slides

advertisement
Secure Localization Algorithms
for Wireless Sensor Networks
proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro
(2008)
Maria Berenice Carrasco
Outline
•
•
Motivation (from two perspectives)
Secure Localization
– Overview
– Known attacks
– Solutions
•
•
•
Location Verification
Design considerations
Conclusions
Motivation
•
Why is Localization important?
– Popularity of wireless sensor networks (WSN)
•
•
Hostile environments
Monitoring & control applications
– Military fields, monitoring of structures, etc.
– The knowledge of sensor’s locations is required by
•
•
Applications : Data fusion
– Locations and timestamps
Other communication protocols
– Routing, location-based authentication.etc.
Motivation
•
Why is Security important?
– Vulnerability of WSN
•
•
Remote environments
Broadcast nature of the channel
– What an attacker can potentially do?
•
•
•
Physical manipulation
Jamming
Injecting code
GOAL: Make the node think it is
somewhere different from actual
location
– As a result…
•
Wrong results: wrong decisions
Secure Localization
•
•
Goal: To guarantee correctness despite of the
presence of intruders
Network model:
•
•
•
Beacons: GPS or manual configuration
Common nodes: requesting
Relative
Localization
Classification:
•
•
o
o
Range-based localization: Distance
Range-free localization: No connectivity information
Node-centric
Infrastructure-centric: BS, CA
Secure Localization
•
General Process has two phases:
1. Information Collection: distance/angle measure
– # of hops, RSSI, ToA, AoA
Range-free ignores this phase
2. Location Computation: include reference points
Triangulation
Trilateration
Secure Localization
•
Known Attacks
– Consider an insider Vs. an outsider
– Reply attack
•
•
•
•
Jams the transmission
Waits (extra delay)
Replays the same packet pretending
to be the sender
Inaccurate location estimation
Secure Localization
•
Known Attacks
– Range-change attack
•
•
Special case of the Replay attack
Increase/decrease range measurements
– Impersonation
•
Victims: mostly beacon nodes
– Sybil attack
•
Claims multiple identities
Secure Localization
•
Known Attacks
– Wormhole attack
•
•
•
Tunnel
Jams packets
Replays packets through this tunnel
Secure Localization
•
Solutions
– Cryptography
•
•
Against impersonation and data corruption
Use of :
– Authentication
» Verify the sender
– Data integrity
» Data is unchanged
» Example: distance bounding (based on SEAD)
Secure Localization
•
Solutions
– Cryptography (continued)
•
•
•
•
Symmetric cryptography
– Common private key
– WSN are resource-constrained
Pre-deployed keys
Functions to derive keys: Storage Complexity
Compromised nodes defeat this mechanism
Secure Localization
•
Solutions
– Misbehavior Detection and Block
•
•
•
•
Against compromised nodes
Observe behavior of nodes
Detect and revoke misbehaving nodes
Some techniques
– RTT observation between two neighbors
» Assumption: extra delay of a replay attack
– Reputation-based mechanism
» Beacon monitors its neighborhood -> table
Secure Localization
•
Solutions
– Robust Position Computation
•
•
•
Filter erroneous information during computation
Assumption: Good nodes > Malicious nodes
Statistical techniques
– Least Squares Method
Location Verification
•
BS also learn sensors’ locations
– Data Aggregation
•
Must verify the location claimed is correct
– Did the event really happened there?
•
An approach: The Echo Protocol
– Check if the node is inside the claimed region
– Two types of nodes: p (prover) and v (verifier)
– Consider c (speed of light) and s (speed of sound)
Location Verification
•
An approach: The Echo Protocol (continued)
– Intuition (Simple Case)
•
v only verifies provers inside R
•
If p is able to return the packet in sufficient time, then v
is sure that p is within d(v,l) meters of v
Otherwise: p is further away or processing delay
•
Design Considerations
•
No system is totally safe
– Network model & adversary model
•
Level of security Vs. Available resources
– Particular application
– Range-based :
•
Distance bounding: HW with nanosecond precision
– Asymmetric cryptography
•
More robust but energy consuming
Design Considerations
•
Who initiates the secure localization process?
– On-demand
– Periodic process
•
Useful domain for an intruder
– Use only beacon nodes
– Use beacon nodes and also nodes with known
positions as reference points
Conclusions
•
It is not feasible to use tamper-resistant
hardware
– Low cost of sensor nodes
– Massive deployment
•
Trade-off required
– Accuracy demanded by the application
– Available resources
– Environment
•
Combination of techniques is desirable
Download