Practical Broadcast Authentication in Sensor Networks Presenter: Tong Zhou 6/24/2016

advertisement
Computer Science
Practical Broadcast Authentication in
Sensor Networks
Presenter: Tong Zhou
6/24/2016
CSC 774 Adv. Net. Security
1
Outline
•
•
•
•
•
Background
Basic Approach
Various Extensions
Implementation Results
Conclusion & Future Work
Computer Science
CSC 774 Adv. Net. Security
2
Background
• Wireless Sensor Network
– Large number of resource constrained sensor nodes
– A few powerful control nodes (Base Station)
• Broadcast Authentication in Sensor Network
– TESLA
– Multilevel TESLA
Computer Science
CSC 774 Adv. Net. Security
3
Review of Multilevel TESLA
Ki-1
Ki
F01
Ki-2,m Ki-1,1
F01
F1
Ki-1,2
F1
...
F1
Ki-1,m Ki,1
F01
F1
...
...
F1
F1
Ki,m Ki+1,1
...
F1
F1
Ki-1,0
Ki,2
F1
F1
Ki+1,0
Ki,0
Time
CDMi=i|Ki+1,0|H(Ki+2 ,0) |MACK’i(i|Ki+1 ,0|H(Ki+2 ,0 ))|K i-1
Computer Science
CSC 774 Adv. Net. Security
4
Review of Multilevel TESLA (cont.)
• Benefits:
– Trade-off between key chain length and broadcast
time
– Resistant to packet loss
• Problems left:
– Remove the long delay after CDMs are lost
– Allow multiple senders
– Revoke broadcast senders
Computer Science
CSC 774 Adv. Net. Security
5
Practical Broadcast Authentication in
WSN: Basic Scheme
• Use Merkle tree to distribute the key chain
commitments – referred to as parameter distribution
tree
– The tree root is pre-distributed
– Each commitment is a leaf of the tree
K14
Pre-distributed root
K12
K34
K1
K2
K3
K4
s1
s2
s3
s4
Computer Science
Key chain commitments
CSC 774 Adv. Net. Security
6
Practical Broadcast Authentication in
WSN: Basic Scheme (Cont.)
• If the 2nd TESLA instance will be used:
– Sender broadcasts the parameter certificate
ParaCert2 = { s2, K1, K34}
– Receivers immediately authenticate the commitment s2 by
verifying
K14
K14 = H( H( H(s2) K1 ) | K34)
K12
Computer Science
K34
K1
K2
K3
K4
s1
s2
s3
s4
CSC 774 Adv. Net. Security
7
Practical Broadcast Authentication in
WSN: Basic Scheme (Cont.)
• The basic scheme has achieved:
– Security:
• Attacker cannot send forged packet unless compromising the sender
• The parameter certificates are immune to DoS attack
– Overhead:
• Storage: each receiver node needs to store the root of the parameter
distribution tree, and the parameters of the senders that are
communicating
• Computation: each receiver node needs 1 log 2 m hash functions to
validate the key chain commitment, where m is the number of
TESLA instances
– Allows multiple senders:
• Senders can be added dynamically by generating enough instances
for late-joined senders
Computer Science
CSC 774 Adv. Net. Security
8
Scheme for Long-lived Senders
• Basic idea:
– two-level parameter distribution tree
• Pre-Distribution
– Fix the interval length that each TESLA key chain uses, denote such
an interval as (TESLA) instance interval. Assume each key chain has
length L.
– Assume sender j needs nj instance intervals through out its life: use the
nj key chain parameters {s j ,i }1in j as leaves to construct a lower level
tree, denoted as Treej. When generating key chains for each sender:
ki+1, L = F’(ki, 0), where F’ is a pseudo random function.
– With the roots of Treejs as leaves, an upper level parameter distribution
tree is generated, denoted as TreeR
– TreeR’s root is pre-distributed to receivers, while the parameter
certificate of TreeR of sender j, denoted as ParaCertj and all the key
chains generated for sender j is pre-distributed to sender j.
Computer Science
CSC 774 Adv. Net. Security
9
Scheme for Long-lived Senders: Example
K14
K12
Pre-distribution:
K34
K1
K2
K3
s1
s2
s3
TreeR
K4
Sender3:
s4
ParaCert3={s3, K4,
K12}, and Sender3’s
key chains
R3
K’12
K’34
K’1
K’2
K’3
K’4
s’1
s’2
s’3
s’4
Computer Science
Receivers: K14
Treej
CSC 774 Adv. Net. Security
10
Scheme for Long-lived Senders: Example
R3
K’12
K’34
K’1
K’2
K’3
K’4
s’1
s’2
s’3
s’4
k1,0
k2,0
k3,0
k4,0
k1,1
k2,1
k3,1
k4,1
k1,L
k2,L
k3,L
k4,L
F’
F’
Computer Science
Tree3
F’
CSC 774 Adv. Net. Security
11
Scheme for Long-lived Senders (Cont.)
• The above scheme has achieved:
– Security:
• Same as in the basic scheme
– Overhead:
• Storage: receivers’ are same as in the basic scheme, sender j needs
to store ParaCertj besides all the key chains.
• Computation: 1 log 2 n j  for validation of each key chain
commitment, and 1 log 2 m for validation of each sender, where m
is the number of senders.
– Benefit over basic scheme:
• Fixed key chain length
• Two ways to validate the key chain commitments
Computer Science
CSC 774 Adv. Net. Security
12
Distributing Parameter Certifications
• Due to the low bandwidth and small packet size, ParaCertj
must be delivered in several packets.
– Each packet must be authenticated independently and immediately
– Assume that each ParaCert contains L hash values, each packet can
hold b hash values. Adopt the idea of distillation codes.
Computer Science
CSC 774 Adv. Net. Security
13
Distributing Parameter Certifications:
Example
K18
K14
K58
K12
K34
K1
K2
s1
s2
K3
s3
K56
K4
s4
K78
K5
K6
K7
s5
s6
s7
K8
s8
ParaCert3 = {K58, K12, K4, s3}, assume that each
packet can hold 3 hash values,
P1 = {K58, K12, K34}, verify: K18 = H(H(K12| K34)|K58)
P2 = {K4, s3}, verify: K34 = H(K4|H(s3))
Computer Science
CSC 774 Adv. Net. Security
14
Revoking TESLA Instances
• Revocation tree
– Similar to the parameter distribution tree, the central server
generates a revocation message for each TESLA instance,
and use all the messages to construct a Merkle tree, whose
root is pre-distributed.
– Advantages:
• Guarantees a non-compromised sender not be revoked.
– Disadvantages:
• Cannot guarantee each receiver receives the revocation message
due to the unreliable communication
• Revoked senders must be remembered by receivers, which
introduces large storage overhead.
Computer Science
CSC 774 Adv. Net. Security
15
Revoking TESLA Instances (Cont.)
• Proactive Refreshment of Authentication Keys
– Central server sends TESLA key chains to the senders
when senders are broadcasting, instead of pre-distributing
all the key chains. Central server can revoke a sender by
stop sending TESLA key chains to it.
– Advantages:
• Guarantees a compromised sender be revoked
• Receivers do not need storage overhead
– Disadvantages:
• A non-compromised sender may be revoked if it does not receive
the key chains due to some communication problem.
Computer Science
CSC 774 Adv. Net. Security
16
Experimental Results: Authentication Rate
Authentication rate under 0.2 loss rate and 200 forged
parameter distribution packet per minute.
Computer Science
CSC 774 Adv. Net. Security
17
Experimental Results: Channel Loss Rate
Channel loss rate: 0.2; # forged commitment distribution: 200
per minute; distribution rate: 95%.
Computer Science
CSC 774 Adv. Net. Security
18
Experimental Results: Average Failure
Recovery Delay
Average failure recovery delay. Assume 20 parameter
distribution packet per minute.
Computer Science
CSC 774 Adv. Net. Security
19
Conclusion & Future Work
• Developed practical broadcast authentication
techniques
– Distribution of TESLA key chain parameters
– Revocation of compromised senders
• Future Work
– Other schemes based on the basic scheme
– Remove the constraint of loosely synchronization
of senders and receivers
Computer Science
CSC 774 Adv. Net. Security
20
Questions?
Computer Science
CSC 774 Adv. Net. Security
21
Download