15
Jun Luo Jun Luo Panos Papadimitratos Panos Papadimitratos Jean-Pierre Hubaux Jean-Pierre Hubaux By: Mai Ali Sayed By: Mai Ali Sayed

Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

Embed Size (px)

Citation preview

Page 1: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

Jun Luo Jun Luo Panos Papadimitratos Panos Papadimitratos Jean-Pierre HubauxJean-Pierre Hubaux

By: Mai Ali SayedBy: Mai Ali Sayed

Page 2: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

Introduction Problem statement Background

System ModelAdversary Model

GossiCryptData Encryption AlgorithmKey refreshing Algorithm

Experiment results Conclusion

Page 3: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

Other Layers||||||Physical Layer

Ensuring that sensor-collected data are accessed only by authorized entities has been viewed mostly as a secondary concern

source sensor

sink symmetric Key

Data

““abcd”abcd”

Encrypted data

symmetric Key

Data

““abcd”abcd”

Encrypting data at their source sensor node, with a symmetric key

shared with the sink, is a straightforward confidentiality

mechanism.

adversary

However, An adversary can actively

exploit the poor physical protection of

nodes

as it would be too costly and thus unrealistic to make them tamper-

resistant

It is relatively easy for an adversary to physically access

the node memory contents, and extract the symmetric key

used for data encryption.

Such an attack is vastly simpler

than a cryptanalytic one against the keys.

In fact, the adversary could progressively compromise keys of numerous nodes, and eventually be able to decrypt a significant fraction of, if not all, data produced by the WSN.

Page 4: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

The paper concerned with sensor data confidentiality in such a setting, where cryptographic keys can be physically compromised.

It focus on a novel type of adversary we term parasitic: it seeks to exploit a WSN, rather than disrupt, degrade, or prevent the WSN operation.

Page 5: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

The WSN comprises N sensor nodes, each with a unique identity Si, and a network sink performing data collection and key refreshing.

Each node Si shares a symmetric key, Ki,ө,with the sink, and knows the public key, PuKө, of the sink. The sink is equipped with all Ki,ө.

Beyond these end-to-end, sensor-to-sink, associations, nodes may share symmetric keys with their neighbors, to enable link-layer security primitives or for other security purposes

SystemSystem Model Model

Page 6: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

We describe the data of interest with the help of two parameters, T and ө; the user seeks to collect data:

From a fraction 0<1 of the WSN nodes, Over a period of T seconds, for each node Sj , for j =1, . .

. , [§N].

The actual values of T and can vary. T can range from a short period, t0, for a single sensor measurement, to a sufficiently long period for a comprehensive measurement collection. In general, T = kt0, with k > 0 an integer. Similarly, § = 1/N

SystemSystem Model Cont. Model Cont.

Page 7: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

1. Seeks to obtain the WSN data collected according to the parameters § and T.

2. Can be physically present, at each point in time, only at a much smaller fraction of the area covered by [§N] sensor nodes.

3. Can physically access data stored at sensor nodes and retrieve their cryptographic keys.

4. Can be mobile i.e., compromise different sets of nodes over different time intervals. “Mobile” traditionally refers to virtual moves (in terms of compromising system entities); here, it also represents physical moves of the adversary.

5. Can compromise in the above-described manner at most one sensor per τ seconds. We assume τ <<T.

Adversary ModelAdversary Model

Page 8: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

GossiCrypt aims at ensuring confidentiality, that is, preventing any unauthorized access to data collected by a WSN.

It does not seek to protect data coming from every single sensor, but rather intends to fulfill the following property, for some protocol-specific constant 0 < Δ< 1:

ΔT−Confidentiality: Data collected from a WSN comprising N nodes are ΔT−confidential if the adversary cannot obtain all measurements performed by more than [ΔN] sensor nodes over a given time interval T.

Page 9: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

1.1. Source node, Si:Source node, Si:

a. Generate a nonce n for the communication with sink ө.

b. Calculate H = MAC(Ki, ө, m, n, Si).

c. Encrypt m, n,H with Ki, ө to obtain ciphertext σi = {m, n,H}Ki, ө.

d. Transmit packet pi = σi, Si to the first relaying node Sj on pathSi,ө.

Data Encryption AlgorithmData Encryption Algorithm

Page 10: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

2.2. Relaying node, Sj :Relaying node, Sj :

a. Upon receipt of a packet pi, generate a random number x є [0, 1]. If x > q, relay pi to the next relaying node Sk on pathSj ,ө, or to ө . Otherwise,

b. Generate ciphertext σj = {pi}Kj, ө.c. Append own identity Sj to σj .d. Relay packet pj = σj , Sj to the next

relaying node Sk along pathSj ,ө, or to ө.

Data Encryption Algorithm Cont.Data Encryption Algorithm Cont.

Page 11: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

3.3. Sink Sink өө::

a. Upon receipt of a packet pk, retrieve Kk, ө, the key shared with Sk, and decrypt k. If the source cleartext,m, n,H, is obtained, go to (c). Otherwise,

b. Obtain ciphertext σl and Sl. Decrypt l with Kl,ө. Repeat successively for all Sl that re-encrypted the packet, till obtaining the source clear-text m, n,H.

c. Determine if n was previously seen. If so, discard the packet. Otherwise,

d. Compute H’ = MAC(Ki, ө, m, n, Si). Discard the packet if H’ ≠ H. Otherwise, deliver m to the WSN user.

Data Encryption Algorithm Cont.Data Encryption Algorithm Cont.

Page 12: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

1.1. Source node, Si:Source node, Si:a. Upon an event of RGen(λr), generate a new key

K’i, ө; wait for the time till the next data report.b. Upon a data report to be returned, delay the

report to be combined with the next one and generate a nonce n for the communication with sink ө.

c. Calculate H = MAC(Ki,, flag,K0i,, n, Si).d. Encrypt flag,K’i, ө, n,H with Ki, ө, to obtain

ciphertext σi = {flag,K’i, ө, n,H}Ki, ө.e. Transmit packet pi = σi, Si to the first relaying

node Sj on pathSi, ө.

2.2. Relaying node, Sj :Relaying node, Sj :Identical to the operation for

GossiCryptE

Key refreshing AlgorithmKey refreshing Algorithm

Page 13: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

3. Sink Sink ө ө ::

a. Perform the steps (3).(a)-(b), to obtain the clear-text flag,K’i, ө, n,H.

b. Determine if n was previously seen. If so, discard the packet. Otherwise,

c. Calculate H’ = MAC(Ki, ө, flag,K’i, ө, n, Si). If H’ ≠ H, discard the packet. Otherwise, replace Ki, with K’i, ө.

Key refreshing Algorithm Cont.Key refreshing Algorithm Cont.

Page 14: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

The paper showed that, for any protocolor application-specific objective 1/N, the confidentiality of the sensed data can be safeguarded with probability almost equal to one.

analytic and experimental values show that even very short sequences (e.g., T = 5t0) of measurements originating from a single source node can be protected with probability fast approaching one. This is achieved thanks to the GossiCrypt en-route encryption, resulting in particularly robust operation even when approximately 40% of the nodes are compromised by the adversary.

Page 15: Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

The paper evaluation shows that GossiCrypt can prevent the breach of WSN confidentiality in a wide range of settings.

Even though the adversary could obtain solitary or sparse measurements, their analysis and simulations show that GossiCrypt prevents the compromise of a meaningful set of measurements over a period of time with probability going to one.

The most intriguing feature of GossiCrypt lies in its ability of defending the WSN data confidentiality with simple and low cost mechanisms.