WSN Security Javier Lopez Computer Science Department Universidad de Malaga

WSN Basics, Products, Applications, Limitations, …

2

Real World

Temperature

Sound

Real World Light 3

Real World → Computer

SENSOR

Real World

Computer World

4

From sensors to sensor nodes

+ Autonomous Computer

= SENSOR NODE

5

From sensor nodes to sensor networks

(Collaboration, Event-driven processing, …) = Distributed Applications 6

WSN basics •  WSN is one of the key technologies of the ubiquitous computing visions. •  Sensors operate and cooperate in an ad hoc manner using radio interfaces, resulting in a mesh architecture where nodes: –  communicate directly only with nodes nearby due to limited power •  some nodes communicate with a base station

–  support multiple communication paths –  provide routing capabilities

what turns out to be an advantage in comparison with 802.11 and Bluetooth. 7

WSN basics •  The base station collects the data from the sensors, aggregate and send it to the outside world: –  A central computing system where the information is stored for different purposes (analysis, control decision making, etc.)

•  Contrarily to the case of the sensors, it is supposed that the base station has no limited resources –  not only for all necessary computations but for all internal and external communications to the WSN. 8

Sensors limitations •  For the case of Mica family (Mica2, Mica2dot, MicaZ), and Telos nodes: –  Processor: •  8-bit Atmel ATmega processor •  Telos: 16-bit TI MSP430 processor

–  Memory: •  128 KB ROM and 4 KB RAM •  Telos: 48 KB ROM and 10 KB RAM

–  Speed: •  Mica2dot: 4 MHz •  Mica2 and MicaZ: 7.37 MHz •  Telos: 8MHz

9

Sensors limitations –  Communications: •  Mica2dot and Mica2 deliver up to 20 kbps on a single shared channel, with a range of up to around a hundred meters •  MicaZ and Telos deliver up to 250 kbps.

–  Software: •  TinyOS operating system –  Highly optimized (small, fast,…) –  Support real-time tasks (multi-threaded, events-oriented)

•  C variant called nesC for programming purposes –  featuring an event-driven concurrency model

10

Sensors limitations •  Despite the resource limitations of the nodes, their tiny size makes them feasible for ubiquitous and real-time embedded applications. •  It is precisely this combination (of certainly contradictory characteristics) what gives rise to new research challenges: –  design of different types of protocols, –  development and deployment of applications and, –  specification and design of new security models and solutions.

11

Sensors limitations •  The current generation of wireless sensor nodes is still relying on batteries as its source of power. –  The limited lifetime of batteries, however, significantly impedes the usefulness of such devices since maintenance accesses would become necessary whenever the battery is depleted.

•  Furthermore, the intention of having large amounts of tiny nodes scattered over a large area would render maintenance impractical.

12

Sensors limitations •  Next generation sensor nodes will combine ultra-low power circuitry with power scavengers, which allow for maintenance-free operation of the nodes. –  This opens up a whole new range of applications where the nodes can be placed in inaccessible location.

•  Power scavengers are devices able to harvest small amounts of energy from ambient sources such as light, heat or vibration. –  This energy is stored in a capacitor and can be used to power the sensor node either continuously, for small amounts of power, or in intervals if the demand is higher.

13

Sensors limitations

14

WSN Applications •  Generally speaking, WSNs can be used in applications where sensors are unobtrusively embedded into systems, consequently involving operations like: –  –  –  –  – 

monitoring tracking detecting collecting reporting

15

WSN Applications •  By sectors, WSNs can be used in: –  –  –  –  –  –  –  –  – 

agricultural business critical infrastructure protection environment health care homeland security industrial military applications etc.

16

WSN Applications • 

Specific applications: –  farmland monitoring –  animal identification and tracking –  cultivation conditions (temperature, humidity, etc.) –  inventory control –  goods tracking and delivery –  smart office –  supply of water and electricity –  freeway traffic monitoring and control –  detection of structural integrity problems in buildings –  wildlife habitat monitoring –  microclimate control –  detection of out-of-tolerance environmental conditions –  recording wild animal habits

–  –  –  –  –  –  –  –  –  –  –  –  –  – 

emergency medical care remote medical monitoring medicines tracking frontiers surveillance detection of illegal materials in custom controls monitoring factory instrumentation remote control of manufacturing systems collecting pollution levels detection of structures vibrations target tracking detection of biological or chemical weapons location of vehicles and arms wearable smart uniforms etc.

17

WSN Applications

18

WSN Applications

19

WSN Applications •  ABC News: Could Tiny Sensors Detect Bridge Crises? Researchers Hope Tiny Sensors Placed on Bridges Can Offer Warning Before Disaster This undated photo provided by Los Alamos National Laboratory, shows an experimental electronic sensor that could possibly be used to detect electrical charges emitted by stress on material, such as steelreinforced concrete. LANL scientists are working on the technology that could provide early warnings of potential failures in highway bridges, according to officials. Researchers here are hoping small sensors put on bridges about the size of a credit card and costing only $1 a piece could provide an early warning to potential failures like the one in Minneapolis.

20

WSN Applications

21

WSN Applications

22

WSN Applications … for Internet •  Still a wide range of applications to come when sensors can globally exchange information with entities on the Internet: –  reaching, for instance, home environments. –  creating what already has been called: •  “network of things”, •  “tangible Internet” •  “Blogjects in the world of interconnected things”.

23

WSN Communication Architecture •  The communication architecture may be initially considered in the following way

24

WSN Communication Architecture •  The communication architecture may be initially considered in the following way

25

WSN Communication Architecture •  Due to cross-layer melting, it is evolving to the following

Power Management Plane

Cross-Layer Management Plane

Application Layer

26

WSN Communication Architecture •  Cross-layer contributes to autonomy and selfconfiguration of the nodes –  Because any component can directly access to resources and processes provided by another component

•  Flexible access to information and control is convenient because of: –  Inherently restrictions of sensors –  Specific applications requirements

27

WSN Communication Architecture The case of Zigbee •  ZigBee: Specification for WSN –  Built upon IEEE 802.15.4 •  Standard for WPAN •  Low energy consumption, low transmission rate (250kbps), low cost

–  Security: AES-128

•  Hierarchical model •  But with limited support to cross-layer –  Management –  Security

28

WSN Communication Architecture The case of Zigbee

29

Security concerns and possible attacks

30

Security concerns and possible attacks •  The reasons why security becomes an essential issue in WSN are: –  sensitive nature of many of those applications –  untrusted environment where the sensors are deployed –  share the drawbacks of any wireless network: •  natural physical insecurity of wired communications is present.

31

Security concerns and possible attacks •  That combination makes WSN difficult to protect because every node becomes a potential point of logical and physical abuse –  Logical: •  monitor transmissions, •  intercept and modify data, and •  impersonate nodes injecting false information to others.

–  Physical: •  gain access to one or more of them and reprogram their operation •  introduce his own fake nodes.

32

Security concerns and possible attacks •  Could tamper-resistant sensors help in hardening some of those attacks? –  It would increase the cost, and their use would not result so attractive –  Approximate prices: •  Set 8 MICAZ nodes + programming board: 3000$ aprox. •  Set 10 Telos nodes + programming board: 1200$ aprox.

33

Security concerns and possible attacks •  Attacks can be performed in a variety of ways, most notably as denial of service attacks, but also through traffic analysis, privacy violation, physical attacks, etc. •  Denial of service: –  Can range from simply jamming the sensor’s communication channel to more sophisticated attacks –  Simple jamming is the transmission of a radio signal that interferes with the radio frequencies being used by the sensor network –  Retransmission of packets deplete a sensor node’s power supply by forcing too many retransmissions

34

Security concerns and possible attacks •  Sybil attack: –  A malicious device illegitimately taking on multiple identities. –  It is effective against routing algorithms, data aggregation, etc. •  Regardless of the target, it functions similarly.

–  For instance, to attack the routing protocol, the Sybil attack would rely on a malicious node taking on the identity of multiple nodes, thus routing multiple paths through one malicious node.

35

Security concerns and possible attacks •  Traffic Analysis: –  For an adversary to effectively render the network useless, the attacker can simply disable the base station. •  The base station can be identified (with high probability) without even understanding the contents of the packets (when the packets are themselves encrypted)

–  Reason: nodes closest to the base station tend to forward more packets. Therefore, an attacker needs only monitor to whom a node sends its packets.

36

Security concerns and possible attacks •  Node replication: –  An attacker seeks to add a node to an existing sensor network by copying (replicating) the ID of an existing node. •  Packets can be corrupted or even misrouted.

–  An attacker can copy cryptographic keys to the replicated sensor and can also insert the replicated node into strategic points in the network •  could easily manipulate a specific segment of the network

37

Security concerns and possible attacks •  Attack against privacy: –  Sensor networks aggravate the privacy problem because they make large volumes of information easily available through remote access. –  Adversaries need not be physically present to maintain surveillance. •  They can gather information in a low-risk, anonymous manner. •  Remote access also allows a single adversary to monitor multiple sites simultaneously.

38

Security concerns and possible attacks •  Physical attacks: –  Sensor networks typically operate in hostile outdoor environments. •  The small form factor of the sensors, and the unattended and distributed nature of their deployment, become a problem.

–  Physical attacks destroy sensors permanently, so the losses are irreversible. –  Attackers can: •  •  •  • 

extract cryptographic secrets, tamper with the associated circuitry, modify programming in the sensors, replace them with malicious sensors under the control of the attacker, •  etc.

39

Security services

40

Security services •  After the overview of the security concerns and possible attacks that can be launched to WSN, it is possible to argue about the security services •  Data Confidentiality –  A sensor network should not leak sensor readings to its neighbors (especially in a military application, the data stored in the sensor node may be highly sensitive). –  Key distribution is extremely important to build a secure channel. –  Sensor identities and public keys should also be encrypted

•  Authentication –  The receiver needs to ensure that the data used in any decisionmaking process originates from the correct source –  Also necessary for many administrative tasks (e.g. network reprogramming). 41

Security services •  Data Integrity –  With confidentiality, an adversary may be unable to steal information. However, it can change the data, so as to send the sensor network into disarray. –  For example, a malicious node may add some fragments or manipulate the data within a packet, that is later sent to the original receiver.

•  Data Freshness –  It is necessary to ensure that the data is recent and that no old messages have been replayed. –  especially important when there are shared-key strategies employed in the design.

42

Security services •  Availability –  Adjusting the traditional encryption algorithms to fit within the WSN is not free, and will introduce some extra costs. •  Additional computation consumes additional energy. If no more energy exists, the data will no longer be available. •  Additional communication also consumes more energy.

–  A single point of failure will be introduced if using the central point scheme, what greatly threatens the availability of the network.

•  Self-Organization –  WSN must self-organize to support multihop routing, and also to conduct key management and building trust relations. –  If self-organization is lacking in a sensor network, the damage resulting from an attack or even the hazardous environment may be devastating. 43

Security services •  Time Synchronization –  In order to conserve power, an individual sensor’s radio may be turned off for periods of time. –  Furthermore, sensors may wish to compute the end-to end delay of a packet as it travels between two pairwise sensors. –  A more collaborative sensor network may require group synchronization for tracking applications, etc.

•  Secure Localization –  Often, the utility of a sensor network will rely on its ability to accurately and automatically locate each sensor in the network. –  For instance, a sensor network designed to locate faults will need accurate location information in order to pinpoint the location of a fault.

44

Security services •  Non-repudiation –  A node can not deny sending a message previously sent

•  Forward secrecy –  A sensor should not be able to read any future message after it leaves the network

•  Backward secrecy –  A joining sensor network should not be able to read any previously transmitted message

45

Security services •  BUT, there are important issues that directly affect requirements. •  It is questionable if primitives traditionally used in other networking scenarios are suitable for sensor networks –  because small amount of RAM memory. –  and very modest computational power.

•  Thus, cryptographic operations must be designed to minimize the use of memory. •  Also, design of secure protocols should consider that –  Each bit transmitted consumes as much power as executing hundreds of instructions.

46

Security services •  It is necessary to use that collection of security services (and others) in order to build solutions against attacks: –  Defending against DoS attacks •  Identify the jammed part of the WSN and route around.

–  Secure broadcasting and multicasting •  Based on encryption techniques and key management techniques.

–  Defending against attacks on Routing Protocols •  For instance, employing redundancy. Multiple identical messages are routed between the source and the destination (supported by an authentication scheme).

–  Defending against the Sybil attack •  For instance, by using a trusted node that validates identity of the other nodes.

47

Security services –  Detecting node replication •  Randomized multicast and line-selected multicast

–  Defending against attacks on sensor privacy •  Anonymity mechanisms to protect location information

–  ….

48

Issue – Security Primitives

49

•  It is crucial to provide basic security primitives to the nodes in order to:   Provide a minimal protection to the information flow   Provide a foundation to create secure protocols

•  We will consider: Symmetric Key Encryption (SKE), Message Authentication Codes (MAC), Public Key Cryptography (PKC) •  HW is expensive; so SW is, in most cases, the way to go.

50

•  Example of SW SKE on Sensor Nodes: TinySEC protocol   Block Ciphers (Skipjack, RC5,… AES)   Non-standard CBC (IV uses counter – replay protection)   Low RAM (256B Data, 8KB Instruction)   Low Computational/Latency Overhead (Max 8% TinySEC)   Low Energy Usage

51

•  Hardware SKE for sensor networks   Included in IEEE 802.15.4 – Zigbee

•  Features   Included in 802.15.4 radio chips   AES in stream (CTR) or block (CBC) modes   Less overhead than SW implementations o  Memory, Computational (on-chip)

52

•  MAC (usually) reuses algorithms used in SKE   Most common: CBC-MAC o  Creates a MAC using a block cipher

  Why reuse? o  Efficient and Fast o  Less memory footprint for calculating MAC

•  Done in both HW and SW implementations

53

•  PKC was initially rejected as “non-possible” in a sensor node   Decrypt 64 bits (1024 bit key) in 14.5 sec.

•  Afterwards, ECC looks promising   Fundamental operation underlying ECC: point multiplication   PM: 0.81s (secp160r1) → 2.19s (secp224r1)   Less memory/energy usage than RSA

54

•  First usable PKC over TinyOS: EccM 2.0   Deeply optimized!   Using Elliptic curves (ECC) over F2p with keys of 163 bits   Low RAM (≈ 1KB Data, 34KB I’s)   Acceptable Computational times o  Generation of Keys / Shared Secret = 34 sec each   Acceptable Energy Usage o  ±54.000 PKC operations in its lifetime

55

56

•  The communication channel between any pair of devices must be protected •  The protection is provided by the security primitives; however, primitives make use of keys   Thus, a Global Key Infrastructure is needed

•  Basic factors:   Key Distribution Protocols   Key Storage Policies   Key Maintenance Procedures

? .. .. 57

•  Key Distribution Protocols   How keys are issued to sensor nodes

•  Key Storage Policies   Number of keys inside a node in order to securely reach all other network nodes   Influence: o  Network resilience (% of network under control of the adversary) o  Node free memory

•  Key Maintenance Procedures   How nodes can be included/excluded from the network   How keys are refreshed

58

•  Three different types of Key Infrastructure Scenarios: •  Global/Flat – Node reaching “any” other nodes in the network •  Clustered – Secure Groups of nodes •  Local – Dynamically generated autonomous secure groups

Global (GKI)

Clustered (CKI)

Local (LKI) 59

•  Key Distribution   Before Deployment o  It is not possible to capture keys during distribution o  (In most of cases) Network topology should be known   After Deployment o  Self-configuration. Prone to be attacked

60

•  Key Distribution   Two types of keys: o  Local communications o  Communications between clusters

•  General Solutions? “Rich uncle” cluster head (manages key distribution, storage and maintenance)

61

•  Key Distribution   Keys must be distributed dynamically

•  Key Storage   Limited to actual memory of the node

•  Key Maintenance   Groups can be very dynamic, and operations should be safe   “Forward security”, “Secure tunnel”

62

63

•  Maximum transmission distance of current generation of sensor nodes ranges between 100 and 300 mts   Thus, messages can not be transmitted directly between any two nodes   A routing infrastructure is needed

•  Algorithms should work:   Even when nodes start to fail due to energy issues   With any network size and node density   Providing a certain quality of service   Minimizing the memory usage, speed and energy consumption

•  And Security must be considered…

64

•  Wide range of attacks against routing •  Spoofed, altered or replayed routing information •  Selective forwarding •  Sinkhole attacks / Wormholes •  Sybil attack •  ACK spoofing

65

•  Key infrastructure may help in the defense by authenticating nodes and protecting the routing infrastructure   But this is not enough   Malicious nodes and denial of service still possible

•  It is essential to make the routing algorithm robust against attacks •  Some work focus on protection of existing routing protocols •  Others focus on designing new protection techniques

66

67

•  Main purpose of Sensor networks: Send data to users •  Large amounts of raw data •  Dense networks => Redundant data •  Costly! (energy, time,…). Solution: Aggregate (summarize) data •  (Data, Data, … , Data) → Report •  Who? Aggregators (Cluster heads, Special nodes,…)

.. ..

68

•  Aggregation is prone to be attacked   Normal o  Data injection, o  Data integrity, o  Jamming

69

•  It is possible to make use of strong aggregation functions that are resilient against internal attacks •  There are solutions to discover whether reports are sent by a malicious aggregator •  Other approaches take advantage of the density of sensor networks by using the nodes in the neighborhood of the aggregator as witnesses

70

71

•  User/Admin can only access to Base Station (directly or not)   Base station only collects data from nodes   Impossible to know state of the nodes (energy!)

•  Solution: Audit subsystem   Able to inform about the internal state of a node/group   Should be treated the same as environmental data (e.g. Queries)

•  Similar to SNMP… And different   Should be more simple, energy/space efficient

72

•  Based on audit information: Intrusion Detection Systems   Intrusion: “Set of actions that can lead to an unauthorized access or alteration of a certain system”   IDS: Monitor network, detects problematic situations, alerts users   Tools: Anomaly detection, Misuse detection

•  Context of IDS in WSN   Multiple points of attack   Calculations should be done on Sensor Nodes – constraints!   User/Admin is far from the source of the problem

73

•  What to solve, what techniques to use   Simple and specialized architecture   Efficiently distribute detection tasks over the nodes (agents)   Allow agent cooperation   Rules: Simple (easy to parse, small to store)   Alerts: Small, Useful

74

75

•  Two types of privacy   Network Privacy o  Privacy of the network itself (nodes, information) o  Sometimes important (battlefield), sometimes not (earthquake)

  Social Privacy o  Privacy of the subjects under surveillance

76

•  Threats to network privacy   Content Privacy •  Meaning of a communication exchange? Messages, Context   Identity Privacy •  Deduce identities of nodes in a communication   Location Privacy •  Infer (or approximate) physical position of node

77

•  Nodes will get smaller, cheaper…   Easy to create “surveillance” network   Get data about subjects at a “safe” distance   Automatic data collection, analysis and event correlation!

•  Doubled-edged sword: Network privacy, Social privacy   Detection of malicious networks!

78

79

•  Mobile Agents   Could be useful on a Sensor Network context   Constrained environment, no protection

•  Delegation between the Base Station and the Sensor Nodes   All previous cases: static environments

•  Automatic reaction against external/internal problems   Denial of Services attacks

80

WSN Security

the data from the sensors, aggregate and send it to the outside world: – A central computing system where the information is stored for different purposes.

4MB Sizes 1 Downloads 153 Views

Recommend Documents

WSN-CPS-SHM_supp.pdf
A. STATE-OF-THE-ART REVIEW OF WSN-BASED SHM AREAS. We begin by briefly summarizing previous reviews on closely related topics. To the best.

Fuzzy Based QOS in WSN - IJRIT
Keywords: Fuzzy Logic, Quality of Service (QOS), Wireless Sensor Network (Wsn). 1. ... requirement such as the performance measure associated with event ...

Fuzzy Based QOS in WSN - IJRIT
The system results are studied and compared using MATLAB. It gives better and .... yes/no; high/low etc. Fuzzy logic provides an alternative way to represent.

Poster: Building a Stairway to Centralised WSN ... - Pablo Corbalán
Cork Institute of Technology, Cork, Ireland ... C.2.1 [Network Architecture and Design]: Wireless ... Centralised network management in wireless sensor net-.

Improved Secure Routing Scheme in WSN - International Journal of ...
we will assign keys manually with Hash Function which is Blowfish. ... Authentication and encryption based on symmetrical cryptography are lightweight security ...

generic technique for interconnection between wsn and ip network
transparent interconnection between WSN and IP network. It is generic as it can work with address- centric and data-centric WSNs. It does not require ...

Improved Secure Routing Scheme in WSN - International Journal of ...
evaluate the performance of Ad hoc On Demand Distance Vector (AODV) routing protocol for monitoring of critical conditions with the help of important metrics like delay, throughput and network load with different techniques in different scenarios for

A modified approach for aggregation technique in WSN - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 7, ... Wireless sensor network are used in many application such as military, ...

A modified approach for aggregation technique in WSN - IJRIT
In computer science and telecommunications, wireless sensor networks are an ... and conferences arranged each year. ... Figure 1: Types of grids (a) Triangular lattice (b) Square grid (c) Hexagonal grid ... Degree-degree Correlations”, in Proc.

Power Saving Data Aggregation using FR Approach in WSN
Abstract. This Paper Presents the power of wireless sensor networks lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. Usage scenarios for these devices range from real time tracking, to monitoring of en

Group Based KPD Scheme in WSN 1 Introduction
... as they are plotted in very hostile regions, (say in border line of a country, deployed from ... Later Chan, Perrig and Song [5] proposed a modified version of.

Using Cooja for WSN Simulations: Some New Uses and Limits - EWSN
The Cooja/MSPSim network simulation framework is widely used for developing and debugging, but also for per .... Provided by the Contiki OS project [7], the Cooja network simulator [16] has become a widely used tool in the ..... IEEE Computer Society

Enhance Security and Usability Security and Usability Security and ...
Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authenticati

Demo: Deploying a Drone to Restore Connectivity in a WSN - EWSN
CTVR, Department of Computer Science, University College Cork, Ireland. Email: 1t.truong ... pair problem where a drone places a new sensor node to re- place a failed node .... It then sends the received data to the laptop which ex- tracts the ...

improving the quality of service (qos) in wsn routing using trust and ...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the

The Psychology of Security - Schneier on Security
This means that, as a successful species on the planet, humans should be really good at ... A lot of this can be chalked up to bad information or bad mathematics .... as modern human society, technology, and the media. And, even worse, they ...

The Psychology of Security - Schneier on Security
Behavioral economics looks at human biases—emotional, social, and ..... as modern human society, technology, and the media. And, even worse, they can be made to fail by others—politicians, marketers, and so on—who exploit our ..... some commute

Information Security and Acceptable Use Security Policy.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Information ...

A Review to Study Fuzzy Technique on Localizing Sensors In WSN
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 638- 644. Kanika Malhotra, IJRIT ... Kanika Malhotra. Department of Computer Science ... In today scenario, Wireless sensor network is very much in

Detection of DOS attack and Sink hole In WSN
paper given a mechanism to launch sinkhole attack primarily based attacks like selective forwarding and region attack in wireless device networks. The projected work embrace detection and step rules to form the device network secure from these attack

A Review to Study Fuzzy Technique on Localizing Sensors In WSN
5) Quality of service management. A. Design and deployment. Nodes can be arrange by inserting sensor nodes one after .... of truth among them. For example, the declaration is, today is sunny, may be. 100% true if there are no clouds, 80% true if ther

A Review to Study Fuzzy Technique on Localizing Sensors In WSN
Using GPS is very expensive, improbable and not suitable for WSN operating environment that's why sensor nodes are self prearranged in. Wireless sensor ... Index Terms—Node localization, wireless sensor network, GPS, Fuzzy logic technique ... track