7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of...

38
7/13/2007 AIIT Summer Course - F2 S ecurity 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David E. Culler University of California, Berkeley Arch Rock Corp. July 9-13, 2007 Much of this material based on work by David Wagner, UC Berkeley
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    1

Transcript of 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of...

Page 1: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

1

Wireless Embedded Systems and Networking

Foundations of IP-based Ubiquitous Sensor Networks

WSN Security

David E. CullerUniversity of California, Berkeley

Arch Rock Corp.

July 9-13, 2007

* Much of this material based on work by David Wagner, UC Berkeley

Page 2: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

2

Learn From History…

analog cellphones: AMPS1980

1990

2000

analog cloning, scannersfraud pervasive & costly

digital: TDMA, GSM

TDMA eavesdropping [Bar]

more TDMA flaws [WSK]GSM cloneable [BGW]GSM eavesdropping [BSW,BGW]

Future: 3rd gen.: 3GPP, …

cellphones

802.11, WEP

2001

2002

WEP broken [BGW]WEP badly broken [FMS]

WPA

2000

1999

Future: 802.11i

2003

attacks pervasive

wireless networks

Berkeley motes

2002

TinyOS 1.0

TinyOS 1.1, TinySec

2003

sensor networks

Let’s get it right the from the start

802.15.4 AES

AR TinyOS 2 AES

Page 3: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

3

Sensor Network Security

What’s different about sensor nets?

• Stringent resource constraints

• Insecure wireless networks

• No physical security

• Interaction with the physical environment

Back to the 90’s

New

Back to the 70’s

Page 4: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

4

Communications Security

“It doesn’t matter how good your crypto is if it is never used.”

Page 5: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

5

Page 6: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

6

Page 7: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

7

Page 8: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

8

TinySec Design Philosophy

The lesson from 802.11:

• Build crypto-security in, and turn it on by default!

TinySec Design Goals:

1. Encryption turned on by default

2. Encryption turned on by default

3. Encryption turned on by default

Usage must be transparent and intuitive

Performance must be reasonable

4. As much security as we can get, within these constraints

Page 9: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

9

TinySEC Challenges

• Must avoid complex key management– TinySec must be super-easy to deploy

• Crypto must run on wimpy devices– We’re not talking 2GHz P4’s here!

– Dinky CPU (1-4 MHz), little RAM ( 256 bytes), lousy battery

– Public-key cryptography is right out

• Need to minimize packet overhead– Radio is very power-intensive:

1 bit transmitted 1000 CPU ops

– TinyOS packets are 28 bytes long

– Can’t afford to throw around an 128-bit IV here, a 128-bit MAC there

• Today: AES128 in hardware. 802.15.4 defines the frame – with the crypto. Main issue is key management

Page 10: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

10

Easy Key Management

networkbase

station

k

k

k

k

k

k

Making key management easy: global shared keys

Page 11: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

11

Be Easy to Deploy

Making deployment easy:plug-n-play crypto + link-layer security

SecureGenericComm

App

Radio

GenericComm

App

Radio

Page 12: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

12

Perform Well on Tiny Devices

• Use a block cipher for both encryption & authentication

• Skipjack is good for 8-bit devices; low RAM overhead

Radio Stack[MicaHighSpeedRadioM/

CC1000RadioIntM]

TinySecM

CBC-ModeM

SkipJackM

CBC-MACM

Page 13: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

13

Minimize Packet Overhead

Minimize overhead: cannibalize, cheat, steal

dest AM

IVlen

data MAC

2 1 41 4

Encrypted

MAC’ed

Key DifferencesNo CRC -2 bytes

No group ID -1 bytes

MAC +4 bytes

IV +4 bytes

Total: +5 bytes

Page 14: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

14

Tricks for Low Overhead

• CBC mode encryption, with encrypted IV– Allows flexible IV formatting:

4 byte counter, + cleartext hdr fields (dest, AM type, length);gets the most bang for your birthday buck

– IV robustness: Even if IV repeats, plaintext variability may provide an extra layer of defense

– Ciphertext stealing avoids overhead on variable-length packets

• CBC-MAC, modified for variable-length packets– Small 4-byte MAC trades off security for performance; the good news is

that low-bandwidth radio limits chosen-ciphertext attacks

– Can replace the application CRC checksum; saves overhead

• On-the-fly crypto: overlap computation with I/O

Page 15: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

15

More Tricks & Features

• Early rejection for packets destined elsewhere– Stop listening & decrypting once we see dst addr us

• Support for mixed-mode networks– Interoperable packet format with unencrypted packets,

so network can carry both encrypted + unencrypted traffic

– Crypto only where needed better performance

– Length field hack: steal 2 bits to distinguish between modes

• Support fine-grained mixed-mode usage of TinySec– Add 3 settings: no crypto, integrity only, integrity+secrecy

– These come with performance tradeoffs

– Select between settings on per-application or per-packet basis

Page 16: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

16

More Performance Tricks

• App-level API for end-to-end encryption– TinySec focuses mainly on link-layer crypto,

but end-to-end crypto also has value

– End-to-end secrecy enables performance optimizations (don’t decrypt & re-encrypt at every hop), enables more sophisticated per-node keying, but incompatible with in-network transformation and aggregation; thus, not always appropriate

– End-to-end integrity less clear-cut, due to DoS attacks

Page 17: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

17

TinySec: Status

• Design + implementation stable

• Released in TinyOS 1.1– Integration with RFM & Chipcon radio stacks; supports nesC 1.1

– Simple key management; should be transparent

• Widely used for research.

• Basis for much of the WSN security research.

Page 18: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

18

TinySec Evaluation

Wins:

• Performance ok

• Integration seems truly easy

Neutral:

• Out of scope: per-node keying, re-keying, sophisticated key mgmt; PKI; secure link-layer ACKs

• No security against insider attacks;What if a node is captured, stolen, or compromised?

Losses:

• Not turned on by default in TinyOS. • Not turned on in TinyOS 2.0…

Page 19: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

19

AES128 Era

• Almost all IEEE 802.15.4 radios provide AES-128 in hardware

– except Atmel RF230

• Encryption and Authentication ON BY DEFAULT in AR TinyOS2.0-based Primer Pack / IP

• Completely transparent under UDP/TCP over 6LoWPAN

• Simple network-wide key established through secure physical exchange at commissioning.

– Key transferred over wired USB

– Physical proximity and security

– Stored in config flash

Page 20: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

20

AES128 Block Cypher

• KeyExpansion using Rijndael's key schedule

• Initial Round – AddRoundKey

• Rounds – SubBytes — a non-linear substitution step

where each byte is replaced with another according to a lookup table.

– ShiftRows — a transposition step where each row of the state is shifted cyclically a certain number of steps.

– MixColumns — a mixing operation which operates on the columns of the state, combining the four bytes in each column

– AddRoundKey — each byte of the state is combined with the round key; each round key is derived from the cipher key using a key schedule.

• Final Round (no MixColumns) – SubBytes – ShiftRows – AddRoundKey

Page 21: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

21

IEEE 802.15.4 AES128

• Four modes– NULL

– AES-CTR: Confidentiality

– AES-CBC-MAC: Authentication

– AES-CCM: Encryption and Authentication

• Packet Formats

• ACL entries

Page 22: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

22

Replay protection

• NONCE used to prevent replay attacks– Each packet must be “newer” than ones previously received

Page 23: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

23

Vulnerability Analysis

• Multiple ACLs a potential problem– If they share Key and Counter, combining packets intended

for distinct destinations can reveal content.

– Simple ACL management (network wide)

• Nonce state across power cycling

Page 24: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

24

II. Communications Security: What Crypto Can’t Do

“If it’s provably secure, it’s probably not.”-- Lars Knudsen

Page 25: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

25

Limitations of Crypto

• Can’t prevent traffic analysis

• Can’t prevent re-transmitted packets

• Can’t prevent replayed packets

• Can’t prevent delayed packets

• Can’t prevent packets from being jammed

• Can’t prevent malicious insiders, captured nodes

• Crypto is not magic fairy dust;It won’t magically make insecure services secure.

Page 26: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

26

Isn’t Crypto All We Need?

Crypto doesn’t automatically make X secure, where:

• X = network programming– Attacker could replay old programs

• X = time synchronization– Attacker could delay beacon packets, propagating wrong timing

• X = routing– Some attacks on next slide

• X = localization– Attack in three slides

• X = aggregation– Attacks after a few more slides

Page 27: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

27

Example: Attacks on Routing

Hello flood attack:

• Broadcast really loudly; then everyone will think you are near them.

Wormhole attack:

• Tunnel packets from one part of the network and replay them in a different part.

Page 28: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

28

Protocols analyzed in [KW03]

Protocol Relevant attacks

TinyOS beaconing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods

Directed diffusion and multipath variant

Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods

Geographic routing (GPSR,GEAR)

Bogus routing information, selective forwarding, Sybil

Minimum cost forwarding Bogus routing information, selective forwarding, sinkholes, wormholes, HELLO floods

Clustering based protocols (LEACH,TEEN,PEGASIS)

Selective forwarding, HELLO floods

Rumor routing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes

Energy conserving topology maintenance

Bogus routing information, Sybil, HELLO floods

Page 29: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

29

Secure Location Services

• For more details: see the Echo protocol [SSW03], a secure protocol for location verification

• Applications: location-based access control

Page 30: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

30

IV. Tolerating Malicious Data: Resilient Aggregation

Page 31: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

31

An Example

networkbase

station

Computing the average temperature

67°

64°69°

71°68°

f (67°, …, 68°)

where f (x1, …, xn) = (x1 + … + xn) / n

Page 32: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

32

An Example + An Attack

networkbase

station

Computing the average temperature

67°

64°69°

71°68°

f (67°, …, 1,000°)

where f (x1, …, xn) = (x1 + … + xn) / n

1,000°

result is drastically affected

Page 33: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

33

Statistical Theory

• First, some background:– Let D(Θ) be a parametrized distribution on (Θ = param),

X = (X1, …, Xn) denotes n samples from D(Θ)

– f : n → is an estimator if Θ’ = f (X) is an estimate of Θ

– The root mean square error of an estimator f is rms(0) = E[(Θ’ – Θ)2]1/2

• Next, a novel defense: resilient aggregation– A k-node attacker A is a function A: n → n that changes only k of its

inputs. Let Θ* = f (A(X)), rms(k) = maxA E[(Θ* – Θ)2]1/2

– Definition: f is (k, α)-resilient if rms(k) ≤ α rms(0)

– E.g.: the “average” is an estimator, but it is not (1, α)-resilient for any constant α

Page 34: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

34

Relevance of Resilience

• Intuition– The (k, α)-resilient functions are exactly the ones that can be

meaningfully and securely computed in the presence of k malicious insiders.

• Formalism– (see paper)

Page 35: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

35

Results (excerpts)

f … is (k, α)-resilient, where

minimum α = ∞

maximum α = ∞

sum α = ∞

average α = ∞

average, discarding 5% outliers

α ≈ 6.28 k /n for k < 0.05 nα = ∞ for k > 0.05 n

median α ≈ 0.32 k for k < 0.5 n

max α = ∞

count α 0.25 k /n

(assuming n independent Gaussian/Bernoulli distributions)

Page 36: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

36

Hard: In-Network Resilient Agg.

network

In-network aggregation introduces new security challenges

2

4

1 0 1 1

2

Page 37: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

37

Hard Problems

• Communication security– Defeating traffic analysis; spread spectrum for real?

• A library of secure distributed services & protocols

• Security against node compromise/capture– e.g., routing that can tolerate just one malicious insider?

– Byzantine attack tolerance, on the cheap?

• Privacy

Page 38: 7/13/2007 AIIT Summer Course - F2 Security 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks WSN Security David.

7/13/2007AIIT Summer Course - F2 Security

38

Summary

• Crypto helps, but isn’t a total solution– Be aware of the systems tradeoffs

• Seek robustness against insider attack– Resilience gives a way to think about malicious/captured nodes

– The law of large numbers is your friend