Location Verification

Download Report

Transcript Location Verification

A Survey of Secure Location
Schemes in Wireless Networks
- 2010/5/21
Outline


Introduction
Secure Location Schemes






Location Verification
Range-independent Scheme (SeRLoc)
Base Station Assisted Secure Localization
Detect Compromised Beacon Nodes
Defeat Non-cryptographic Attacks
Summary
2/35
Location & Identity in Wireless Networks

Application



Network


Location Based Service (LBS)  privacy issues
Solution: legal framework, k-anonymity, etc.
Geographical routing, location based access control
Physical Layer

Location could be used to detect source spoofing attacks
(in wireless networks)
3/35
Wireless Sensor Network (WSN)

WSN





Have mission-critical tasks
Sensor nodes: low cost,
limited resource,
multifunctional
Usually has one BS
Prone to failure, easy to be
compromised
Location matters

The location of sensors is a
critical input to many higherlevel networking tasks [5]
4/35
Localization in WSN

Techniques:



GPS
Ultrasound
Radio (RF)


Usually has Beacon nodes


RSSI, ToA, TDoA, AoA, etc.
With known locations and sending beacon signals
Security issues:


Location discovery in hostile environments
Attacker could masquerade or compromise beacon nodes,
or perform replay attacks
5/35
Threat Model

(Internal) dishonest or compromised nodes



(External) malicious nodes



Can authenticate itself (to other sensor nodes)
Report false position
Can not authenticate itself (as an honest nodes)
Can perform timing attack (delaying or speeding-up)
Other attacks

PHY-layer attack
6/35
Examples
Masquerade beacon node
Compromised
beacon node
Replay attack
(locally replay or through wormhole)
7/35
Taxonomy
Secure Location
w/ beacon nodes
Localization:
• Location Verification
• Range-independent
localization
• Base Station Assisted
w/o beacon nodes
Attack Detection:
• Detect Compromised
Beacon Nodes
• Defeat Noncryptographic Attacks
8/35
Location Verification
(Location-based Access Control)


In-region verification
Roles:

Claimants & Verifiers
C: I’m at some location l
V
C
R
Region of interest

Method:

Distance bounding techniques

Upper bound the distance of one device to another (dishonest)
device
[1] N. Sastry, U. Shankar, and D. Wanger, “Secure Verification of Location Claims,” in Proc. ACM
Workshop Wireless Security, 2003, pp. 1-10.
9/35
Location Verification
(Location-based Access Control)
• A simplified case
Echo Protocol: (secure, lightweight)
. p (prover)
(why sound?)

More complex cases:



c: light speed
s: sound speed
Consider processing/transmission delay,
Consider non-uniform regions,
Consider multiple verifiers
10/35
Distance Enlargement Attacks
(MMSE: Min. Mean Square Estimate)


Distance bounding – vulnerable to distance enlargement
attacks but not to distance reduction attacks
Propose VM (Verifiable Multi-lateration)

Also relies on distance bounding (at least 3 verifiers)
T: set of verifiers that
form triangles around
u (claimant)
[2] S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with Application to
Sensor Networks,” in Proc. INFOCOM, 2005, vol. 3, pp. 1917-1928.
11/35
Detection of Distance Enlargement Attack
u’
Enlarging db1 is impossible
12/35
SPINE (Secure Positioning In sensor
NEtwork)


SPINE: a system for secure positioning of a network of
sensors, that is based on VM
x: # of compromised nodes (c)
Possible Attacks: (Attacker-x-y)
y: # of malicious nodes (m)
13/35
SPINE (Secure Positioning In sensor
NEtwork) (cont’d)

Operate in 2 phases:


Sensors measure distance bounds to their neighbors
Central authority compute sensors’ positions (according to
the distance bounds)
(Verify db(s), then compute positions based on verified db(s))
(Positioning is also based on MMSE)
BDV (Basic Distance Verification)
14/35
SPINE (Secure Positioning In sensor
NEtwork) (cont’d)

Effectiveness:

The effectiveness of this system depends on the number of
node neighbors (node density) and on the number and the
distribution of the reference nodes (verifiers)
15/35
Taxonomy
Secure Location
w/ beacon nodes
Localization:
• Location Verification
• Range-independent
localization
• Base Station Assisted
w/o beacon nodes
Attack Detection:
• Detect Compromised
Beacon Nodes
• Defeat Noncryptographic Attacks
16/35
Range-Independent Localization

Motivation:




Goal:


Distance measure is vulnerable
Do not count on distance measure to infer the sensor
location
Secure localization ≠ location verification
Decentralized, resource efficiency, robust
Contributions:



Propose SeRLoc, a range-independent localization scheme
Propose security mechanism for SeRLoc
Evaluate the performance of SeRLoc
[3] L. Lazos and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for
Wireless Sensor Networks,” in Proc. ACM Workshop Wireless Security, 2004, pp. 21-30.
17/35
SeRLoc

Concept:



Locators use sectored antennas (with range R)
A sensor can identify the region it resides by computing the
overlap between all the sectors it resides
Then estimates its location at the center of gravity of the
overlapping region
18/35
Secure SeRLoc

Encryption:



Locator ID authentication:



To protect the localization information, encrypt all beacons
transmitted from locators
Sensors and locators share a global symmetric key K0
Use one-way hash chains to provide locator ID auth.
Each sensor has a table containing {IDi , Hn(PWi)} of each
locator
Storage issues
19/35
Threat Analysis


Authors analyze (1) wormhole attacks and (2) Sybil
attack and compromised sensors
Analyze the vulnerabilities of other 3 rangeindependent localization schemes

Dv-hop, Amorphous localization, APIT
20/35
Taxonomy
Secure Location
w/ beacon nodes
Localization:
• Location Verification
• Range-independent
localization
• Base Station Assisted
w/o beacon nodes
Attack Detection:
• Detect Compromised
Beacon Nodes
• Defeat Noncryptographic Attacks
21/35
Base Station Assisted Approaches

Contribution:



New approach, relies on a set of covert base stations
Enables secure localization with a broad spectrum of localization
techniques (ultrasound, RF, etc)
Covert Base Station (CBS):



Known position
Passively listen to the on-going communication
Could be hidden or mobile base station
broadcast
nonce
PBS
nonce
sensor
(PBS: Public Base Station)
PBS
PBS
CBS
measure TDoA and compute
sensor’s position
[4] S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization with Hidden and Mobile
Base Stations,” in Proc. INFOCOM, 2006.
22/35
1. Infrastructure-centric
Positioning with
Hidden Base Stations

TDoA:
Position a source by finding
the intersection of multiple hyperboloids.
 Pros: does not require communication from BSs and mobile
nodes


Security analysis:



TDoA drawback: using directional antennas, attackers could
cheat BSs
Δ: tolerant size (also means the size of attacker’s guessing space)
T: signal propagation time + node processing time
23/35
2. Node-centric
Positioning with
Hidden Base Stations


Node compute its position,
then verified by CBS
Node-centric:


Attacker might spoofs node’s position and then cheats on the
position verification mechanism
CBS again verify the reported position by distance measure
24/35
3. Secure Positioning
with Mobile Base
Stations
25/35
Taxonomy
Secure Location
w/ beacon nodes
Localization:
• Location Verification
• Range-independent
localization
• Base Station Assisted
w/o beacon nodes
Attack Detection:
• Detect Compromised
Beacon Nodes
• Defeat Noncryptographic Attacks
26/35
Detecting Malicious Beacon Nodes

Motivation:


Goal:



None of previous techniques can work properly when some
of the beacon nodes are compromised
Try to detect and remove compromised beacon nodes
Ensure correct location discovery
Approach:



Detect malicious beacon signals
Detect replayed beacon signals to avoid false positive
Revoke malicious beacon nodes
[6] D. Liu, P. Ning, and W. Du, “Detecing Malicious Beacon Nodes for Secure Location
Discovery in Wireless Sensor Networks,” in Proc. ICDCS, 2005, pp. 609-619.
27/35
Detecting Malicious Beacon Signals

Idea:



Use beacon node (known location) to detect other beacon nodes
Locations of beacon nodes must satisfy the measurements (of
their locations) derived from their beacon signals
Method:
Note: to mislead the
location estimation, the
attacker has to make
the estimated distance
inconsistent with the
calculated one.
(By request & reply)
28/35
Filtering Replayed Beacon Signals
(Goal: avoid False Positive)

Malicious signal ≠ this node is malicious !


 Replay through a wormhole attack



Due to replay attack
Detect this attack by checking the measured distance and the
radio communication range
If within the communication range, go to next step (locally replay)
 Locally replayed beacon signals


Detect extra delay by measuring RTT between two neighbors
RTT measure in a real setup (does NOT consider the impacts of
MAC protocol or any processing delay)


Extra delay  larger than RTTmax
(Assumption required) authenticated and unicasted beacon signal !!
29/35
Revoke Malicious Beacon Nodes

Use the base station to further remove malicious
beacon nodes from the network



Each beacon node shares a unique random key with BS
Beacon nodes can report the detecting results to BS
securely
BS evaluates the suspiciousness of each beacon nodes


BS Maintains alert counters and report counters
This mechanism requires more beacon nodes and
incurs more communication overhead
30/35
Taxonomy
Secure Location
w/ beacon nodes
Localization:
• Location Verification
• Range-independent
localization
• Base Station Assisted
w/o beacon nodes
Attack Detection:
• Detect Compromised
Beacon Nodes
• Defeat Noncryptographic Attacks
31/35
Focus on Non-cryptographic Attacks

Non-cryptographic attacks (physical attacks)



Propose a general attack detection model




Such as signal attenuation and amplification
Degrade the performance of localization Algo.
Based on this model, analyze two broad localization
approaches (Multi-lateration based & signal strength based)
The attack detection mainly depends on statistical
significance testing
Other test statistics are also discussed
Conduct trace driven evaluations

Using an 802.11 network and an 802.15.4 (ZigBee) network
[5] Y. Chen, W. Trappe, and R. P. Martin, “Attack Detection in Wireless Localization,” in Proc.
INFOCOM, 2007.
32/35
Models



Linear attack model on RSS
Conduct Exp. in two real
office buildings
Detection model:



Statistical significance
testing
Define test statistic T, null
hypothesis H0, and its
acceptance region Ω
Metrics:


Detection Rate
ROC curve
33/35
Reference
[1] N. Sastry, U. Shankar, and D. Wanger, “Secure Verification of Location
Claims,” in Proc. ACM Workshop Wireless Security, 2003, pp. 1-10.

UC Berkeley
[2] S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with
Application to Sensor Networks,” in Proc. INFOCOM, 2005, vol. 3, pp. 19171928.

EPFL Switzerland
[3] L. Lazos and R. Poovendran, “SeRLoc: Secure Range-Independent
Localization for Wireless Sensor Networks,” in Proc. ACM Workshop
Wireless Security, 2004, pp. 21-30.

Univ. of Washington
[4] S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization with Hidden
and Mobile Base Stations,” in Proc. INFOCOM, 2006.
34/35
Reference
[5] Y. Chen, W. Trappe, and R. P. Martin, “Attack Detection in Wireless
Localization,” in Proc. INFOCOM, 2007.

Rutgers Univ.
[6] D. Liu, P. Ning, and W. Du, “Detecing Malicious Beacon Nodes for Secure
Location Discovery in Wireless Sensor Networks,” in Proc. International
Conf. Distributed Computing Systems (ICDCS), 2005, pp. 609-619.

NCSU, Syracuse Univ.
[7] D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor
Networks,” in Proc. International Symposium Information Processing Sensor
Networks (IPSN), 2005, pp. 99-106.
[8] L. Fang, W. Du, and P. Ning, “A Beacon-less Location Discovery Scheme for
Wireless Sensor Networks,” in Proc. INFOCOM, 2005.
[9] W. Du, L. Fang, and P. Ning, “LAD: Localization Anomaly Detection for
Wireless Sensor Networks,” in Proc. IEEE International Parallel Distributed
Processing Symposium (IPDPS), 2005, pp. 41a-41a.
35/35