380 likes | 508 Vues
This document provides an in-depth overview of aggregation techniques within Wireless Sensor Networks (WSNs), detailing both non-secure and secure aggregation methods. It discusses data-centric routing, statistical aggregation, and the use of protocols such as SOAP for efficient data management. The necessity of security measures like integrity and authentication in secure aggregation is highlighted, as well as the challenges and vulnerabilities present in existing systems. Additionally, various cryptographic protocols for enhancing WSN security are mentioned, emphasizing the critical need for reliable data transmission from sensors to base stations.
E N D
SECURITY FOR IN NETWORK PROCESSING AND AGGREGATION EE5723 – Network Security April 08, 2010 Michigan Tech University
Outline • Overview of Aggregation • Basics of non-secure aggregation • Basics of secure aggregation • Aggregation Protocols and Techniques Michigan Tech University
Overview of Aggregation “Aggregation collects results from several sensors and calculates a smaller message that summarizes the important information from a group of sensors.” [1] Michigan Tech University
Overview of Aggregation Michigan Tech University
Overview of Aggregation • Aggregation is helpful as it reduces the amount of traffic on a network. • This helps prolong battery life. • Can provide less processing needs. Michigan Tech University
Basics of Non-secure Aggregation • A few different types of aggregation techniques: • Data Centric Routing [4]. • Statistical aggregation. • Simple Object Access Protocol (SOAP) [9] Michigan Tech University
Data-centric routing • Data-centric routing is more about removing duplications unnecessary traffic in parents in a tree. • This could include: • Duplicate packet removal • Removing packets from sensors with similar readings • Three Methods: • Center at Nearest Source (CNS) • Shortest Paths Tree (SPT) • Greedy Incremental Tree (GIT) Michigan Tech University
Data-centric routing Michigan Tech University
Statistical Aggregation • Application of estimation theory. • It can involve: • Minimums and/or maximums • Different types of averaging • Medians • Counts • Normal distributions • Lots of other types of statistical inference. Michigan Tech University
SOAP in WSN • Simple Object Access Protocol (SOAP) • Based on XML (Extensible Markup Language) • Easily integrated into different programming languages. • Message types: • 1. A node dispatching a hello message to sinks. • 2. A sink sends a Remote Procedure Call (RPC) to registered nodes. • 3. Nodes responding to the RPC. Michigan Tech University
SOAP in WSN • The modified SOAP allows an adaptive Pull strategy instead of a traditional push strategy. • Requestor sends request to Invoker. • The Invoker processes what Requestor wants and sends back results when the results have been obtained. Michigan Tech University
SOAP in WSN • While security was not initially implied in this protocol it could easily be adapted to one of the few techniques introduced in this presentation. Michigan Tech University
Drawbacks of Aggregation • More computation for internal nodes • More delays in getting from edge node to Central Node. • Not as useful when full data is needed. Michigan Tech University
Flaws on Existing Aggregation • Straight averaging is insecure if even a single node is compromised. • Geometric Mean floor((31+32+30+29+31+200)/6) = 58 • Harmonic Mean floor(6/(1/31+1/32+1/30+1/29+1/31+1/200)) = 35 • Minimum and maximum functions insecure • Example: Ice or Fire on thermostat (0 or 200 degrees) Michigan Tech University
Attacks on Existing Aggregation • Network attacks • Eavesdropping • DoS • Replay • Artificial data insertion (Stealthy Attack) • Intruder Nodes • Physical Attacks • Tampering • Physical compromise of nodes Michigan Tech University
Basics of Secure Aggregation • Security needed to transfer data reliably from the sensor to the base station. • With aggregation intermediate nodes require access to the data for the aggregation. This introduces a need to determine if the data received from aggregators is reliable. • Cannot bootstrap all keys to device as applications require a dynamic structure. Michigan Tech University
Basics of Secure Aggregation • Standard Public key is too intensive for limited computing environment. • The basic approaches of network security apply to secure aggregation though majority of research covers these: • Integrity • Authentication Michigan Tech University
Integrity in Secure Aggregation • The integrity in secure aggregation helps make sure that intermediate and aggregator nodes have not altered the data. • This can involve a hash function, most commonly the Message Authentication Code (MAC). Michigan Tech University
Authentication in Secure Aggregation • The use of authentication helps ensure that intruder nodes don’t insert invalid data into the aggregation values. • This can have severe effects on the system as mentioned beforehand. • Two protocols that help with authentication include: • uTESLA • MAC (Assuming a certain key is used) Michigan Tech University
WSN Security Protocols • Security Protocols • ECC – Elliptic Curve Cryptography [2] (Not Covered) • MAC – Message Authentication Code [8] • Merkle Hash Tree [7] • SPINS – [5] [6] • SNEP – Secure Network Encryption Protocol • µTESLA – Micro Timed Efficient Stream Loss-Tolerant Authentication Michigan Tech University
MAC/HMAC • Message Authentication Code • Used to verify message authenticity • HMAC – Hashed MAC • Uses cryptographic hashing function to create the MAC • Used to check data integrity MAC(text)t = HMAC(K, text)t = H((K0 ⊕ opad )|| H((K0 ⊕ ipad) || text))t • Does not provide non-repudation • Because it uses Symmetric Keys • Does prevent replay attacks Michigan Tech University
MAC/HMAC Image courtesy of Wikipedia Michigan Tech University
Merkle Hash Tree • The hash tree is a way to store hash information. • It is a fairly easy concept. • hash 0 = hash( hash 0-0 + hash 0-1 ) Where + indicates concatenation. Michigan Tech University
µTESLA • Micro Timed Efficient Stream Loss-Tolerant Authentication • Derived from TESLA protocol, developed by A. Perrig at Carnegie Mellon University • Broadcast Authentication • Strong Freshness Michigan Tech University
µTESLA • Addresses problems with TESLA • Digital signature for packet authentication • µTESLA uses only symmetric mechanisms • Overhead of 24 bytes/packet • µTESLA discloses key once per time interval • One-way key chain is too big • µTESLA restricts number of authenticated senders • Assumptions • Base station, nodes must be loosely synchronized • Each node must know upper bound for max sync error Michigan Tech University
µTESLA • The basic protocol • One-way key chain and delayed key disclosure • Keys : Ki = F(Ki+1) • F public one-way function • Each node knows Ki and predefined time slot intervals • Sender periodically broadcasts current key • K0 is initial commitment to chain, base station gives K0 to all nodes Michigan Tech University
Issues with µTESLA • Important parameters: interval length, disclosure delay • Delay must be greater than RTT for integrity • Parameters define maximum delay until messages can be serviced • Nodes must buffer all broadcasts until key is disclosed. • Counters must be (somewhat) synchronized Michigan Tech University
Aggregation Protocols and Techniques • SecureDAV [2] • Elliptic Curve Cryptography • Merkle Hash Trees • Secure Aggregation for Wireless Networks [1] • Non-confidential • µTESLA • MAC Hashing (Any algorithm would do) Michigan Tech University
SecureDAV • Prevents acceptance of faulty readings • Doesn’t make assumption that nodes are honest. • Develops private cluster key for each cluster. • Only distributes a chunk of the private key to the cluster nodes. • This prevents an attacker from obtaining the full key. • Up to t nodes can be compromised. t < n/2 Michigan Tech University
SecureDAV • Uses Averaging • Transmit average back to sensors for verification. • If verified, sensors do partial signature. • Aggregator combines partial signatures into a full one. • Average and full signature sent to the base station. • Cluster Head integrity ensured using Merkle hash Trees Michigan Tech University
SecureDAV • Issues • If greater than n/2 nodes are compromised in a cluster of n nodes then the cluster can be compromised. • Covers • Basic confidentiality • Integrity Michigan Tech University
Secure Aggregation For WSN • Protocol focuses on Integrity and Authentication • It has a fixed base station • Uses uTESLA from SPINS Protocol • Incorporates a MAC (non-specific) • Uses delayed aggregation and authenticaion. • Non-specific aggregation technique. • Shared secret with base station established before deployment. Michigan Tech University
Secure Aggregation For WSN Tree From [1] Michigan Tech University
Secure Aggregation For WSN • Helps protect against: • Intruder Node Attacks • Authentication (Doesn’t have initial Key) • Artificial Data • Hash • Replay • Using the uTESLA key in the Hash Michigan Tech University
Secure Aggregation For WSN • Compromised Node Attacks: • With access to node information it has the ability to forge node messages. • No cryptographic way to prevent this, but different aggregation techniques can detect false readings. • This is harder with intermediate nodes a the Hash from children are harder to forge. Michigan Tech University
Conclusions • Aggregation can provide many benefits. • Many different protocols exist with different types of goals in mind. • Intermediate node data processing creates a need for a special kind of security. • Protocols with lightweight security implementations are important. Michigan Tech University
Sources • [1] L. Hu, D. Evans, “Secure Aggregation for Wireless Networks,” Workshop on Security and Assurance in Ad hoc Networks, 2003. • [2] A. Mahimkar, T. Rappaport, “SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks”, 2004 • [3] Jing Deng, Richard Han, and Shivakant Mishra, “Security Support for In-Network Processing in Wireless Sensor Networks” ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), 2003 • [4] B. Krishnamachari, D. Estrin, S. Wicker, “The Impact of Data Aggregation in Wireless Sensor Networks” • [5] Robert Anderson “SPINS:Security Protocolsfor Sensor Networks,” http://web.pdx.edu/~raand/files/SPINS.pdf, May 11, 2004. • [6] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001. Michigan Tech University
Sources • [7] B. Przydatek, D. Song, A. Perrig, “SIA: Secure Information Aggregation for Sensor Networks,” SenSys’03, 2003. • [8] M. Bellare, R. Canetti, H. Krawczyk, “Keying Hash Functions for Message Authentication,” 1996. • [9] A. Al-Yasiri, A. Sunley, “Data aggregation in wireless sensor networks using the SOAP protocol,” Journal of Physics: Conference Series 76, 2007 Michigan Tech University