Security and Privacy in Sensor Networks: Research Challenges

Download Report

Transcript Security and Privacy in Sensor Networks: Research Challenges

Security and Privacy
in Sensor Networks:
Research Challenges
Radha Poovendran
University of Washington
http://www.ee.washington.edu/people/faculty/radha
1
Outline
Panda-Hunter Game
 Sensor Network Security
 How is it different?
 Incomplete List of challenges
 Problem #1- Problem #5

2
Panda-Hunter Game Model



A generic asset monitoring
sensor network application
Panda-Hunter Game:
 Sensor Network monitors
Panda
 Hunter observes Panda_Here
messages and go after Panda
Panda’s Challenge


Hunter’s Challenge




Want Location Privacy
Want valid message
Want the network to work
reliably
Detect any faulty or
compromised sensor
Both need different services
Data Sink
Sensor Node
3
Sensor Network Security

What do we mean by sensor network security?







Conventional view of security from cryptography community:
cryptographically unbreakable design in practical sense
Network Reality: very few security breaches in practice are to
exploit flaws in cryptographic algorithms; side channel attacks
Malicious versus selfish (DoS vs. resource gobbler)
Security v.s. robustness, fault tolerance, resiliency
Security is not a black/white world, it is progressive
We must secure entire networked system, not just an
individual component
Solutions must be robust/adapt to new threats as much
as possible
4
How is it Different?

Wireless Sensor networks have NO clear
line of defense





Each node is a host as well as a “router”
Security solutions in wired or cellular networks may leverage
the networking infrastructure
Secure Network/service “infrastructure” has to be
collaboratively established
Wireless channel is easily accessible by
both good citizens and attackers
Resource constraints on portable devices



Energy, computation, memory, etc.
Some devices may be compromised
Heterogeneity prevents a single security solution
5
Capability based Abstraction of a
Heterogeneous Network
Capability-based Abstraction
Processing
Capabilities
BN-Backbone node
RN-Regular Node
Network
Granularity
BN
BN
RN
BN
RN
RN
RN
RN
RN
A
B
6
Incomplete List of Challenges

Resource-Efficient Secure Network Services




Cryptographic services



Network Initialization, single/multihop neighbor discovery
Multihop path establishment & Routing
Supporting application services
Broadcast authentication
Key management
Security mechanisms for fundamental services






Clock synchronization
Secure location discovery and verification of claims
Location privacy
Secure aggregation and in-network processing
Cluster formation/cluster head election
Middleware (will not discuss further)
7
Incomplete List of Challenges

Modeling vulnerabilities
 VERY
POOR state of understanding
 Needed by services and applications

Cross-layer design techniques
 Routing/location-aware
protocols that are
also robust!
 Incorporating semantics such as geometry,
radio model and range for context-based
security
 Functionality instead of optimality
8
Problem #1: Robust Designs

Attacks and compromise of network are reality

Misconfiguration cannot be fully eliminated
 Maybe we can never enumerate
 Software bugs are #1 cause for all possible attacks
 Not every device can implement maximum-strength solutions

Shift from prevention to tolerance

Building trustworthy system out of untrustworthy components

Ability to detect, and function, even in the presence of problems

Similar analogy to IP


building reliable system out of unreliable components
How? Can be application specific
9
Problem #2: Adaptive Security

Adaptation to handle many dimensions of
dynamics:
 Adaptive

to user requirements
Differential security services used in government and military
 Adaptive
to user devices
 Adaptive to channel dynamics:

Partial connectivity, disconnectivity, full connectivity
 Adaptive

Cross-domain service for roaming users
 Adaptive

to mobility
to dynamic membership
Node join, leave, fail
10
Problem #3: Joint Design of QoS
and Security


Incorporating network metrics and security:
scalability, communication overhead,
computation complexity, energy efficiency,
device capability, …
Different performance metrics may be in (partial)
conflict
 Probably
the most secure system is of minimal
usability
 Example: energy efficiency/computation complexity
versus cryptography strength

Many conventional security solutions take a
centralized approach
11
Problem #4: Evaluation of Design
• Current designs have an explicit threat
model in mind
• NOT Realistic
– Real trace analysis for practical attacks?
• Benchmarking ?
– Other areas in computer systems have well
defined benchmarks: SPEC CPU, TPC-C
• Analytical tools
• Current effort: game theory, graph theory
12
Problem #5: Securing the Chain

The system is only as secure as the weakest
link
 Many
supporting components: DNS, ARP, DHCP,…
 Other supporting protocols: bootstrapping, discovery,
time synchronization

How to secure these supporting components
 Often
ignored
 Secure the entire system chain

Build multiple fences
 Each
fence is built based on a component’s resource
constraint
13