Slides

advertisement
Delay Aware, Reconfigurable Security
for Embedded Systems
Tammara Massey1
Foad Dabiri1
Majid Sarrafzadeh1
1
2
Philip Brisk2
Outline

ECG Application

Security in BANs

Related Work

Dynamic Security System (DYNASEC)

Conclusion
1/15
Body-Area Network Application

Electrocardiogram (ECG) Sensor

Large bandwidth requirement
 Parallel

Environmental interferences
 Patient

transmission of many waveforms
movement
Respond to anomalies
 Activate

drug delivery mechanism
Based on SQRS Algorithm [Pino et al., ’05]


ECG waveforms
May misclassify features due to noise
 Addressed

via moving threshold with independent values
Extra noise classification removed to reduce code size
2/15
Security in Body-Area Networks


Health Insurance Portability and Accountability Act
(USA)

“… ensure integrity and confidentiality of information”

“… protect against reasonably anticipated threats or
hazards to the security of integrity of the information”
Security-Processing Gap [Ravi et al., ’03]

Exacerbated for body area networks
 Limited
Memory
 Battery lifetime
 Bandwidth
3/15
Related Work

TinyPK [Watro et al., ’04]


Authentication and key exchange via RSA encryption
TinySec [Karlof et al., ’04]

Link-layer security for wireless sensor networks

Authentication, Skipjack/RC5 encryption

Elliptic curve cryptography on motes [Malan et al., ’04]

DYNASEC: adds reconfigurable element to security
4/15
Dynamic Security System
(DYNASEC)

Normal operation


Anomaly detected


High security all around
Hard real-time requirements
Reconfiguration to meet the deadline

Dynamically change security levels

Throttle packet size
5/15
DYNASEC System Design

Sensor Operating System (SOS) [Han et al., ’05]

Message Integrity Code (MIC)

Encryption (is optional)
 Skipjack,

RC5 implemented in SOS kernel
Memory requirements

Original – 17% of Mica2 mote memory

Modified – 39% of Mica2 mote memory
 Encryption
algorithms have large data segments
6/15
Four Security Levels

L0 – No Security

L1 – MIC Authentication + No Encryption

L2 – MIC Authentication + Skipjack Encryption

L3 – MIC Authentication + RC5 Encryption

RC5 is faster and stronger than Skipjack

Pre-computed key schedule consumes 2.6% of Mica2
mote memory
7/15
Security Cost
Processing Delay
(cycles)
Processing Delay of DYNASEC Security Levels
with Different Packet Sizes for the ECG
Application
Packet size
15000
(bytes)
1
10000
50
100
5000
0
Zero
One
Two
Three
Security Level
8/15
Dynamic Security Allocation

Network organized as a directed ayclic graph (DAG)


Sink is a centralized node with more processing
power than other nodes
In response to anomaly redistribute security levels

Integer Budgeting Problem on a DAG

Model as Linear Program
 Solve
LP (CPLEX) on centralized node
 Relax to nearest integer solution
 If no solution is available

Reduce the packet size and try again
9/15
Budgeting Problem Formulation

Given: Hard-timing constraint for communication

Maximize: Aggregate security of all motes in the DAG

Subject to the following constraints

Exactly one security algorithm assigned to each mote

Each source-to-sink path satisfies the timing constraint

For each link:
 The
flow of packets sent into each link does not exceed
the link capacity

For each internal mote:
 The
flow of outgoing packets is equal to the flow of
incoming packets
10/15
Pragmatic Issues

Propagation time from centralized node to other
nodes is non-negligible

Only run the algorithm if there is at least a 15%
change in link quality
 Can

re-use the old solution for repeated anomalies
If there is a change…
 Nodes
make temporary local decisions for the best
routing path…


Link quality used to choose next hop
Modifies security level
 Lower if it cannot achieve desired throughput
 Higher if it exceeds desired throughput
 Until
the centralized node propagates its solution
11/15
Experimental Setup

Randomly generated network

Simulation on Avrora [Titzer et al., ’05]

10 nodes or less (for now)
 Runtime

of LP solver doesn’t scale
3 Types of Links
 Well-connected

20% of packets dropped
 Lossy

50% of packets dropped
 Very

lossy
80% of packets dropped
12/15
Evaluation

Small Network (10 nodes or less)

Reasonable for today’s body area networks
 LP



converges in approximately 1.5 ms, on average
Does not include time to propagate solution to the nodes
in the network
Establishes feasibility of the approach
Will not scale for larger network
 Must
solve budgeting problem in distributed fashion
13/15
Conclusion (1/2)


Security-Processing Gap

Exacerbated for BANs

Limited memory
New cryptographic algorithms are needed

Smaller code/data segments
 Approximately
11% of mote memory, per algorithm,
could be improved

Configurability
 Allow
the user to select a tradeoff between runtime and
cipher quality
14/15
Conclusion (2/2)

Anomalies  Hard real-time constraints


DYNASEC reconfigures security levels in response
Security allocation is a budgeting problem

Solved using LP-relaxation on centralized node

Future work: solve the problem in distributed fashion
on the motes
 Increase
emphasis on throttling packet size
15/15
Download