Security in Wireless Ecosystems Security in Wireless Ecosystems - - PowerPoint PPT Presentation

security in wireless ecosystems security in wireless
SMART_READER_LITE
LIVE PREVIEW

Security in Wireless Ecosystems Security in Wireless Ecosystems - - PowerPoint PPT Presentation

Security in Wireless Ecosystems Security in Wireless Ecosystems Wade Trappe Wireless Ecosystems represent the next generation of Wireless Ecosystems represent the next generation of pervasive computing systems pervasive computing systems


slide-1
SLIDE 1

Security in Wireless Ecosystems Security in Wireless Ecosystems

Wade Trappe

slide-2
SLIDE 2

WINLAB

Wireless Ecosystems represent the next generation of Wireless Ecosystems represent the next generation of pervasive computing systems pervasive computing systems

  • Integrating the physical world with the Internet

– Ability to view, search and interact with the physical world – Pervasively deployed mobile and embedded computing devices

  • A set of evolving ”wireless ecosystems” emerge

– Weaving information into the fabric of human lives

  • Characteristics of pervasive ecosystems

– 10s of billions of wireless devices connected to the global network – Scale is 2 orders of magnitude greater than today’s internet – Licensed and Unlicensed Spectrum – New challenges in enabling technologies, system architecture and human-centric design

  • Communications/Networking with Cognitive Radios

– Design of hierarchical, distributed, decentralized and adaptive protocols – Spectrum Coexistence in dense wireless networks – Efficient integration with the future internet

  • Security and Privacy

– Personal nature of use of technologies – Ubiquitous nature of use of technologies

slide-3
SLIDE 3

[3]

WINLAB

Vehicles with Sensors & Wireless Hospital with Embedded Monitoring Robotics Application Smart Public Space Autonomous Wireless Clusters (“ecosystems”)

Physical World with Embedded Wireless

Network Connectivity & Computation

Autonomous software agents

Application Management & Control Software

Control Module Control Module “Human in the Loop” From Sensors Virtualized physical world object Content & Location Aware Routers Computation & Storage Protocol module Ambient interfaces Cognitive Intelligence Module

Global Pervasive Network (Future Internet)

Multiple radio standards, Cognitive radios To Actuators

Wireless Ecosystems represent the next generation of Wireless Ecosystems represent the next generation of pervasive computing systems pervasive computing systems

slide-4
SLIDE 4

WINLAB

  • Spectrum Policy

– Economics – Regulation – Legal – Business

  • Cooperative Communications

– Information & Coding Theory – Statistical Signal Processing – Game Theory/Microeconomics – MAC & Networking Algorithms

  • Platforms/Prototypes

– WiNC2R Programmable agile radios – GNU platforms – Cognitive Radio Network Testbeds

Spectrum Policy Server rate4 rate1 rate2 rate3

“Wireless Ecosystems”

Wireless Ecosystems are a multi Wireless Ecosystems are a multi-

  • dimensional activity

dimensional activity at WINLAB at WINLAB

slide-5
SLIDE 5

WINLAB

Confidentiality

Wireless is easy to sniff. We still need encryption services and key management. Key freshness is an issue.

Integrity

Wireless hardware/equipment need to be safe from modification. Data/control info should not be modified before or during transit.

Forensics

Wireless networks will be the platform of choice for attacks. Should the network keep track of forensic evidence?

Privacy

Perpetual connectivity can mean constant surveillance! With snooping one can monitor mobility and handoffs between networks.

Location

Location is a new form of information provided by wireless systems that will facilitate new

  • services. Location information needs to be trusted.

Intrusion

The pervasiveness of the wireless networks should not mean that just anyone can participate! Example: Rogue APs

Availability

The value of a wireless network is its promise of ubiquitous connectivity. Unfortunately, wireless networks are easy to “break” (e.g. jam, denial of service)

Non-repudiation

RF energy radiates, and wireless entities within the radio coverage pattern may serve as witnesses for the actions of the transmitter.

WINLAB has a holistic approach to addressing security WINLAB has a holistic approach to addressing security issues in emerging wireless systems issues in emerging wireless systems

slide-6
SLIDE 6

WINLAB

Security can be achieved by exploiting unique properties of Security can be achieved by exploiting unique properties of the wireless physical layer (SEVILLE) the wireless physical layer (SEVILLE)

  • Wireless channels are “open” and hence more susceptible to eavesdropping,

intrusion and spoofing…

  • Interestingly, wireless channel properties (“RF signatures”) can be exploited for

authentication and to identify attackers

  • Project on protocols and algorithms for security functions; also experimental

validation

slide-7
SLIDE 7

WINLAB

  • Use channel reciprocity to build highly correlated

data sets

– Probe the channel in each direction – Estimate channel using recd. probe

  • Eve receives only uncorrelated information as she

is more than λ/2 away

  • Level crossings are used to generate bits
  • Alice and Bob must exchange msgs over public

channel to create identical bits

  • What if channel is not already authenticated?

– Requires additional sophistry to prevent man-in-the-middle attack. – It is possible using the correlated data collected from received probes.

P R O B E P R O B E P R O B E Get channel estimates L

  • c

a t i

  • n

s

  • f

e x c u r s i

  • n

s L

  • c

a t i

  • n

s i n a g r e e m e n t Key Key Positive excursion Negative excursion

SEVILLE exploits the physical layer to achieve new forms of SEVILLE exploits the physical layer to achieve new forms of key establishment key establishment

slide-8
SLIDE 8

WINLAB

  • Experimental setup:

– Alice = AP – Bob = Client – Eve = Client on same channel

  • Alice Bob: PING REQUEST Bob

Alice: PING REPLY

  • 20 packets per second
  • Eve overhears packets from both

legitimate users

  • (RSSI, timestamp) from recd. packet

headers are pulled out by each user

  • Mesg. exchange protocol uses the

locations of excursions to distil identical bits

  • ~1 bit/sec in typical indoor environments

with no errors.

Alice Eve Bob Eve Alice Bob Bob Alice Bob Alice Alice Bob

SEVILLE SEVILLE’ ’s s key establishment has been validated in real key establishment has been validated in real customized and COTS systems customized and COTS systems

slide-9
SLIDE 9

WINLAB

  • Goal: to maintain wireless network connectivity in the presence of wireless interference (i.e.

jamming)

  • Strategies:

– Channel Surfing: Adapt network channel allocations in an on-demand manner – Spatial Retreats: Use mobility to evade interference sources and re-establish network connectivity – Anti-jamming Timing Channels: Failed packet reception events may be modulated to establish a low-rate jamming resistant communication channel – Radio Teaming: A team of transmitters exploits multipath environments to perturb angular receiver patterns, in spite of SINR levels of -10dB or worse.

(Effect of a jammer on a network of Chipcon 1100 Radios) (Channel Surfing adjusts channels to re-establishes the network)

DARWIN seeks to defend wireless networks from adversarial DARWIN seeks to defend wireless networks from adversarial wireless interference wireless interference

slide-10
SLIDE 10

WINLAB

  • Objective:

Objective:

– – Create a Create a low bit low bit-

  • rate overlay

rate overlay that exists on that exists on the conventional physical/link the conventional physical/link-

  • layers

layers in spite in spite

  • f
  • f a broadband interferer.

a broadband interferer.

  • Approach: Modulate the

Approach: Modulate the interarrival interarrival time time between packet transmissions to convey between packet transmissions to convey information information

– – Jammed packets are detectable Jammed packets are detectable

tim e ……

t1 t2 t3 t4 t5 ti ti+ 1

τ1 τ2 τ3 τ4 τi

Network Datalink Physical Network Datalink Physical

4Oz Overlay 4Oz Overlay Timing channel Overlay Framing Error Correct Overlay Authent.

Virtual Bitpipe

Timing channel Overlay Framing Error Correct Overlay Authent.

Virtual Bitpipe

Sender Receiver

Network Datalink Physical Network Datalink Physical

4Oz Overlay 4Oz Overlay Timing channel Overlay Framing Error Correct Overlay Authent.

Virtual Bitpipe

Timing channel Overlay Framing Error Correct Overlay Authent.

Virtual Bitpipe

Sender Receiver

The Timing Channel Overlay

A non A non-

  • jammable

jammable timing channel remains when the physical timing channel remains when the physical layer is being jammed layer is being jammed

slide-11
SLIDE 11

WINLAB

Jammer Jammer Target Receiver

Motivation:

  • Units moving through “urban canyons”

experience complex link quality conditions

  • Adversarial scenarios, involving jammers, further complicate conditions

Increasing transmit power may not be an option… Team solutions are needed

  • Can we do beamforming
  • r cooperative communications?
  • Can we utilize the “RF Clutter”

to convey information?

Communication is Jammed + Blocked SINR = -15dB

“Help me!”

What’s this RF Clutter?

Radio transmitters can team to overcome radio interference Radio transmitters can team to overcome radio interference by non by non-

  • coherently perturbing receiver

coherently perturbing receiver beampattern beampattern

slide-12
SLIDE 12

WINLAB

MIAMI: MIAMI: M Mobile

  • bile I

Infrastructures for nfrastructures for A Advancing dvancing M Military ilitary I Information Technologies involves security analysis of MIMO nformation Technologies involves security analysis of MIMO

  • DoD is reliant on wireless networks to support

critical communications – Mobile Ad Hoc Networks – Pervasive monitoring of valuable military assets (such as artillery or food supplies)

  • MIAMI seeks to address issues of performance,

adaptability and reliability for three different wireless scenarios – Design of Active RFID Systems for Inventory Management. – Development of a Protocol Architecture for Cognitive Radio Networks. – Design and Evaluation of Military MIMO Systems.

  • Task-1 emphasis is on tactical MIMO systems

– Modeling of MIMO channels – Integrating ray-tracing and MIMO channel models with ns-2 – Threat analysis of tactical MIMO radios

TARGET high density, no mobility and low traffic zone STAGE 1 Group 1 Group 2 Group 3 low density, mobile and high traffic zone STAGE 2 high density, low mobility and high traffic zone STAGE 3

Initial meeting stage Approaching the target Congregation at the target X

TARGET high density, no mobility and low traffic zone STAGE 1 Group 1 Group 2 Group 3 low density, mobile and high traffic zone STAGE 2 high density, low mobility and high traffic zone STAGE 3 TARGET high density, no mobility and low traffic zone STAGE 1 Group 1 Group 2 Group 3 low density, mobile and high traffic zone STAGE 2 high density, low mobility and high traffic zone STAGE 3

Initial meeting stage Approaching the target Congregation at the target X Initial meeting stage Approaching the target Congregation at the target X

Basic adversarial MIMO setting, where Eve seeks to interfere with Alice and Bob’s communication. MIMO tactical scenarios will be integrated into a custom ns-2 simulator tool.

slide-13
SLIDE 13

WINLAB

  • Expose the lower-layers of the protocol stack to researchers, developers and the “public”

– scan the available spectrum, select from a wide range of operating frequencies – adjust modulation waveforms, perform adaptive resource allocation

  • An ideal platform for abuse since the lowest layers of the wireless protocol stack are

accessible to programmers.

1.

Poor programming:

  • 1. CR protocols will be complex, it will be easy to write buggy implementations
  • 2. Runaway software processes…

2.

Greedy exploitation:

  • Decrease back-off window in an 802.11 (or comparable) implementation
  • Ignore fairness in spectrum etiquette (many co-existence protocols assume honest participants, or

honest data)

3.

Simply Ignoring Etiquette

  • Primary user returns… so-what???

4.

Economic/Game-theoretic Models

  • Standard economic models for spectrum sharing seek to support cooperation– but cooperation does

not ensure trusted operation!

  • Security is an anti-social topic!

Cognitive Radios are an emerging wireless system with Cognitive Radios are an emerging wireless system with many potential security threats many potential security threats

slide-14
SLIDE 14

WINLAB

WINLAB is developing AUSTIN: WINLAB is developing AUSTIN: A Ass ssu uring ring S Software Radios

  • ftware Radios

have have T Trusted rusted In Interactions teractions

  • Goal: to regulate the future radio environment, ensure trustworthy cognitive radio
  • peration (Team: Rutgers, Virginia Tech, UMass)
  • How — two complementary mechanisms

– On-board enforcement – restrict any violation attempt from accessing the radio:

Each CR runs its ow n suite of spectrum etiquette protocols Onboard policy checking verifies actions occur according to “spectrum law s”

– An external monitoring infrastructure:

Distributed Spectrum Authority (DSA) — police agent observes the radio

environm ent

DSA w ill punish CRs if violations are detected via authenticated kill com m ands.

Research

slide-15
SLIDE 15

WINLAB

Approach:

To address threats across all of the separate and interacting layers in the MANET, CARMEN involves a holistic suite of security mechanisms to assure proper operation of each layer. Some components that will be developed include:

  • PHY/Link-Layer Assurance:

Anti-jamming Channel Adaptation Methods will reconstruct network link connectivity to recover the network in the presence of interference

  • Routing-Layer Assurance: Multipath “Security Control” for

Byzantine-Robust Forwarding will automatically re-allocate traffic around Byzantine nodes

  • Transport and Resource Assurance: Byzantine-Secure

Accounting and Pin-pointing of Malicious Insiders will recognize when nodes utilize an unfair portion of system-wide network resources

CARMEN: A CARMEN: A C Collaborative,

  • llaborative, A

Assurable ssurable, and , and R Reliable eliable M Mobil

  • bile

e N Network for Tactical Operations addresses MANET security etwork for Tactical Operations addresses MANET security

Video Surveillance Sensor Network

Forward Observer

Communications Satellite

Relay Alpha Broadband Relay Bravo

Satellite Link

Enemy jammer blocks link to Bravo!

Alpha is captured by enemy, and becomes malicious!

Relay Charlie Enemy FO Mission is to deliver Intel

  • bservations to Satellite.

Network must support multiple traffic types.

Innovative Technology:

  • The CARMEN effort is centered on a novel

architecture, involving a Secure Management Plane (SMP) that will support consistent and

  • bservable security control information across the

entire MANET.

  • Advantages of CARMEN-SMP:

(1) may utilize a separate radio link, optimized for reliability and radio range (not bandwidth). (2) provides a common method/framework for exchanging security audit information; (3) separate out signaling from the normal traffic/data plane (4) can be fed directly into trusted computing components (5) Reduction in hops on control plane increases provability of security for protocols

SMP

Data Plane

Implementation:

The SMP is possible through a separate radio link optimized for reliability not bandwidth:

  • Possible on dual-radio nodes (e.g. multiple 802.11

interfaces, with SMP using low-rate, more resilient modulation)

  • For single-radio nodes it is possible to implement as a

TDMA-overlay on 802.11

  • Forward-looking vision: JTRS and other software

radios can easily support multiple radio interfaces

slide-16
SLIDE 16

WINLAB

  • Characteristics

– Authenticate RREQs/RREPs/RERRs – Based on symmetric key cryptography – Public key cryptography is only used in initial bootstrap phase – Sequence #’s and hop counts are protected through the use of a one-way function – Route errors are protected through a variation of TESLA

  • Each node maintains 2 hash chains for itself to use

– Authenticator hash chain – TESLA key chain

  • Authenticator Hash Chain: What basically happens is…

– Each individual hop for each even sequence number should have a corresponding hash value – Odd sequence number only needs one hash value – Nodes who have an even sequence number have the corresponding next higher odd sequence number – Intermediate nodes cannot increase the sequence number or decrease the hop count

h0 ,h1 …,hn-2m-1 , …, hn-m-2 , hn-m-1 , hn-m ,hn-m+1 … ,hn-1 , hn Generation Seq#0 Seq#1 m+1 Seq#3 Seq#2 m+1 Hop0 Hop1

For RERRs

SEAR addresses known security weaknesses in secure AODV SEAR addresses known security weaknesses in secure AODV protocols (SAODV, ARAN) protocols (SAODV, ARAN)

slide-17
SLIDE 17

WINLAB

  • Rethink the RFID problem from bottom up using state-of-

art technology

– Simple (cheap!) tags, sophisticated readers – Continuous inventory, not portals – Route to extreme miniaturization—works for items of all sizes

  • NSF STTR support and strong industry connections.

– Initial target: jewelry supply/sales chain (Retail only: ~$50B/yr)

  • RFID tags only responds when queried.
  • Easily shielded intentionally or by

environment.

  • Only “seen” when pass a portal
  • RFID tags are complex.
  • Many have processors, memory, and
  • ther features.
  • Long life tags are passive
  • Short range, poor link quality
  • High power base stations (~5W each!)

MRTs announce their status continuously. User knows immediately when/where

they are moved.

Network connectivity allows remote

access.

MRTs only announce serial number All other complexity is in the network

and database.

Long life with active radio Long range, good link quality Passive Basestations MRT: MicroRadio Tag

TM

RFID: Radio Frequency IDentification

New Active RFID technology targets advancing state New Active RFID technology targets advancing state-

  • of
  • f-
  • the

the art in inventory management with unique security issues art in inventory management with unique security issues

Research