26
Authors : Chris Karlof, David Authors : Chris Karlof, David Wagner Wagner Presenter : Shan Bai Presenter : Shan Bai Secure Routing in Secure Routing in Wireless Sensor Wireless Sensor Networks : Attacks Networks : Attacks and Countermeasures and Countermeasures

Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures

Embed Size (px)

Citation preview

Authors : Chris Karlof, David WagnerAuthors : Chris Karlof, David Wagner

Presenter : Shan BaiPresenter : Shan Bai

Secure Routing in Secure Routing in Wireless Sensor Wireless Sensor

Networks : Attacks Networks : Attacks and Countermeasuresand Countermeasures

Presentation OutlinePresentation Outline IntroductionIntroduction BackgroundBackground Sensor Networks vs. Ad-Hoc Sensor Networks vs. Ad-Hoc

networksnetworks Problem StatementProblem Statement AttacksAttacks CountermeasuresCountermeasures

IntroductionIntroduction Propose security goals for routing in Propose security goals for routing in

wireless Sensor networkswireless Sensor networks Show how certain attacks against Show how certain attacks against

Ad-hoc networks and peer-to-peer Ad-hoc networks and peer-to-peer networks can be adapted into more networks can be adapted into more powerful attacks against sensor powerful attacks against sensor networksnetworks

Provide a list of attacks and their Provide a list of attacks and their countermeasurescountermeasures

ContributionsContributions Propose threat models and security goals for Propose threat models and security goals for

secure routing in wireless sensor networkssecure routing in wireless sensor networks Introduce TWO new classes of Attacks for Introduce TWO new classes of Attacks for

Sensor networksSensor networks SinkHole attacksSinkHole attacks HELLO flood attacksHELLO flood attacks

Show how the attacks against Ad-hoc Show how the attacks against Ad-hoc networks and peer-to-peer networks can be networks and peer-to-peer networks can be adapted into powerful attacks against adapted into powerful attacks against sensor networkssensor networks

Give a thorough security analysis of major Give a thorough security analysis of major routing protocols and energy conservation routing protocols and energy conservation topology maintenance algorithms for sensor topology maintenance algorithms for sensor networksnetworks

Discuss countermeasures and design Discuss countermeasures and design considerations for secure routing protocolsconsiderations for secure routing protocols

BackgroundBackground Sensor Network : Heterogeneous system Sensor Network : Heterogeneous system

consisting of tiny sensors and actuators consisting of tiny sensors and actuators having some computing elementshaving some computing elements

Base Station : Base Station : Point of centralized controlPoint of centralized control Gateway to another network, powerful data Gateway to another network, powerful data

processing unit, or point of human interfaceprocessing unit, or point of human interface More processing capability, memory & powerMore processing capability, memory & power

Aggregation points : Node at which the Aggregation points : Node at which the messages are processed before sending to messages are processed before sending to base stationbase station

POWER constrained environment POWER constrained environment

Sensor N/w vs. Ad-Hoc Sensor N/w vs. Ad-Hoc N/wN/w

Similarity : Support Multi-hop Similarity : Support Multi-hop networkingnetworking

Differences :Differences : Ad-hoc : Routing between any two nodesAd-hoc : Routing between any two nodes Sensor : Supports Specialized Sensor : Supports Specialized

communication patternscommunication patterns Many-to-OneMany-to-One One-to-ManyOne-to-Many Local CommunicationLocal Communication

Sensor nodes more resource constrained Sensor nodes more resource constrained than Ad-hoc nodesthan Ad-hoc nodes

Higher level of trust relationship among Higher level of trust relationship among sensor nodes sensor nodes In-network processing, In-network processing, aggregation, duplication eliminationaggregation, duplication elimination

Problem StatementProblem Statement Network AssumptionsNetwork Assumptions

Insecure Radio linksInsecure Radio links Malicious node collude to attack the Malicious node collude to attack the

systemsystem No tamper resistance on nodesNo tamper resistance on nodes Adversary can access all key material, Adversary can access all key material,

data, and code stored on the captured data, and code stored on the captured nodenode

Trust RequirementsTrust Requirements Base stations are trustworthyBase stations are trustworthy Aggregation points not necessarily Aggregation points not necessarily

trustworthytrustworthy

Problem Statement Problem Statement contd.contd.

Threat Models : 2 typesThreat Models : 2 types Based on device capabilityBased on device capability

Mote-class attacker Mote-class attacker access to few sensor access to few sensor nodesnodes

Laptop-class attacker Laptop-class attacker Access to more Access to more powerful devices. Have more battery power, powerful devices. Have more battery power, better CPU, sensitive antenna, powerful radio better CPU, sensitive antenna, powerful radio Tx, etcTx, etc

Based on attacker type / attacker locationBased on attacker type / attacker location Outside attacks Outside attacks attacker external to the attacker external to the

networknetwork Inside attacks Inside attacks Authorized node in the Authorized node in the

network is malicious/compromisednetwork is malicious/compromised

Problem Statement Problem Statement contd.contd.

Security Goals Secure routing protocol should

guarantee integrity, authenticity, availability of messages in presence of adversaries

Secrecy of application data is must

AttacksAttacks

Two Categories :Two Categories :Attacks on general sensor Attacks on general sensor

network routing network routing Attacks on specific sensor Attacks on specific sensor

network protocolsnetwork protocols

Attacks on General Attacks on General RoutingRouting

By Spoofing, Altering, or Replaying routing By Spoofing, Altering, or Replaying routing informationinformation Attacker can create loops, attract or Attacker can create loops, attract or repel network traffic, generate false message, repel network traffic, generate false message, partition network, induce delay, etcpartition network, induce delay, etc

Selective forwardingSelective forwarding Malicious node forwards Malicious node forwards only some messages, drop others. Attacker tries to only some messages, drop others. Attacker tries to be on the actual path of data flowbe on the actual path of data flow

Sinkhole AttacksSinkhole Attacks Main Reason : Specialized communication patterns Main Reason : Specialized communication patterns

supported by wsn ; All packets have same destination i.e. supported by wsn ; All packets have same destination i.e. base stationbase station

Adversary tries to attract traffic from a particular area to Adversary tries to attract traffic from a particular area to pass through a compromised node, thereby creating pass through a compromised node, thereby creating sinkhole with adversary at the centersinkhole with adversary at the center

A node may be made to look attractive to neighbors in some A node may be made to look attractive to neighbors in some routing algorithmrouting algorithm

Laptop class adversary provide a high quality route to base Laptop class adversary provide a high quality route to base station by transmitting at high power OR creating a station by transmitting at high power OR creating a wormholewormhole

Can enable other attacks e.g. selective forwardingCan enable other attacks e.g. selective forwarding

Attacks on General Routing Attacks on General Routing Contd.Contd.

Sybil AttackSybil Attack Single node presents multiple identities to other nodesSingle node presents multiple identities to other nodes Significantly affect fault-tolerance schemes like distributed Significantly affect fault-tolerance schemes like distributed

storage, multi-path routing, topology maintenancestorage, multi-path routing, topology maintenance Threat to geographical routing protocolsThreat to geographical routing protocols

WormholesWormholes do I need to explain this ? do I need to explain this ? HELLO flood attackHELLO flood attack

Some protocols require that nodes broadcast ‘hello’ Some protocols require that nodes broadcast ‘hello’ packets to advertise themselvespackets to advertise themselves

Laptop-class attacker can convince every node that it is Laptop-class attacker can convince every node that it is their neighbor by transmitting at high powertheir neighbor by transmitting at high power

Acknowledgement spoofingAcknowledgement spoofing Some routing algorithms require explicit/implicit link layer Some routing algorithms require explicit/implicit link layer

ACKsACKs Adversary can spoof ACKs for control packets and try to Adversary can spoof ACKs for control packets and try to

convince the sender that a weak link is strong or a dead convince the sender that a weak link is strong or a dead link is alive; causing packet losseslink is alive; causing packet losses

Attacks on specific Attacks on specific protocolsprotocols TinyOS beaconingTinyOS beaconing

Protocol Desc. Protocol Desc. It constructs a ‘Breadth first’ spanning tree rooted at the base It constructs a ‘Breadth first’ spanning tree rooted at the base

stationstation Base station periodically broadcast route updatesBase station periodically broadcast route updates Immediate nodes Immediate nodes parent, base station; other nodes parent, base station; other nodes

parent, from who they receive the first updateparent, from who they receive the first update Packets travel through the paths along tree Packets travel through the paths along tree

Attacks:Attacks: Unauthenticated route updates Unauthenticated route updates Malicious node acts Malicious node acts

as base stationas base station Authenticated route updates Authenticated route updates

Two colluding nodes (laptop-class attacker) form wormhole to Two colluding nodes (laptop-class attacker) form wormhole to direct all traffic through themdirect all traffic through them

Laptop-class attacker use HELLO flood attack Laptop-class attacker use HELLO flood attack every node every node marks attacker as parentmarks attacker as parent

Mote-class attacker can cause ‘Routing loops’ between two Mote-class attacker can cause ‘Routing loops’ between two nodesnodes

Attacks on specific Attacks on specific protocolsprotocols

Directed diffusionDirected diffusion Protocol desc. Protocol desc.

Data-centric routing algorithmData-centric routing algorithm Base station send the ‘named’ data which is Base station send the ‘named’ data which is

flooded as ‘interests’ throughout the flooded as ‘interests’ throughout the networknetwork

‘‘Gradients’ are set up to ‘draw’ events Gradients’ are set up to ‘draw’ events (data matching the interests)(data matching the interests)

Base station positively reinforces high data Base station positively reinforces high data rates pathsrates paths

Attacks Attacks Cloning i.e. Replay of interest by the Cloning i.e. Replay of interest by the

adversary adversary Selective forwarding and data tamperingSelective forwarding and data tampering

Attacks on specific Attacks on specific protocolsprotocols Geographic routingGeographic routing

Two protocols:Two protocols: GEAR (Geographic and Energy Aware Routing)GEAR (Geographic and Energy Aware Routing) GPSR (Greedy Perimeter Stateless Routing)GPSR (Greedy Perimeter Stateless Routing)

Leverage nodes’ positions & explicit Leverage nodes’ positions & explicit geographic packet destinations to efficiently geographic packet destinations to efficiently disseminate queries and route updatesdisseminate queries and route updates

Require exchange of location informationRequire exchange of location information AttackAttack : Location information : Location information

misrepresented misrepresented Adversary advertise wrong location info. so as to Adversary advertise wrong location info. so as to

place himself in the pathplace himself in the path Adversary forge location advertisements Adversary forge location advertisements

creating routing loopscreating routing loops In GEAR, energy is also considered In GEAR, energy is also considered adversary adversary

advertise maximum energy (Laptop class advertise maximum energy (Laptop class attacker again !!)attacker again !!)

CountermeasuresCountermeasures Secret shared key & Link layer encryptionSecret shared key & Link layer encryption

Prevents ‘Outsider attacks’ like Sybil attacks, Prevents ‘Outsider attacks’ like Sybil attacks, Selective forwarding, Sinkhole attacks, ACK Selective forwarding, Sinkhole attacks, ACK spoofingspoofing

Ineffective against ‘Insider attacks’ like Wormhole, Ineffective against ‘Insider attacks’ like Wormhole, Hello floods, TinyOS beaconingHello floods, TinyOS beaconing

Hello flood, SybilHello flood, Sybil Every node shares a unique symmetric key with Every node shares a unique symmetric key with

the base stationthe base station Then two nodes generate pair-wise shared secret Then two nodes generate pair-wise shared secret

key between them (Needham – Schroeder key between them (Needham – Schroeder symmetric key exchange) for ‘Identity verification’symmetric key exchange) for ‘Identity verification’

Limit the number of neighbors for a node Limit the number of neighbors for a node prevent adversary from establishing shared keys prevent adversary from establishing shared keys with everyonewith everyone

Wormhole, SinkHoleWormhole, SinkHole “ “No viable solutionNo viable solution” ” except ‘Good routing protocol design’ to avoid except ‘Good routing protocol design’ to avoid them e.g. Geographical Routing protocolsthem e.g. Geographical Routing protocols

Countermeasures contd.Countermeasures contd. Geographical routingGeographical routing attacksattacks Restrict the Restrict the

structure of topology to eliminate the need for structure of topology to eliminate the need for location information by the node. Use fixed location information by the node. Use fixed topology like square, triangular or Hex Grid topology like square, triangular or Hex Grid structurestructure

Selective forwardingSelective forwarding Use Multipath Use Multipath Routing; messages routed over disjoint paths Routing; messages routed over disjoint paths

Authenticated Broadcast and floodingAuthenticated Broadcast and flooding μμTESLA protocol to prevent replay of TESLA protocol to prevent replay of

broadcast messages issued by the base stationbroadcast messages issued by the base station Flood the information about the malicious Flood the information about the malicious

nodes in the networknodes in the network

ConclusionsConclusions

Paper describes …Paper describes … Too... many types of attacks! With Too... many types of attacks! With

lots of (overlapping) details….lots of (overlapping) details…. Two new types of attacks (Attn : Bad Two new types of attacks (Attn : Bad

Guys! want to try them?)Guys! want to try them?) And their countermeasures...And their countermeasures...

Over to contrarian………..Over to contrarian………..

CountermeasuresCountermeasures Outsider attacks vs. Insider attacksOutsider attacks vs. Insider attacks

The majority of outsider attacks can be prevented The majority of outsider attacks can be prevented by Secret shared key & Link layer encryption. by Secret shared key & Link layer encryption.

Prevents Sybil attacks, Selective forwarding, Sinkhole Prevents Sybil attacks, Selective forwarding, Sinkhole attacksattacks

Ineffective against Wormhole, Hello floods attacks.Ineffective against Wormhole, Hello floods attacks. Completely ineffective in the presence of insider Completely ineffective in the presence of insider

attacksattacks Bogus routing informationBogus routing information Create sinkholesCreate sinkholes Selectively forward packetsSelectively forward packets Sybil attacks Sybil attacks HELLO floodsHELLO floods

CountermeasuresCountermeasures Countermeasure to Insider SybilCountermeasure to Insider Sybil attacksattacks

Every node shares a unique symmetric key with the base Every node shares a unique symmetric key with the base stationstation

A pair of neighbor nodes use the resulting key to A pair of neighbor nodes use the resulting key to implement an authenticated, encrypted link between implement an authenticated, encrypted link between them.them.

Base station limit the number of neigbors a node is Base station limit the number of neigbors a node is allowed to have – prevent an insider attacker allowed to have – prevent an insider attacker establishing shared keys with every node in the network.establishing shared keys with every node in the network.

Not perfect Not perfect Malicious nodes can still communicating with its verified Malicious nodes can still communicating with its verified

neighborsneighbors Two or more colluding nodes may attack the network Two or more colluding nodes may attack the network

more powerfullymore powerfully

CountermeasuresCountermeasures

Countermeasure to HELLO flood attacksCountermeasure to HELLO flood attacks Verify the bidirectionality of the link between Verify the bidirectionality of the link between

two nodestwo nodes How about the adversary have highly How about the adversary have highly

sensitive receivers?sensitive receivers?

CountermeasuresCountermeasures Countermeasure to Wormhole, SinkHole Countermeasure to Wormhole, SinkHole

attacksattacks Geographical Routing protocols. Geographical Routing protocols.

Problems: How to get the location information – Problems: How to get the location information – attackers may disseminate spoofed location attackers may disseminate spoofed location informationinformation

Solution: Restrict the structure of topology to Solution: Restrict the structure of topology to eliminate the need for location information by the eliminate the need for location information by the node. Use fixed topology like square, triangular or node. Use fixed topology like square, triangular or Hex Grid structure. However, it also restrict its Hex Grid structure. However, it also restrict its application.application.

Suggestions: using multipath routing, and Suggestions: using multipath routing, and design effective evaluation methods to design effective evaluation methods to determine the quality of each routes.determine the quality of each routes.

CountermeasuresCountermeasures

Countermeasure to Selective forwardingCountermeasure to Selective forwarding Multipath routing using completely disjoint Multipath routing using completely disjoint

paths or Braided pathspaths or Braided paths Allowing nodes dynamically choose a packet’s Allowing nodes dynamically choose a packet’s

next hop from a set of possible candidates.next hop from a set of possible candidates. Not enough: add evaluation method to Not enough: add evaluation method to

discriminate different routesdiscriminate different routes

CountermeasuresCountermeasures Authenticate Broadcast and floodingAuthenticate Broadcast and flooding

Base station is trustworthy.Base station is trustworthy. Adversaries must not be able to spoof Adversaries must not be able to spoof

broadcast or flooded messages from any broadcast or flooded messages from any base station.base station.

HELLO message from neighbor nodes should HELLO message from neighbor nodes should be authenticated and impossible to spoofbe authenticated and impossible to spoof..

Attention: authentication should be Attention: authentication should be efficient – public key cryptography and efficient – public key cryptography and digital signatures is beyond the digital signatures is beyond the capabilities of sensor nodes.capabilities of sensor nodes.