Security and Privacy at WINLAB Security and Privacy at WINLAB Wade - - PowerPoint PPT Presentation

security and privacy at winlab security and privacy at
SMART_READER_LITE
LIVE PREVIEW

Security and Privacy at WINLAB Security and Privacy at WINLAB Wade - - PowerPoint PPT Presentation

Security and Privacy at WINLAB Security and Privacy at WINLAB Wade Trappe Overview and Lead- -In In Overview and Lead Security has been one of the great detractors for wireless technologies WINLABs security initiatives:


slide-1
SLIDE 1

Security and Privacy at WINLAB Security and Privacy at WINLAB

Wade Trappe

slide-2
SLIDE 2

[2]

Overview and Lead Overview and Lead-

  • In

In… …

Security has been one of the great detractors for wireless technologies WINLAB’s security initiatives:

– Non-traditional – Leverage existing strengths – Wireless networks are different from standard networks!

Today, think about the questions:

– Should we reevaluate the definition of security? – Is there more to protect than e-commerce? – Is there more to security than cryptography and network security? – Should security be considered separately from the network/system? – What benefits are there if we integrate security into the network? – How private do we really want our lives?

slide-3
SLIDE 3

[3]

Through the Looking Glass, the Wireless World Through the Looking Glass, the Wireless World

Key properties and differentiators that

make wireless security different – Physical Layer – Ubiquity – Mobility – Resource adaptability – Location – Affordability – Platform heterogeneity – Programmability

Many threats are easier to conduct

against wireless networks: – Eavesdropping – Spoofing/Masquerade – Denial of Service

MPC8260 TMS320C6701 XC2V6000 FPGA 100BaseT Ethernet Megarray Connector- 244 Configurable I/O pins

slide-4
SLIDE 4

[4]

WINLAB WINLAB’ ’s s Security and Privacy Initiatives Security and Privacy Initiatives

WINLAB has a grown a large and unique initiative in wireless security and

privacy: – Faculty Members:

Originally: Wade Trappe, Yanyong Zhang, Marco Gruteser New Additions: Larry Greenstein, Narayan Mandayam , Roy Yates,

Predrag Spasojevic

– Many Students!!! – Collaboration:

NICT Japan: Security for Future Wireless Netw orks (B3G) CMU/ UIUC/ Intel: Secure Routing for MANETs and Mesh Netw orks Interdigital: Physical Layer Security

– Our Strategy:

Security at m any different layers Blend theory and system s investigation Work w ith industry

slide-5
SLIDE 5

[5]

WINLAB WINLAB’ ’s s Security Research Areas and Tools Security Research Areas and Tools

Focus Areas

  • Wireless Network Security
  • Sensor Network Security
  • Privacy in Wireless Networks
  • MANET Security
  • Securing Vehicular Networks

Research Initiatives

  • Physical Layer Security
  • Wireless and Sensor Privacy
  • Availability (Jamming/Flooding)
  • Location-centric Security
  • Secure Routing
  • Securing Wireless Resources
  • Privacy in Vehicular Networks
  • Malcode in Wireless Networks

Supporting Tools

Cryptography Network Security Protocols Layer 1 and Layer 2 Methods Statistical Analysis Testbeds and Simulations Other Mathematical Tools

slide-6
SLIDE 6

[6]

WINLAB WINLAB’ ’s s Security Success Stories Security Success Stories

  • Over the past two years there have been several notable success stories
  • Funding:

– NSF NeTS-NOSS: PARIS: Privacy Augmented Relaying of Information from Sensors – NSF NeTS-ProWIN: Fingerprints in the Ether: Exploiting the Radio Channel to Enhance Wireless Security – NSF CT-ISG: Multi-Layer Anonymity Techniques for Time-Series Location Information in Wireless Systems – DARPA SEVILLE: Security Via Lower Layer Enforcements (Joint with Interdigital)

  • Some Key Research Results:

– Jamming Attacks and Defense: Mobihoc05, Sensys07, IPSN07 – Physical Layer Security: WiSe07, Allerton07, ISIT07, Globecom07 – Location-oriented Security: SECON06, SASN06, Infocom07, SECON07 – Privacy: SecureComm05, ICDCS05, ICDCS07 – Secure Routing (SEAR): Only viable secure AODV protocol (under review)

  • A Growing Alumni:

– Wenyuan Xu has tenure-track faculty positions – Ruoheng Liu: Post-Doc under Vince Poor (Princeton) – Industrial appointments: Qing Li (Hitachi), Pandurang Kamat (Ask.com)

slide-7
SLIDE 7

[7]

Roadmap for Today Roadmap for Today

Fingerprints in the Ether Secrecy via Multi-Antenna Multi-Antenna Secret Broadcasts Service Discovery and Ident. Attack Detection in Localization LGI: Establishing Order Lunch!!! Formalizing Trust Demonstrations Privacy in Vehicular Networks Temporal Privacy TRIESTE: CogRadio Security Spatio Temporal Access Control Channel Surfing: Anti-Jamming

Morning Afternoon

Panel: Wireless Security

slide-8
SLIDE 8

[8]

Starting with PHY Starting with PHY-

  • layer Security

layer Security

Wireless networks have repeatedly been a source of “bad news”

when it comes to security

Although conventional cryptographic and network security

techniques are essential to securing wireless networks, they are not a complete solution

We believe lower-layer information associated with the wireless

channel can be used to enhance wireless security

– The typical wireless multipath transmit-receive channel is frequency- selective (or in the time domain, dispersive) in a way that is location- specific with rapid decorrelation properties – The channel response between a transmitter and a receiver can be a unique, shared, non-predictable source of secret information

This secret information is a “fingerprint in the ether” we propose

to use to develop cross-layer Authentication Services and Confidentiality Services

slide-9
SLIDE 9

[9]

Alice, Bob and Eve get Physical !!! Alice, Bob and Eve get Physical !!!

All security problems need actors:

– Alice (A): The transmitter – Bob (B): The receiver – Eve (E): The evil adversary

Their roles depend on the type of security objective we have

slide-10
SLIDE 10

[10]

PHY PHY-

  • Layer: Authentication

Layer: Authentication

Authentication in the PHY-sense is about verifying a transmission came from

a particular transmitter– useful for spoofing detection!!!

Wireless devices can authenticate themselves based upon

– Ability to produce an appropriate received signal/channel estimate at the recipient – Location information can be extracted to authenticate a transmitter relative to its previous location

Alice Bob Eve Probe Pulse u(t)

Bandwidth W of Probe Pulse is critical! 1/W must be small compared to channel temporal width

  • 1. Estimates channel

hAB (t,τ)

  • 2. Compares against

hAB (t-1,τ)

  • 3. Accepts transmission

if match Spoof Alice: Probe Pulse u(t)

  • 1. Estimates channel

hEB (t,τ)

  • 2. Verification fails!!!
  • 3. Does not accept Eve

as Alice!

slide-11
SLIDE 11

[11]

PHY PHY-

  • Layer Confidentiality: Types

Layer Confidentiality: Types

We also would like to use the PHY-Layer to support

confidential communications

– For higher-rate secret communications, we suggest that the PHY- layer be used to form higher-layer cryptographic keys

There are two types of PHY-Layer Confidentiality Services:

– Extraction: Use the channel estimate itself to form key bits – Dissemination: Use channel variations to opportunistically, and secretly convey communications/key bits…

Note: There is a distinction between secret communication and

LPI/LPD communications!

Today, you will hear two talks that focus on “Secret

Dissemination” using MIMO systems

slide-12
SLIDE 12

[12]

Fingerprints: Confidentiality Fingerprints: Confidentiality

The uniqueness and non-predictability of the channel can be

used to establish a shared secret key for encryption services

Alice Bob Eve Probe Pulse u(t)

Bi-directional probing must be performed within channel coherence time!

Estimates channel hAB (τ) Eve estimated hAE(τ) Cannot estimate KAB Estimates channel hBA (τ) Probe Pulse u(t) KAB=f(hAB(τ)|| r) KBA=f(hBA(τ)|| r) KAB = KBA by channel reciprocity Practical issues arise: quantization of channel estimates, channel

reciprocity, temporal coherence, fast channel estimation.

Announce nonce r

slide-13
SLIDE 13

Without Further Delay Without Further Delay… … Onto the Excitement Onto the Excitement… …