1 / 16

Security in Self-organizing Systems

Security in Self-organizing Systems. Refik Molva Institut EURECOM refik.molva@eurecom.fr http://www.eurecom.fr/ce/researchce/nsteam.en.htm. Self-organizing Systems. System or Network consists of a Collection of Ordinary Components No fixed infrastructure No (or limited) organization

josh
Télécharger la présentation

Security in Self-organizing Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security in Self-organizing Systems Refik Molva Institut EURECOM refik.molva@eurecom.fr http://www.eurecom.fr/ce/researchce/nsteam.en.htm

  2. Self-organizing Systems • System or Network consists of a Collection of Ordinary Components • No fixed infrastructure • No (or limited) organization • Ad Hoc Networks • Sensor Networks • P2P Applications • Ubiquitous computing

  3. Self-organizing No(or limited) infrastructure Lack of organization Wireless & Mobile Scarcity of Resources Limited Energy Lack of physical security Lack of connectivity Cooperation Security Challenges • Comm. Security • Key management • Trust Management • Privacy Context-awareness

  4. Communication Security • Secure Routing • ARAN, SRP, ARIADNE, SEAD,TIK • New Challenges • Network coding and security [Gkantsidis, Rodriguez] • Data aggregation [Girao, Schneider, Westhoff] [Castellucia, Tsudik]

  5. Key Management Challenges • Lack of (or limited) • Security infrastructure • Key servers (KDC, CA, RA) • Organization (a priori trust) • p2p • Authentication is not sufficient to build trust Bootstrapping security associations from scratch  Fully distributed  Minimum dependency

  6. Key Management • Symmetric : • Key pre-distribution • Key agreement • Asymmetric Keys • PK Certificate = (ID,PK)CA • Self-organized CA • Web of trust(PGP) • Certificate-less • Crypto-based IDs: ID = h(PK) • ID-based Crypto: PK = f(ID) • Context-awareness • Distance Bounding Protocols • Seeing-is-believing

  7. Key pre-distribution • Sensor Networks – TTP-based [Eschenauer, Gligor ACM CCS’02, H. Chan, A. Perrig et al, Oakland’03] [Wenliang Du et al, INFOCOM’04] • Ad Hoc version – no TTP [A. Chan, INFOCOM’04] Distributed key setup by randomly choosing key rings from a public key space • Cover-Free Family Algorithm • Neighbors determine intersection of their key rings using homomorphic encryption

  8. [cert(PKi)]SK1 [cert(PKi)]SK2 … [cert(PKi)]Ski … CERT(PKi)SK (ID, PK) bindingSelf-organized CA[Zhou, Haas] [Kong, et al.] [Yi, Kravets] [Lehane, et al.][Bechler et al, INFOCOM’04] • Based on threshold cryptography • PROs: distributed, self-organized • CONs: share distribution during bootstrap phase, network density, Sybil attack [cert(PKi)]SK1 [cert(PKi)]SK2 PKi [cert(PKi)]SKi Verification of CERT(PKi)SK by any node using well known PK

  9. (ID, PK) bindingWeb of Trust (PGP)[Hubaux, Buttyan, Capkun] • No CA • Alice  Bob and Bob  Eve  Alice  Eve • Merging of certificate repositories • PROs: no centralized TTP • CONs: initialization, storage, transitivity of trust

  10. (ID, PK) bindingCrypto-based ID • SPKI [Rivest] • Statistically Unique Cryptographically Verifiable IDs [O’Shea, Roe] [Montenegro, Castellucia] IPv6 @ = NW Prefix | h(PK) • DSR using SUCV-based IP addresses [Bobba, et al] PROs: no certificates, no CA CONs: generation of bogus IDs

  11. (ID, PK) bindingID-based Crypto[Halili, Katz, Arbaugh] • ID-based • PK = h(ID) • SK computed by TTP • Threshold Crypto to distribute TTP PROs: no certificates, no centralized server CONs: distribution of initial shares Based on [Boneh, Franklin, CRYPTO 2001]

  12. Trust • Managed environment • A-priori trust • Authentication  trustworthiness • But: • requirement for infrastructure • scarcity of computing resources (sensors) • lack of connectivity (sensors, ad hoc nw) • Open environment • No a-priori trust • authentication does not guarantee correct operation →New paradigms • Trust establishment protocols (history, e-cash, …) [Bussard, Molva, Roudier, PerCom’04, PerSec’04, iTrust’04] • Reputation

  13. Cooperation enforcement Threshold cryptography Token-based [Yang,Meng,Lu] Nuglets [Buttyan,Hubaux] SPRITE [Zhong, Chen, Yang] CONFIDANT[Buchegger,Le Boudec] CORE [Michiardi,Molva] Beta-Reputation [Josang,Ismail] Micro-payment Reputation-based Bittorrent (P2P) Built-in with Application

  14. Summary • Main research focus • Bootstrapping from scratch • New trust paradigms • Optimization (computation, bandwidth) • Solutions yet to come . . . • Interesting applications of cryptography • Some untruths and non-sense  Room for creativity

  15. New Challenges • Opportunistic Communications • No end-to-end connectivity • Collapsed system (Application=network) • Data eventually reaches destination • Trust management • Forwarding of encrypted data • Network coding and cryptography • Data aggregation

  16. Selected Publications • "Analysis of Coalition Formation and Cooperation Strategies in Mobile Ad hoc Networks“in Ad Hoc Networks Journal – Volume 3, Issue 2 , March 2005, Pages 193-219 • “Pocket Bluff- A Cooperation enforcing scheduled pocket switching protocol“submitted to Sigcomm Hotnets IV, July 2005 • “Non cooperative forwarding in ad hoc networks”Networking 2005, 4th IFIP International Conference on Networking, May 2 - 6, 2005, Waterloo, Canada - Springer LNCS Vol 3462, 2005 , pp 486-498 • “Policy-based Cryptography“Financial Cryptography 2005, Dominica, February 2005. • “Ad Hoc Network Security” Chapter 12 in Mobile Ad Hoc Networking,S. Basagni, M. Conti, S. Giordano, I. Stojmenovic (Editors) ISBN: 0-471-37313-3 June 2004, Wiley-IEEE Press • “IDHC: ID-based Hash-Chains for broadcast authentication in wireless networks”, EURECOM Technical Report RR-04-111 • “History-based Trust Establishment Protocols“in PerCom’04 and iTrust’04, March 2004. • “CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”CMS'2002, Communication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security /Borka Jerman-Blazic & Tomaz Klobucar, editors, Kluwer Academic Publishers, ISBN 1-4020-7206-6, August 2002 , 320 pp • "Ad Hoc Network Security" Chapter to appear in Handbook of Information Security, H. Bidgoli (Editor), Wiley & Sons • Other papers on http://www.eurecom.fr/ce/researchce/nsteam.fr.htm Related Events IEEE Workshop on Trust Security and Privacy in Ubiquitous Computing, Sicily June 2005, Niagara Falls, June 2006 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Budapest, July 2005, Hamburg September 2006. IEEE ICC Network Security and Information Assurance Symposium, Istanbul, June 2006 ESORICS / RAID, Sophia Antipolis September 2004

More Related