SR3: Secure Reputation-based Resilient Routing
Karine Altisen Stéphane Devismes Raphaël Jamet Pascal Lafourcade
VERIMAG, Universités de Grenoble This work was supported by the ARESA2 ANR Project
Altisen et al. (VERIMAG) SR3 15 May 2013 1 / 31
SR3: Secure Reputation-based Resilient Routing Karine Altisen - - PowerPoint PPT Presentation
SR3: Secure Reputation-based Resilient Routing Karine Altisen Stphane Devismes Raphal Jamet Pascal Lafourcade VERIMAG, Universits de Grenoble This work was supported by the ARESA2 ANR Project Altisen et al. (VERIMAG) SR3 15 May 2013 1
Altisen et al. (VERIMAG) SR3 15 May 2013 1 / 31
Altisen et al. (VERIMAG) SR3 15 May 2013 2 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 3 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 4 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 5 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 5 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 5 / 31
Introduction
Altisen et al. (VERIMAG) SR3 15 May 2013 5 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 6 / 31
SR3
◮ Built with a reputation mechanism ◮ Based on unconditionally trusted information Altisen et al. (VERIMAG) SR3 15 May 2013 7 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 8 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 8 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 8 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 9 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 9 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 9 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 9 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 9 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
◮ If A is not the final destination for that ACK, A routes it, ◮ Else, if it recalls the corresponding message using LQueue, it reinforces
◮ Otherwise, A drops the ACK.
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
◮ If A is not the final destination for that ACK, A routes it, ◮ Else, if it recalls the corresponding message using LQueue, it reinforces
◮ Otherwise, A drops the ACK.
Altisen et al. (VERIMAG) SR3 15 May 2013 10 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 11 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 12 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 13 / 31
SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 13 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 14 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 15 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 15 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 15 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 16 / 31
Security properties
F (A) :
$
ksrc )
$
src
(·),H(·) 1
$
$
src (Datab)
src
(·),H(·) 2
Altisen et al. (VERIMAG) SR3 15 May 2013 17 / 31
Security properties
F (A) = Pr[ExptFG F (A) = 1] − 1
1http://prosecco.gforge.inria.fr/personal/bblanche/cryptoverif/ Altisen et al. (VERIMAG) SR3 15 May 2013 18 / 31
Security properties
F (A) ≤ 2q2 G + 2qG
G + 4qG + 2
CPA F
Altisen et al. (VERIMAG) SR3 15 May 2013 19 / 31
Security properties
F (A) ≤ 2q2 G + 2qG
G + 4qG + 2
CPA F
F (A) ≤ 2 × (220)2 + 2 × 220
CPA F
CPA F
Altisen et al. (VERIMAG) SR3 15 May 2013 19 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 20 / 31
Security properties
Altisen et al. (VERIMAG) SR3 15 May 2013 20 / 31
Resiliency and performances
Altisen et al. (VERIMAG) SR3 15 May 2013 21 / 31
Resiliency and performances
◮ RGBR (randomly select a lower height neighbor each time) ◮ PRGBR (send to the same height with p = 0.4) ◮ PRDGBR (PRGBR + duplication at each node)
Altisen et al. (VERIMAG) SR3 15 May 2013 22 / 31
Resiliency and performances
2http://www.disco.ethz.ch/projects/sinalgo/ Altisen et al. (VERIMAG) SR3 15 May 2013 23 / 31
Resiliency and performances
◮ From 0 to 100% of messages transmitted
◮ Direct link to the sink, switch behaviors at one third of the simulation
◮ From 1 to 5 identities
Altisen et al. (VERIMAG) SR3 15 May 2013 24 / 31
Resiliency and performances
0.2 0.4 0.6 0.8 1 50 100 150 200 250 300 350 400 Average delivery rate Number of nodes GFG GBR RGBR PRGBR PRDGBR RW SR3 Altisen et al. (VERIMAG) SR3 15 May 2013 25 / 31
Resiliency and performances
0.2 0.4 0.6 0.8 1 50 100 150 200 250 300 350 400 Average delivery rate Number of nodes GFG GBR RGBR PRGBR PRDGBR RW SR3 Altisen et al. (VERIMAG) SR3 15 May 2013 26 / 31
Resiliency and performances
10 20 30 40 50 60 70 80 90 100
Proportion of nodes (%):
10 20 30 40 50 60 70 80 90 100 GFG 10 20 30 40 50 60 70 80 90 100 GBR 10 20 30 40 50 60 70 80 90 100 RGBR 10 20 30 40 50 60 70 80 90 100 PRGBR 10 20 30 40 50 60 70 80 90 100 PRDGBR 10 20 30 40 50 60 70 80 90 100 RW 10 20 30 40 50 60 70 80 90 100 SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 27 / 31
Resiliency and performances
5 10 15 20 25 30 50 100 150 200 250 300 350 400 Average number of hops Number of nodes GFG GBR RGBR PRGBR PRDGBR RW SR3
Altisen et al. (VERIMAG) SR3 15 May 2013 28 / 31
Resiliency and performances
0.2 0.4 0.6 0.8 1 50000 100000 150000 200000 250000 300000 350000 400000 450000 500000
The xth message has been processed (either delivered or lost) GFG GBR RGBR PRGBR PRDGBR RW SR3 Altisen et al. (VERIMAG) SR3 15 May 2013 29 / 31
Conclusion
Altisen et al. (VERIMAG) SR3 15 May 2013 30 / 31
Conclusion
Altisen et al. (VERIMAG) SR3 15 May 2013 31 / 31
Conclusion
Altisen et al. (VERIMAG) SR3 15 May 2013 31 / 31
Conclusion
seminar "Formal Protocol Verification Applied, 2007, p. 117.
in wireless sensor networks: Gradient-based routing in focus, International Journal On Advances in Networks and Services 4 (2011), no. 1 and 2, 38–54. Altisen et al. (VERIMAG) SR3 15 May 2013 31 / 31
Conclusion
0.2 0.4 0.6 0.8 1 0.2 0.4 0.6 0.8 1 Average delivery rate Drop rate of the compromised nodes GFG GBR RGBR PRGBR PRDGBR RW SR3 Altisen et al. (VERIMAG) SR3 15 May 2013 31 / 31
Conclusion
0.2 0.4 0.6 0.8 1 1 2 3 4 5 6 7 8 9 10 Average delivery rate Number of pseudonymous identities per SY node GFG GBR RGBR PRGBR PRDGBR RW SR3 Altisen et al. (VERIMAG) SR3 15 May 2013 31 / 31