a middleware approach to configure security in wsn

26
IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp- microelectronics.com © 2007 - All rights reserved A Middleware Approach to Configure Security in WSN Peter Langendörfer Steffen Peter, Krzysztof Piotrowski, Renato Nunes, and Augusto Casaca

Upload: sonja

Post on 24-Jan-2016

37 views

Category:

Documents


0 download

DESCRIPTION

A Middleware Approach to Configure Security in WSN. Peter Langendörfer Steffen Peter, Krzysztof Piotrowski, Renato Nunes, and Augusto Casaca. Outline. Background & Motivation Middleware Compiler Middleware Architecture Conclusions. Background & Motivation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Middleware Approach to Configure Security in WSN

IHPIm Technologiepark 2515236 Frankfurt (Oder)

Germany

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

A Middleware Approachto Configure Security in WSN

Peter Langendörfer

Steffen Peter, Krzysztof Piotrowski, Renato Nunes, and Augusto Casaca

Page 2: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Outline

• Background & Motivation

• Middleware Compiler

• Middleware Architecture

• Conclusions

Page 3: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Background & Motivation

Page 4: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Background: Application Scenarios

Page 5: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Transport

Network

MAC

Sensor

OS

Apps

complete jamming, selective/partly jamming, eavesdropping, replay attacks

invasive attacks, semi-invasive attacks, non-invasive attacks

exploiting backdoors, buffer overflows, remote node programming, direct programming, denial of service attacks

sensed data injection, access sensed data, service disruption, etc.

routing loop, black hole grey holes, wormhole, injecting, network partitioning, etc

tamper with sensor, falsified sensor reading

1. UbiSec&SensContribution of Security solutions for…

- Middleware Security - Sensor measurements - Transport, Network, MAC

eavesdropping, man-in-the-middle, replay, spoofing

send erroneous data, inject wrong control packets, send changed data, duplicate data, eavesdrop

HW RF

Middleware

Background: WSN Security Tomography

Page 6: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Background: Security the Centre of Gravity

key pre-distribution

security

reliability&

routing & in-networkprocessing

authentication“re-recognition”

concealed dataaggregation

secure routing

routing &

aggregator nodeelection

secure distributeddata storage

data plausibility

discrepancy query

reliable transport

transport

WSN access

secure aggregatornode election

SecureDCU

WP1 – Networking

WP2 – Network Security

WP3 - Middleware &Middleware Security

Page 7: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Compiler

Page 8: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Compiler Concept

• Tailor made security architecture for WSN applications

Result could be part of a more general middleware

Result can be specific for a certain application

• Determination of the configuration

Offline (before deployment)

Online (after deployment)

Page 9: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Module interdependencies

Secure & robust data storage

Resilient data aggregation alg_1

Resilient data aggregation alg_2

CDA_alg1

CDA_alg2

CDA_alg3

Complex services Sec. routing_1

Sec. MAC_1

Sec. routing_2

Sec. MAC_2

Protocols

Sec. random generator

Sec. localization

AES ECCRSA

DESTEA

Basic services

Transport_prot_2

implicit dependenciesexplicit dependencies

Page 10: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Tool Box

development phase

Application development phase

Development Phases

Application Requirements

SensorNode Description

configTOOL

USS Toolbox

Influences selection

Selection of components

legend

USS ModuleDescription

Application deployment phase

Tailor made Software configuration

Page 11: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Providing customized security architectures

Sec. random generator

Sec. localization

AES

ECC

RSA

DES

TEA

Sec. rout_1

Sec. MAC_1

Sec. routing_2

Sec. MAC_2

Sec. robust data storage

Resilient data aggregation alg_1

Resilient data aggregation alg_2

CD

A_alg1

CDA_alg2

CDA_alg3

Application Sensor node HW

Sensor node HW

OS

AES

EC

C

Sec. routing_1

Sec. MAC_1

Resilient data aggregation alg_1

CDA_alg2

Sec. robust data storage

Sec

ure

lo

cal.

Req.

Configuration and

Management Module

1. Req. vs features of modules

2. Interoperability of modules

3. Security of combination

Tailor made security architecture

Application

Page 12: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Compiler Operation

Compiler Input• Required functions: Functionality needed by the application

• Available modules: dependencies, interface description, security parameters, code size, etc..

Compiler Operation1. Construct all module selections that fulfil the application requirement

(functional)

2. Select module configuration based on constraints such as code size of modules, supported key length etc.

3. Final Evaluation: selection of best alternative: apply additional parameters like energy consumption, total code size, performance, security implications

Page 13: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Selection of Modules

ECCSec. rout_1

Sec. MAC_1

CDA_alg2

Sec. robust data storage

Secure local.

ECC

Sec. routing Sec. MAC

CDA

Sec. robust data storage

Secure local.

Alg_1

Alg_2

Alg_3

Public key crypt.

RSA

Alg_1

Alg_2

Alg_1

Alg_2

Applicationconstraints

Hardware constraints

Performance constraints M id

dlew

are

com

pile

rAvailable security modules

selected security modules

Page 14: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Simple Example: Authentication

Page 15: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Example

Application needs ‘Asymmetric Cryptography’

Possible configurations:

1. ECEG with hardware ECC and classic pseudo RNG

2. ECEG with hardware ECC and cipher stream RNG

3. ECEG with software ECC and classic pseudo RNG

4. ECEG with software ECC and cipher stream RNG

- RSA? Real RNG? No implementation

Page 16: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Module Description

XML description

• Every module is an entity

• Attributes:

- Implementation

Is 1 if it is an implementation, 0 if it is an interface- Optional <is> tag

says which module is the parent of the entity.

Entity inherits the interfaces from parents

ECEG is ‘Asymmetric Cryptography’

ECC Software is (an implementation of) ECC - Optional list of <requires> and <conflict> tags

ECEG requires ECC- Additional attributes

Code size, security degree, energy consumption

Page 17: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Module Description– Example

<entity name="Asymmetric Cryptography" implementation="0"></entity>

<entity name="ECEG" implementation="1"> <is>Asymmetric Cryptography</is> <requires>ECC</requires> <requires>RNG</requires></entity>

<entity name="RSA" implementation="0"> <is>Asymmetric Cryptography</is></entity> <entity name="ECC" implementation="0"></entity>

<entity name="ECC HW" implementation="1"> <is>ECC</is> <requires>ECC co-processor</requires></entity>

<entity name="ECC SW " implementation="1"> <is>ECC</is></entity>

Page 18: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Architecture

Page 19: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Architecture

• Set up is role dependent: sensor node vs. configuration center

• Application dependent servicesBasic servicesComplex services

• Abstraction layerCommunication interfaceMemory Management Interface

• Middleware Core: Dynamic code update moduleState management moduleMessage interpreterCore is unique on all sensor nodes

Page 20: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Architecture

Currently Deployed Complex Services (Task 3.2; WP1; WP2)

MessageIF (T. 3.4)

DCU (T3.5)

Configuration center

Currently Deployed Complex Services

Currently Deployed Basic Services

Node&Network StateManagement

MessageIF

DCU

Hardware&OS Abstraction Layer

OS

Hardware

Sensor node

Currently Deployed Complex Services

MessageIF

Application Logic

DCU

Currently Deployed Basic Services

Page 21: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Core

DCU

• Reconfiguration of sensor nodes during their lifetime

• Provides functionality for secure code update (AA Stuff)

• Potential triggers

newly detected vulnerabilities of security modules or

simple reconfiguration due to deployment of new applications.

State Management Module (SMM)

• Monitoring of the sensor node and maintaining its state

• Triggering code updates e.g. in case of

expiration of timers

detection of malicious actions.

Page 22: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Core

Message Interpreter

• local intelligence to decide handling of incoming messages e.g. answering vs. forwarding

• middleware scheduler which passes incoming data to the corresponding modules.

Page 23: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

External triggers for online reconfiguration

Collecting data

processing data

Sending data

Sensor readings

Min # data

Processing done

sending done

M2: normal

operation

Extreme strange data

Extreme strange network behaviour

Analysing abnormal behaviour

M3: Management

additional code needed

Attack running

DCU

Countermeasures

no influence on other nodes

M1: Network set-up

Set-up finished

Request new configuration

influence on other nodes

Page 24: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Middleware Architecture: online configuration

Currently Deployed Complex Services (Task 3.2; WP1; WP2)

MessageIF (T. 3.4)

DCU (T3.5)

Configuration center

Currently Deployed Complex Services

Currently Deployed Basic Services (T3.1)

Node&Network StateManagement

MessageIF

DCU

Hardware&OS Abstraction Layer

OS

Hardware

Sensor node

Currently Deployed Complex Services

MessageIF

Application Logic

DCU

Currently Deployed Basic Services

configKIT

USS Toolbox Rep.

WSNConfigMAP

WP1;

WP2;

WP3;

New config needed

Page 25: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

Conclusions

Summary

• Midleware Compiler

New concept towards “simple” security architectures for WSN

• Middleware Architecture

Support of on the fly patches of security configuration

Current state

• XML “languages” for description purposes nearly finalized

• GUI for description of modules, sensor nodes & requirements partly done

Next steps

• Finalization of selection algorithms

• Investigation of assessment functions for complete configuration

• Implementation of algorithms

Page 26: A Middleware Approach to Configure Security in WSN

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2007 - All rights reserved

THANK YOU for your attention

Questions?