documental sustentable

Share Embed


Descripción

Applying Intrusion Detection Systems to Wireless Sensor Networks Rodrigo Roman, Jianying Zhou, Javier Lopez

10 January 2006

Applying Intrusion Detection Systems to Wireless Sensor Networks

Summary • Wireless Sensor Networks • Intrusion Detection Systems • IDS Architecture for Wireless Sensor Networks • Conclusions

Applying Intrusion Detection Systems to Wireless Sensor Networks

Wireless Sensor Networks

Applying Intrusion Detection Systems to Wireless Sensor Networks

Wireless Sensor Networks (WSN) What? • Nodes: Constrained, Sensors, Wireless. • Dense Network (100 - more...) • ∑Nodes = WSN Applications • Healthcare • Environment • AmI (Smart Homes) • Military • ... Applying Intrusion Detection Systems to Wireless Sensor Networks

Infrastructure – Nodes Nodes Nodes Features:

Base Station

• 8 Mhz, 128Kb I’s • Battery: 1 year (“stand-by”) • Radio (19.2 – 250 Kbps) Roles: • Harvesters • Routers • Distributed Platform

Applying Intrusion Detection Systems to Wireless Sensor Networks

Infrastructure – Base Station Nodes B.S.: Less Constrained

Base Station

Roles: • Manager • Interface (Data Dissemination Network)

Applying Intrusion Detection Systems to Wireless Sensor Networks

Points of Attack

• Node Integrity Physical

• Channel Integrity • Environment Integrity • Energy Integrity

Every Node!

• Information Integrity Logical

• Protocol Integrity • Configuration Integrity

Applying Intrusion Detection Systems to Wireless Sensor Networks

Intrusion Detection Systems

Applying Intrusion Detection Systems to Wireless Sensor Networks

Intrusion Detection Systems • Intrusion? • Set of Actions Æ Unauthorized Access/Alteration • Detection: Intrusion Detection Systems (IDS)

- O.S. Logs - Applications

- Anomaly Detection - Network Packets

- Signature Detection

Applying Intrusion Detection Systems to Wireless Sensor Networks

IDS – Wireless Networks • Applying IDS to Wireless Networks… A real problem / • Wireless Communication, Multiple nodes… = Multiple points of attack • (Usually) IDS Agents inside every node: Constrained resources • Specific problems in Wireless Sensor Networks • Nodes are even more constrained • Highly specialized protocols • User/Administrator away from the problems (BS)

Applying Intrusion Detection Systems to Wireless Sensor Networks

IDS and WSN – State of the Art • Partial Solutions • Analysing fluctuations in sensor readings • Anomaly detection, HMM • Attesting the integrity of the code • Check I’s memory… but time is what matters! • Others: Send (protected) attesting algorithm • Watching over the information interchange (Watchdog) • Expensive for resource constrained nodes • No general infrastructure • Rules, rules, rules…

Applying Intrusion Detection Systems to Wireless Sensor Networks

IDS Architecture for Wireless Sensor Networks

Applying Intrusion Detection Systems to Wireless Sensor Networks

Architecture: “Template” • How it SHOULD be? • Separate detection tasks • Local Agents: Internal Info, Active 100% of the time • Global Agents: External Info, Aim for 100% coverage • What they should analyse? From what sources? • Share information between agents • Cryptography, voting mechanism (Ad Hoc), trust • Notify users – Base Station • Secure Broadcast algorithms (µTesla) • Optimised Alert database (small disk space) • Should have {timestamp, classification, source} Applying Intrusion Detection Systems to Wireless Sensor Networks

Local Agents - Node Status

- Physical/Logical Integrity

- Sent/Received Packets

- Measurement Integrity

- Measurements

- Protocol Integrity

- Neighbour Information

- Neighbourhood

Source Data

Analisys

Applying Intrusion Detection Systems to Wireless Sensor Networks

Local Agents • Physical Integrity • Nodes are easily accessible: Destroy! • Communication channel (Radio) is easily accessible: Jamming! • Alert: HW failures, anomaly in communication channels • Logical Integrity • Nodes can be reprogrammed • Alert: Programming event (Xnp) • Measurements • Physical attacks (e.g. defective sensors, others [fire – temperature sensor, movement – accelerometer]) • Alert: Anomaly detection systems Applying Intrusion Detection Systems to Wireless Sensor Networks

Local Agents • Protocol Integrity • Many protocols (Why? Specialized network) = Many attacks (malformed packets, packet injection,…) • Develop lightweight detection techniques • Neighbourhood • Static networks: Few variations in the network infrastructure • Alerts: New nodes, “disappearing” nodes … • Too much energy usage? • Analysis (protocols, measurements) – open issue

Applying Intrusion Detection Systems to Wireless Sensor Networks

Global Agents • Problem: Energy! Assure:

Source

- Balance tasks

Data

Information (Broadcast)

Analysis

- Network coverage

- Protocol Analysis (“Watchdogs”)

Applying Intrusion Detection Systems to Wireless Sensor Networks

Global Agents Stronger...

Hierarchical Networks • “Cluster Head” (CH) controls its section of the network • Global Agent, part of C.H.

Flat Networks • No hierarchy, same nodes • Global Agent? • Spontaneous Watchdog (SW) Applying Intrusion Detection Systems to Wireless Sensor Networks

Spontaneous Watchdogs • Premise: • “For every packet circulating in the network, there are a set of nodes that are able to receive both that packet and the relayed packet by the next-hop” • Only for dense networks • One of the nodes will activate its Global Agent: • Network coverage (∀ packet covered by [at least] 1 node) • Energy savings (detections tasks are distributed over the nodes)

Node C

Node A

Node B

Node D

Applying Intrusion Detection Systems to Wireless Sensor Networks

Spontaneous Watchdogs – Process • Algorithm • Every node receives all packets sent inside its neighbourhood (Waste of energy? No: Am I the destination of this packet?) • The destination of the packet is in my neighbourhood? Yes: I can be a Spontaneous Watchdog • How many nodes are in my situation? (n) • Need the list of neighbours of all my neighbours • Process: Intersect neighbours of sender and receiver = n Ej: A {B,C,D}, B {A,C,D} Æ {C,D} • Probability of being Spontaneous Watchdog: 1/n • There is no negotiation – process is totally independent

Applying Intrusion Detection Systems to Wireless Sensor Networks

Spontaneous Watchdogs – Problems • Situations with no active watchdog! • 0 SW : (33%) 0.29 – 0.36 • 1 SW : (40%) 0.44 – 0.36

% spontaneous watchdogs

50

• 2 SW : (20%) 0.19 – 0.22

• Drawback: More than one SW for one packet • Balance: Security / Energy

10 neighbors

35

5 neighbors

30

3 neighbors

25 20 15 10

0 1

2

3

4

5

6

7

8

9

10

11

Number of Nodes

50

Scenario probability (%)

• 0 SW : (7%) 0.04 – 0.12

25 neighbors

40

5

• Solution: Change (Increase) probabilities • E.g. : Double probability

45

45

25 neighbors

40

10 neighbors

35

5 neighbors 3 neighbors

30 25 20 15 10 5 0 0

1

2

3

4

5

6

7

8

9

10

Number of spontaneous w atchdogs (Nodes)

Applying Intrusion Detection Systems to Wireless Sensor Networks

Conclusions

Applying Intrusion Detection Systems to Wireless Sensor Networks

Conclusions • This is the path we have to walk… let’s walk it! • Apply existent algorithms to a complete IDS system • Analize protocols, deduce detection systems • Simulations • Other details • Network lifetime: Structure evolution (Ej: neighbour list) • IDS for mobile environments (mobile nodes)

Applying Intrusion Detection Systems to Wireless Sensor Networks

Applying Intrusion Detection Systems to Wireless Sensor Networks Rodrigo Roman, Jianying Zhou, Javier Lopez

10 January 2006

Applying Intrusion Detection Systems to Wireless Sensor Networks

Lihat lebih banyak...

Comentarios

Copyright © 2017 DATOSPDF Inc.