Attacks And Defenses Of Ubiquitous Sensor Networks

Based on recent technological advances, the manufacturing of a large number of low cost wireless sensors became technically and economically feasible. Thousands of these sensors can potentially be networked as a wireless sensor network for many applications that require unattended, long-term operations. One of the critical challenges to making sensor networks more pervasive and secure is the severe resource constraints, in terms of energy and memory, on the sensor nodes. This dissertation explores specific security issues associated with sensor networks. In particular, we explore four related themes: (1) we begin by developing a taxonomy of security attacks and existing countermeasures for sensor networks. Although this taxonomy serves as a reference for security attacks, it points out a lack of a holistic view of the overall security requirements and threat models in sensor networks. Without these notions we cannot evaluate the tradeoffs between resource constraints and security. Then, we explore the development of methodologies for evaluation and design of secure sensor network security by defining: (a) security properties and security metrics to help us understand the value of each security solution, (b) a realistic threat model to understand the practical nature of the adversary model in sensor networks, (c) a security design space to identify best practices for the design and configuration of secure sensor networks. This framework can be used to formally define and analyze security attacks and the effectiveness of solutions for each attack and to identify the path of least resistance for an attacker. (2) Our second theme explores the issue of insider attacks on fundamental services and applications in sensor networks. This type of attack has a more serious impact on the network since the attacker is in possession of the cryptographic keys and can participate in communication. We specifically look at the time synchronization service and the object tracking algorithm. Time synchronization protocols provide a mechanism for synchronizing the local clocks of the nodes in a sensor network. Many applications, such as networking protocols, rely heavily on accurate timing to perform their tasks. We analyze attacks on different categories of time synchronization protocols, show how these attacks affect different classes of protocols, and propose solutions for each attack. We also implement our attacks and countermeasure for one class of time synchronization protocols. Next, we analyze the effect of insider attack on multiple object tracking by focusing on a hierarchical target tracking algorithm specifically designed for sensor networks. We develop a hierarchical reputation system framework that helps detect node misbehavior and isolate malicious entities. We evaluate our reputation system experimentally and demonstrate how it improves object tracking in the presence of malicious nodes. (3) The third theme in this dissertation deals with the security issues facing the applications that use sensor networks. We look at two important applications that use sensor networks: health care systems, and the process control systems. We develop an integrity monitoring system for the health care application. We develop two security solutions for process control systems: (1) a model-based intrusion detection system, and (2) secure key management and software update. (4) In the last part of the dissertation, we use a game theoretic framework to analyze and build a distributed reputation mechanism for sensor networks. Game theory provides a way of mathematically formalizing the decision-making process. However, there has been very limited research in the area of sensor network security. Therefore, the object of our research is to analyze the available game theoretic approaches for reputation systems and apply those to field of sensor networks.

[1]  Pravin Varaiya,et al.  PEDAMACS: power efficient and delay aware medium access protocol for sensor networks , 2004, IEEE Transactions on Mobile Computing.

[2]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[4]  David E. Culler,et al.  Active Message Communication for Tiny Networked Sensors , 2000 .

[5]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[6]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[7]  Cheryl L. Beaver,et al.  Key Management for SCADA , 2002 .

[8]  Hugo Krawczyk,et al.  Strengthening Digital Signatures Via Randomized Hashing , 2006, CRYPTO.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[10]  Samuel S. Blackman,et al.  Multiple-Target Tracking with Radar Applications , 1986 .

[11]  R Bellman,et al.  On the Theory of Dynamic Programming. , 1952, Proceedings of the National Academy of Sciences of the United States of America.

[12]  George Cybenko,et al.  Detection of attacks on cognitive channels , 2008 .

[13]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[14]  EstrinDeborah,et al.  Fine-grained network time synchronization using reference broadcasts , 2002 .

[15]  Gabor Karsai,et al.  A testbed for secure and robust SCADA systems , 2008, SIGBED.

[16]  Yaakov Bar-Shalom,et al.  Estimation and Tracking: Principles, Techniques, and Software , 1993 .

[17]  Jean-Yves Le Boudec,et al.  Analysis of a robust reputation system for self-organised networks , 2005, Eur. Trans. Telecommun..

[18]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[19]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[20]  Tarek F. Abdelzaher,et al.  AIDA: Adaptive application-independent data aggregation in wireless sensor networks , 2004, TECS.

[21]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[22]  Philip Ginzboorg,et al.  Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems , 2004, ESAS.

[23]  J. Regehr,et al.  Memory Safety and Untrusted Extensions for TinyOS , 2006 .

[24]  Yongdae Kim,et al.  Remote Software-Based Attestation for Wireless Sensors , 2005, ESAS.

[25]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[26]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[27]  Robert Morris,et al.  Designing a framework for active worm detection on global networks , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..

[28]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[29]  Matt Welsh,et al.  Sensor networks for medical care , 2005, SenSys '05.

[30]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[31]  Kay Römer Time synchronization in ad hoc networks , 2001, MobiHoc '01.

[32]  S. Shankar Sastry,et al.  Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.

[33]  S. Sastry,et al.  An Efficient Algorithm for Tracking Multiple Maneuvering Targets , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[34]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[35]  F. Mosteller,et al.  Understanding robust and exploratory data analysis , 1985 .

[36]  Peter J. Rousseeuw,et al.  Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.

[37]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[38]  Tetsu Iwata,et al.  Side Channel Attacks on Message Authentication Codes , 2005, ESAS.

[39]  Shivakant Mishra,et al.  Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.

[40]  Sonja Buchegger,et al.  Coping With Misbehavior in Mobile Ad-hoc Networks , 2004 .

[41]  Vincent Buskens,et al.  Social networks and trust , 1999 .

[42]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[43]  Stephen B. Wicker,et al.  Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.

[44]  H. Kushner,et al.  Stochastic Approximation and Recursive Algorithms and Applications , 2003 .

[45]  Rıdvan Berber Methods of model based process control , 1995 .

[46]  Deborah Estrin,et al.  Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[47]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[48]  Deborah Estrin,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .

[49]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[50]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[51]  Robert A. Greenes,et al.  SMART--an integrated wireless system for monitoring unattended patients. , 2008, Journal of the American Medical Informatics Association : JAMIA.

[52]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[53]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[54]  David Gay,et al.  Software design patterns for TinyOS , 2005, LCTES '05.

[55]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[56]  Vincent H. Berk,et al.  An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.

[57]  S. Buchegger,et al.  A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .

[58]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[59]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[60]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[61]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[62]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[63]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[64]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[65]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[66]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[67]  Stephen B. Wicker,et al.  Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[68]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[69]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[70]  Vincent H. Berk,et al.  Detection of complex cyber attacks , 2006, SPIE Defense + Commercial Sensing.

[71]  T. Başar,et al.  A New Approach to Linear Filtering and Prediction Problems , 2001 .

[72]  S. Shankar Sastry,et al.  A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.

[73]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[74]  John S. Baras,et al.  Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[75]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[76]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[77]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[78]  B. Hohlt,et al.  Flexible power scheduling for sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[79]  Valentine Crespi,et al.  Decentralized sensing and tracking for UAV scheduling , 2004, SPIE Defense + Commercial Sensing.

[80]  Majid Sarrafzadeh,et al.  Medical Embedded Systems , 2007, IESS.

[81]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[82]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[83]  Insup Lee,et al.  Quantifying eavesdropping vulnerability in sensor networks , 2005, DMSN '05.

[84]  Shashidhar Gandham,et al.  STCP: a generic transport layer protocol for wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[85]  Roberto Di Pietro,et al.  Efficient and resilient key discovery based on pseudo-random key pre-deployment , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[86]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[87]  S. Shankar Sastry,et al.  Distributed Reputation System for Tracking Applications in Sensor Networks , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[88]  S. Shankar Sastry,et al.  Integrity checker for wireless sensor networks in health care applications , 2008, Pervasive 2008.

[89]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[90]  Deirdre K. Mulligan,et al.  Con dentiality In Sensor Networks : Transactional Information , 2007 .

[91]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[92]  Michael O. Kolawole,et al.  Estimation and tracking , 2002 .

[93]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[94]  Yong Tan,et al.  Evaluation and design of online cooperative feedback mechanisms for reputation management , 2005, IEEE Transactions on Knowledge and Data Engineering.

[95]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[96]  Zhu Han,et al.  A self-learning repeated game framework for optimizing packet forwarding networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[97]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[98]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[99]  Songhwai Oh,et al.  Markov chain Monte Carlo data association for general multiple-target tracking problems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[100]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[101]  Gyula Simon,et al.  Countersniper system for urban warfare , 2005, TOSN.

[102]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[103]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[104]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[105]  Fredrik Gustafsson,et al.  Monte Carlo data association for multiple target tracking , 2001 .

[106]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[107]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[108]  K. Wac,et al.  Mobile patient monitoring: the MobiHealth system. , 2004, Studies in health technology and informatics.

[109]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[110]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[111]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[112]  Ulf Lindqvist,et al.  Key management and secure software updates in wireless process control environments , 2008, WiSec '08.

[113]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[114]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[115]  Syed Masud Mahmud,et al.  Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles , 2006 .

[116]  S. Shankar Sastry,et al.  Testbed Implementation of a Secure Flooding Time Synchronization Protocol , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[117]  Allen B. MacKenzie Game theoretic analysis of power control and medium access control , 2003 .

[118]  Y. Bar-Shalom Tracking and data association , 1988 .

[119]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[120]  E. Byres,et al.  The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems , 2004 .

[121]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[122]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[123]  Tassos Dimitriou,et al.  Secure and Efficient In-Network Processing for Sensor Networks , 2004 .

[124]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[125]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.