18
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Embed Size (px)

Citation preview

Page 1: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization Algorithms for Wireless

Sensor Networks

proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008)

Maria Berenice Carrasco

Page 2: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Outline

• Motivation (from two perspectives) • Secure Localization– Overview– Known attacks– Solutions

• Location Verification• Design considerations• Conclusions

Page 3: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Motivation

• Applications : Data fusion– Locations and timestamps

• Other communication protocols– Routing, location-based

authentication.etc.

• Why is Localization important?– Popularity of wireless sensor networks

(WSN)• Hostile environments• Monitoring & control applications

– Military fields, monitoring of structures, etc.

– The knowledge of sensor’s locations is required by

Page 4: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Motivation

• Why is Security important?– Vulnerability of WSN

• Remote environments• Broadcast nature of the channel

– What an attacker can potentially do?• Physical manipulation• Jamming• Injecting code

– As a result…• Wrong results: wrong decisions

GOAL: Make the node think it is somewhere different from actual location

Page 5: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Goal: To guarantee correctness despite of the presence of intruders

• Network model:• Beacons: GPS or manual configuration• Common nodes: requesting

• Classification:• Range-based localization: Distance• Range-free localization: No connectivity informationo Node-centrico Infrastructure-centric: BS, CA

Relative Localization

Page 6: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• General Process has two phases:1. Information Collection: distance/angle

measure– # of hops, RSSI, ToA, AoARange-free ignores this phase

2. Location Computation: include reference points

Triangulation

Trilateration

Page 7: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Known Attacks– Consider an insider Vs. an

outsider

– Reply attack• Jams the transmission• Waits (extra delay)• Replays the same packet

pretending to be the sender• Inaccurate location estimation

Page 8: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Known Attacks– Range-change attack

• Special case of the Replay attack• Increase/decrease range measurements

– Impersonation• Victims: mostly beacon nodes

– Sybil attack• Claims multiple identities

Page 9: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Known Attacks– Wormhole attack

• Tunnel• Jams packets• Replays packets through this tunnel

Page 10: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Solutions– Cryptography

• Against impersonation and data corruption• Use of :

– Authentication » Verify the sender

– Data integrity» Data is unchanged» Example: distance bounding (based on

SEAD)

Page 11: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Solutions– Cryptography (continued)

• Symmetric cryptography– Common private key – WSN are resource-constrained

• Pre-deployed keys• Functions to derive keys: Storage Complexity• Compromised nodes defeat this mechanism

Page 12: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Solutions– Misbehavior Detection and Block

• Against compromised nodes• Observe behavior of nodes• Detect and revoke misbehaving nodes• Some techniques

– RTT observation between two neighbors» Assumption: extra delay of a replay attack

– Reputation-based mechanism» Beacon monitors its neighborhood -> table

Page 13: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Secure Localization

• Solutions– Robust Position Computation

• Filter erroneous information during computation• Assumption: Good nodes > Malicious nodes• Statistical techniques

– Least Squares Method

Page 14: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Location Verification

• BS also learn sensors’ locations – Data Aggregation

• Must verify the location claimed is correct– Did the event really happened there?

• An approach: The Echo Protocol– Check if the node is inside the claimed region– Two types of nodes: p (prover) and v (verifier)– Consider c (speed of light) and s (speed of

sound)

Page 15: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Location Verification

• An approach: The Echo Protocol (continued)– Intuition (Simple Case)

• v only verifies provers inside R

• If p is able to return the packet in sufficient time, then v is sure that p is within d(v,l) meters of v

• Otherwise: p is further away or processing delay

Page 16: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Design Considerations

• No system is totally safe– Network model & adversary model

• Level of security Vs. Available resources– Particular application– Range-based :

• Distance bounding: HW with nanosecond precision

– Asymmetric cryptography• More robust but energy consuming

Page 17: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Design Considerations

• Who initiates the secure localization process?– On-demand– Periodic process

• Useful domain for an intruder– Use only beacon nodes– Use beacon nodes and also nodes with

known positions as reference points

Page 18: Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco

Conclusions

• It is not feasible to use tamper-resistant hardware– Low cost of sensor nodes– Massive deployment

• Trade-off required– Accuracy demanded by the application– Available resources– Environment

• Combination of techniques is desirable