17
New Challenges in Securing our New Challenges in Securing our Communication Infrastructure Communication Infrastructure Wade Trappe

New Challenges in Securing our Communication Infrastructure Wade Trappe

  • View
    228

  • Download
    0

Embed Size (px)

Citation preview

New Challenges in Securing our New Challenges in Securing our Communication InfrastructureCommunication Infrastructure

Wade Trappe

AgendaAgenda

Wireless Overview– State of the Wireless Union: Where are we?

– Vision for 4G

Security Challenges for Future Wireless Networks:– 3G Multicast Security

– Authentication in Broadcast Environments

– Security in Ad Hoc Networks

– Biologically-Inspired Self-Healing Frameworks

– Networks of Networks Security Issues

State of the Wireless UnionState of the Wireless Union We are still waiting for third

generation (3G) wireless. WLAN (Wi-Fi) technologies are

rapidly growing:– Estimated $800 Million in US sales for

2004

Prices for Wi-Fi equipment plummeting– $100 access point, $70 WLAN card

New, unregulated networks popping up everywhere– Its not just Starbucks & T-Mobile– Open-access hotspots

Warchalking is now a common hobby

Global Wi-Fi Growth

0

200

400

600

800

1000

1 2 3 4 5 6

Year

Sale

s ($

Mill

ion) North America

Asia

Europe

Source: Allied Business Intelligence

Vision for the Fourth GenerationVision for the Fourth Generation

Wireless devices will continue to drop in price– Wireless sensors will be deployed everywhere– Ability to monitor everything, from temperature to traffic– Remote sensing and autonomic living applications

Next generation wireless systems (4G) will seek to facilitate mass market services with new network architecture:– Self-organizing, ad-hoc wireless access networks: Ad-hoc wireless network

protocols which support multihop and peer-to-peer service models, particularly for low-tier uses (in-home, sensors, etc.)

– Networks of networks: Future wireless networks will support co-existence of multiple types of networks

Security will be a critical issue: – Unregulated networks will provide an untraceable platform to launch network

attacks– Mobility and power-efficiency are still concerns

3G Multicast Security3G Multicast Security

Keys must be shared by multicast group participants As users join and leave, keys must be changed 3GPP has proposed a new entity, the BMSC for managing broadcast and

multicast services The BMSC can perform key management

Node B

Node B

Radio Network Subsystem (RNS)

GGSN

SGSNRNC

Node B

UMTS Terrestrial Radio Access Network

BMSC

UMTS Core Network

Internet

3G Multicast Security3G Multicast Security

3GPP currently is investigating several multicast frameworks

To optimize key management, one should match the key tree to underlying multicast topology

3GPP has not decided on a multicast topology

We are examining the performance of multicast key management at the BMSC for different 3G multicast scenarios

Examine the issue of key management during handoff between node-B’s and RNCs

Prototype Secure Chat Application has been developed

•Server is implemented in J2SE•Clients are implemented in J2ME

Broadcast/Multicast AuthenticationBroadcast/Multicast Authentication Important challenge facing secure multicast communication is data authentication:

– Ensures data is from trusted source– Ensures data was not modified en route

Unicast Data Authentication uses standard cryptographic techniques:– Digital Signatures: (RSA, DSA)

Drawbacks: Inefficient due to: Large per packet computation Large communication overhead

Note: Drawbacks are not critical in many applications.– Message Authentication Codes (MAC): (HMAC-MD5)

Class of symmetric keyed one-way hash function Advantages:

Computationally efficient Compressed code Computationally non-invertible

Multicast AuthenticationMulticast Authentication Multicast source authentication is more complex than unicast:

– Symmetric Key Cryptography cannot be used Key is known to all receivers Packets can be forged by any receivers

– Asymmetric key cryptography is required

– Lost packets are not retransmitted

Digital signature schemes provide good authentication:– Each message is signed by appending digital signature

– Significant drawbacks for realtime, low-power multicast applications: Time-to-sign and time-to-verify Bandwidth and overhead.

We want a technique that will take advantage of both

One approach: Delayed key disclosure

Multicast AuthenticationMulticast Authentication Delayed Key Disclosure: (e.g. TESLA)

Weakness:– Use of buffers allows for a simple denial of service (DoS) attack

– Since there is no way to check packets until key is disclosed, buffer will overflow How to protect against DoS attacks? K1 K2 K3 K4 K5

All Packets Authenticated with K1 have arrived to all group members

Keys Time

Auth Packetswith K1

RevealK2

Auth Packetswith K2

Auth Packetswith K3

Auth Packetswith K4

RevealK1

Auth Packetswith K5

DoS Resistant TESLADoS Resistant TESLA Idea: Use multiple keys and stagger the delayed key disclosure

scheme.

Ki Ki+1 Ki+2 Ki+3 Ki+4Keys Time

RevealKi+2

M2

MACKi+1

MACKi

MACKi-1

RevealKi-2

M1

MACKi

MACKi-1

MACKi-2

RevealKi-3

RevealKi+1

P1

RevealKi

P1

P1

M3

MACKi+2

MACKi+1

MACKi

RevealKi-1

Ki-2

Ki-1

End result: • Provides a filter to remove packets from buffer

before the maximum network delay is achieved

Ad-hoc networks introduce new security challenges– Evolving authentication: Nodes are moving, and clusters are constantly being redefined.– Secure routing: New types of attacks (e.g. wormhole attacks) exist.– Service non-repudiation: No proof that a service (QoS) was provided.

WINLAB approach: Develop a hierarchical, self-organizing network– Can nodes develop an evolving trust model? Elected nodes give trust certificates.

InternetInternet

Forwarding node

low-tier(e.g. sensor)user nodes

Access Point

FN

APBTS

3G cell

personal-areapico-cell

WLANmicro-cell

Ad-Hoc Network SecurityAd-Hoc Network Security

Authentication in Hierarchical Authentication in Hierarchical Ad Hoc Sensor NetworksAd Hoc Sensor Networks

Public key certificates are not suitable for flat ad hoc networks– To check certificate requires expensive public key operations

Three tier architecture:– Varying levels of computational power within the sensor network– Sensors do not communicate with each other– Forwarding nodes are radio-relay

TESLA Certificates– Alternative to PK certificates– Uses symmetric key cryptography– Delayed key disclosure

AP

FN

SN

Authentication framework:– Access points provide filter to

application– TESLA certificates provide efficient

sensor node handoff– Weak and assured data

authentication provided

Self-Healing Wireless NetworksSelf-Healing Wireless Networks Ad hoc networks are being

deployed for a broad variety of applications, and are a key platform for:– Remote sensing applications

(Homeland Security)– Military battlefield networks– Mesh networks and ubiquitous

content distribution Challenge: These networks are

not tolerant to active or passive faults:– Nodes are cheap and will

often malfunction– Nodes are in an open

environment and vulnerable to being captured by adversaries

Network Node

Corrupted Network Node

Self-healing frameworkSelf-healing framework In nature, we have many cases where systems get infected and must repair themselves Ad hoc networks should emulate nature and heal themselves! Model: Human immune system

– Leuocytes (white blood cells): There are two types, those that develop in lymph nodes and those that develop in bone marrow – Killer T-cells: Destroy antigens either by themselves, or by recruiting other white blood cells– Lymphocytes: Produce antibodies, that seek to surround and cover an antigen, rendering it harmless until a phage can arrive to

destroy the neutralized antigen– Chemotaxis: Leuocytes find their way to an antigen by following a chemical trail of “bread crumbs”

Mobile Agent FrameworkMobile Agent Framework

Biologically-inspired self-healing security framework– Mobile Code will launch

from network lymph nodes to patrol network

– Mobile Code will leave behind tags allowing for the process of network chemotaxis

– In response, Repair and Destroy Agents will be launched to reboot, or shut down malfunctioning nodes via secure OS environment

Network Lymph Node

Corrupted Network Node

Network Node

Enabling TechnologiesEnabling Technologies

Enabling Technologies to be Researched:– Smart Messages (SMs): Migratory execution units that execute

on ad hoc nodes, and will form the different types of mobile agents involved in a network immune system

– Trajectory Routing: Self-routing mechanisms for mobile code capable of finding fast and efficient route to faulty node

– Anomaly Detection: Statistical and policy-based detection mechanisms for identifying faulty network nodes

– Flexible Security Policies: Describe how the network immune system responds to different types of corruptions or threats

– Authorization and Secure OS: Each node must have a secure environment from which mobile agents perform their functions

Global InternetGlobal Internet

Mobility supporting InternetMobility supporting Internet

Radio AccessNetwork(cellular)

microcell

picocellmed-tierdevices(laptops, PDA’s)

low-tierdevices(home, sensors)

high-tierdevices(mobileterminals)

wired links

radio link

Internet-like architecture that promotes organic growth...

““Network of Wireless Networks” SecurityNetwork of Wireless Networks” Security

Security Needs:•Certification across networks•Security must scale to multiple simultaneous platforms!