cannot decrypt data packets � – Can determine the data sender based on features of the signal � – Can determine the data recipient using header information or the transmission times of nodes � – Can count the number of packets sent by a particular node � – Moves according to a particular strategy at a reasonable speed � � � � � ADV 0 ADV a 0 � 10

  12. Problem Statement � � The movement strategy of the adversary is determined by the type of traf fi c analysis attack performed � – Time-correlation attack � • A node transmits shortly after receiving a packet � – Rate-monitoring attack � • Nodes closer to the base station 0 0 receive more packets � 0 • Less ef fi cient because it requires 0 several observations before moving � 10 0 0 11

  13. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 12

  14. Homogeneous Injection for Sink Privacy � � The HISP idea is to locally homogenise the number of packets sent by a node to its neighbours � � 10 0 0 10 1. Fake traf fi c hides the fl ow of 10 0 0 10 real packets � • Two messages (real, fake) � 10 0 10 0 • Controlled by a parameter �� 0 10 � 2. Real packets are sent using a biased random walk � • More likely to reach the BS � • Static path + fake branches are eventually discarded by the adversary � 13

  15. Homogeneous Injection for Sink Privacy � � We require three properties during data transmission � – Prop 1: Convergence � – Prop 2 : Homogeneity � – Prop 3 : Exclusion � � 14

  16. Homogeneous Injection for Sink Privacy � � A computationally inexpensive approach ensures the previous properties � – Sorted combinations without repetition of two neighbours � – Select one of the combinations randomly � � � 15

  17. Homogeneous Injection for Sink Privacy � � The proposed algorithm introduces a network parameter to control the amount of fake traf fi c � – Depends on the hearing range of the adversary � � � Algorithm 1 Transmission strategy Input: packet ← receive () Input: combs ← combinations ( sort ( neighs ) , 2) Input: MAX TTL 1: { neigh 1 , neigh 2 } ← select random ( combs ) 2: if isreal ( packet ) then send random ( neigh 1 , packet, neigh 2 , fake ( MAX TTL )) 3: 4: else TTL ← get time to live ( packet ) − 1 5: if TTL > 0 then 6: send random ( neigh 1 , fake ( TTL ) , neigh 2 , fake ( TTL )) 7: end if 8: 9: end if 16

  18. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 17

  19. Analysis of Potential Limitations � � The topology of the network might negatively impact the convergence of real packets � � – Theorem: Real messages reach the base station if � 2 C ( S − C ) F < � Validation on randomly deployed networks � 7 0.8 closer( C ) equal( E ) 0.7 6 further( F ) � 2 C ( S − C ) 0.6 5 average number of neighbors probability isolated nodes 0.5 4 0.4 3 0.3 2 0.2 1 � 0.1 0 0 100 150 200 250 300 350 100 150 200 250 300 350 � network size network size 18

  20. Analysis of Potential Limitations � � Message delivery time is affected by the probabilistic nature of the protocol � x n = 1 + px n − 1 + qx n + rx n +1 � The values of p,q,r might differ for each node due to the network con fi guration � 70 4 neigh 8 neigh 12 neigh 20 neigh 60 50 average path length � The speed decreases as the packet approaches the sink � 40 30 � 20 � 10 5 10 15 20 distance to sink 19

  21. Analysis of Potential Limitations � � The use of fake traf fi c impacts the lifetime of the network � � The durability of fake traf fi c is controlled by a parameter, MAX_TTL , which is dependent on the hearing range of the adversary ( ) � �� � Ratio can �� ��������������� be reduced by half � �� � �� � � � � � �� � � �� ������������ ������������ � 20

  22. Analysis of Potential Limitations � � We analyse the privacy protection against a local adversary � � Time-correlation � – Packets fl ow in any direction � – Fake and real packets are indistinguishable � � Rate-monitoring � – Evenly distributes packets among neighbours � – Random walk blurs the band of fake messages � � 21

  23. Agenda � � Introduction � � Related Work � � Problem Statement � � Homogeneous Injection for Sink Privacy � � Protocol Analysis � � Conclusion � 22

  24. Conclusion � � We present a new receiver-location privacy solution called HISP based on fake traf fi c and biased random walks � � HISP has been validated analytically and experimentally � � Future work � – Reduce fake traf fi c � – More powerful adversaries � – Node compromise attacks � – Topology discovery process � � 23

  25. Thanks for your attention! � Ruben Rios 1 , Jorge Cuellar 2 , Javier Lopez 1 � 1 NICS Lab – University of Málaga � 2 Siemens AG, Munich � E SORI CS 2012 – 10-14 Se pt. Pisa (I ta ly)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend