group 12, security in pervasive computing

Upload: fauzi-azzuhry

Post on 02-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 Group 12, Security in Pervasive Computing

    1/22

    0

    Security Issues in Pervasive Computing

    (Group 12)

    Consist of :

    A. Survey Security (Dedi Eko Nurcahyo, 13/356483/ptk/9185)

    B.

    Principle of The Security Protocol (ZAINIL ABIDIN 13/356786/PTK/9214)

    C.

    Security Pervasive-middleware (Hendri Novianto

    13/352174/ptk/8881)

    D.

    Security Attack in Wireless Sensor Network (Aditya Nur Cahyo

    13/356789/PTK/9215)

    E.

    Security Attack Prevention In Pervasive Computing (Fauziazzuhry R

    13/356798/PTK/09217)

    Magister Information Teknology

    Electrical Engineering and Information Tech Dept.

    Gadjah Mada University

    2013

  • 8/11/2019 Group 12, Security in Pervasive Computing

    2/22

    1

    Security In Pervasive Computing

    A. Survey Security (Dedi Eko Nurcahyo, 13/356483/ptk/9185)

    Several years ago, stand-alone computer and small networks rely on user authentification

    and acces control to provide security. These method use system-based control to verify person

    identity, view resources, or to change or manage data. However, this way are inadequate to more

    large networks like internet and pervasive computing because this system are has no central

    control. Mobile users expect to access the locally network everytime and everywhere, this can

    make a serious problem in security and access control.

    Pervasive computing strives to simplify task of daily activities from the simple task like

    switching-on the lights, checking e-mail, organizing meeting to the more complex task such as

    booking plane ticket and managing bank account. Pervasive computing allows people to

    interaction, coordination, and cooperation with smart environm`ent.

    Mobile devices and embedded system has severely limited processing power, memory

    capasities, software support and bandwitch characteristic. Also hardware and software more

    heterogen than before, so we must selective the brand hardware or software we have choosen.

    Distributed trust [1]

    For security from hardware side, we must be selective from several criteria such as:

    1. Dynamic rights

    articulating policies for user authentication, access control, and delegation;

    assigning security credentials to individuals;

    allowing entities to modify access rights of other entities by delegating or deferring

    their access rights to third parties and revoking rights as well; and

    providing access control by checking if the initiators credentials fulfillthe policies.

    2.

    Models

    Well-known distributed trust models include the simple public key infrastructure, and

    pretty good privacy.

    3. Trust architecture for pervasive system

  • 8/11/2019 Group 12, Security in Pervasive Computing

    3/22

    2

    4. Distributed models

    A security policy is a set of rules for authorization, access control, and trust in a certain

    domain; it can also contain information about some users roles and the abilities

    associated with those roles.

    5. Delegation Chain

    6. Ontologies

    7. Pervasive Computing Scenario

    Device that connect to the network has more serious problem with security than not-

    connected device . A computer network become more and more widespread, network security

    issues have become increasingly in the future. with this high progress of increasingly of

    computer network, the network security can not be ignored.

    There are many case of network risks over the world, such as:

    Network security event type of China in first half of 2008 [2], More and more malicious

    software and website have appeared, and followed more and more computer are infected each

    year. To prevent these attack, not only secured transmision and data check input need to be

    solved, but also the defense has to start from the source. However, conventional security defense

    technologies can no longer defend from various malicious attack on pervasive computing.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    4/22

    3

    Figure 2. Network security event type of China in first half of 2008

    With pervasive computing, users be spoiled with access everywhere anytime over the place

    that embedded with smart environment. Now the research of pervasive computing security is

    mainly based on trust and security authentication, privacy protection, information transmission

    process in the confidentiality and integrity. Access control mechanism is the most important part

    in security, it will be build a trust for people to use pervasive computing without wory about

    security issues.

    Pervasive computing security goals [3][4]:

    Confidentiality: Confidentiality or Secrecy has to do with making information

    inaccessible to unauthorized users.

    Availability: Availability ensures the survivability of network services to authorized

    parties when needed despite denial-of-service attacks.

    Integrity: Integrity measures ensure that the received data is not altered in transit by an

    adversary.

    Authentication: Authentication enables a node to ensure the identity of the peer node

    with which it is communicating.

    Non-repudiation: Non-repudiation denotes that a node cannot deny sending a message it

    has previously sent.

    Authorization: Authorization ensures that only authorized nodes can be accessed to

    network services or resources.

    Freshness: This could mean data freshness and key freshness.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    5/22

    4

    B. Principle of The Security Protocol (ZAINIL ABIDIN 13/356786/PTK/9214)

    The goal of security protocol in WSN is to protect the information, data and resource from

    attacks and misbehavior. Preventive mechanisms can be used to protect against certain types of

    WSN attacks [KAR 04], [PER 02]. The protocols that ensure the confidentiality, integrity,

    freshness and non-repudiation of data exchanged and authentication of their origin.

    1. Mechanism Security Protocol for WSN.

    1. Encryption

    Cryptography is the study of mathematical methods to be applied to the security

    aspects of the network or data. There are two basic processes in cryptography, the

    encryption and description. Encryption is the process of converting a structured

    message (plaintext) into messages that are random so it is difficult to read.To make the process of encryption and description required a key. This key is

    used to transform the data into something that is confidential and is also useful for

    keeping data authenticity and integrity of data.

    a. Symmetric Cryptography

    Figure 1. Symmetric Cryptography

    Uses a symmetric cryptography the same key for encryption and decryption

    process. Figure 1 illustrates the process in symmetric cryptography, using the key K a

    message encrypted into ciphertext. With the same key (C key) is used to perform the

    description of the ciphertext back into the original message (plaintext). The

    advantages of symmetric cryptography is computational speed that can be applied to

    WSN systems that have limited resources. Some examples of symmetric

    cryptography algorithm is the Data Encryption Standard (DES) algorithm, RC4, RC5,

    MD5 [5][6]

    .

  • 8/11/2019 Group 12, Security in Pervasive Computing

    6/22

    5

    b. Asymmetric Cryptography.

    Figure 2. Asymmetric Cryptography

    Figure 2 shows the asymmetric cryptography, where different keys for encryption

    with a key to the process description. In asymmetric cryptography uses two types of

    keys namely public key and a private key. Excess use of asymmetric cryptography is

    to provide better security in the exchange of information between devices in a WSN.

    Examples of some of the asymmetric cryptographic algorithm is RSA (Rivest,

    Shamir, Adleman), Curve Cryptography (ECC) algorithm, TinyPK and DSA (Digital

    Signature Algorithm) [5].

    2. Message Authentication Code (MAC)

    Message Authentication Code (MAC) is a code or identification to prove the

    authenticity of the data. The technique compares the MAC authentication values

    calculated by the sender with the value calculated by the recipient authentication [].

    MAC method using private key authentication in generating value. Before sending a

    message, the sender will compute the MAC of the message to be sent. Figure 3 below

    illustrates the process of MAC [7].

    Figure 3. MAC Proccess

  • 8/11/2019 Group 12, Security in Pervasive Computing

    7/22

    6

    MAC gives security in the form of data integrity and authentication of data.

    Data integrity can be determined if the message sent is different from the received

    message. While authentication can be determined with the private key used.

    3. Cipher Block Chaining (CBC)

    Block cipher is one form of symmetric cryptography where the message

    (plaintext) message is divided into several blocks of the same size. Then each block

    separately encrypted message block confidential message (ciphertext) using the

    agreed key. The advantage of using a block cipher is the ease of implementation in

    the system and the error propagation that occurs does not affect the secret message

    block (ciphertext) other. Weaknesses in using Cipher block is when using the same

    key to encrypt the message it will be easier to know which key to use. The following

    figure illustrates the CBC method, the process of encryption, a plaintext block P1 will

    be XORed with the previous ciphertext block IV or [7].

    Figure 4. Cipher Block Chaining processes [].

    2. Security Protocol of the WSN

    1. Micro Version of timed, efficient, streaming, loss-tolerant, Authentication (TESLA)

    protocol

    TESLA supports the authentication of the packets broadcasted by the base station on the

    sensor network. WSN security mechanisms in the TESLA is using asymmetric

    cryptography[8]. One limitation of Tesla is that some initial information must be unicast to

    each sensor node before the authentication of broadcast messages can begin. Two steps are

    necessary, as shown in Figure 5, and the time is divided into equal time intervals T. In the

  • 8/11/2019 Group 12, Security in Pervasive Computing

    8/22

    7

    first step, the Base Station broadcasts the packets P1, P2 ... authenticated with the key (k

    is the time interval chosen for transmission); these packets are buffered by the sensors which

    cannot yet verify their origin because they do not know the key ; they only know the key

    Kg k-1 and due to the irreversible property of function F, they cannot deduce

    .

    Figure 5. (TESLA) protocol.

    In the second step, the Base Station broadcasts the key In the time interval k+

    (1);the sensors then check that =F(

    ) and that packets previously arrived at time

    interval k are properly authenticated. Note that the Base Station should be sure that all the

    packets have been received by the sensors before disclosing the key, otherwise, a malicious

    node well positioned on the network might forge packets signed with this key before flooding

    the network, and sensors would have no way of distinguishing the information from the base

    station from those forged by the malicious node.

    2. Security protocol for information via negotiation (SPIN Protocol)

    According to a study conducted by Adrian Perring et al[9]. Stated SPIN Protocol is the

    most optimal security protocol in WSN. SPIN protocol consists of blocks SNEP and

    TESLAblock. The use of SPIN guarantee the security of data sent to a receiver such as data

    confidentiality, authentication and data freshness of data. While TESLA responsible for

    authenticated broadcast for Severely resource-constrained environments.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    9/22

    8

    Figure 6. SPIN Protocol

    3. TinySec protocol

    Like the SNEP, TinySec proposes two security services: authentication only and

    authentication with confidentiality. Like the SNEP and TESLA, TinySec defines an end-to-

    end authentication service (between source and destination) at application level, but

    additionally it offers a link level authentication between neighboring nodes (both types of

    authentication are not activated simultaneously). Link level authentication offers the

    advantage of rapidly detecting any falsified packet and thus avoiding energy consuming

    retransmissions for intermediate sensors. In addition, it helps to protect the aggregation of

    data [7]

    4. Localised Encryption and Authentication Protocol (LEAP)

    Localised Encryption and Authentication Protocol (LEAP) was proposed by Zhu et al

    (2003) as a key management protocol for sensor networks designed to support in- network

    processing, while restricting the impact of a compromised node to the network [20]. Four

    types of keys are supported for each sensor node an individual key shared with the base

    station, a pairwise key shared with another node, a cluster key shared with multiple

    neighbouring nodes and a group key shared by all network nodes.

    C.

    Security Pervasive-middleware

    (Hendri Novianto 13/352174/ptk/8881)The first purpose service middleware is a helping to solved interconnections applications.

    Middleware must be required to migrations from application mainframe to client application or

    server and also to provide communications between different platforms. This is software consists

    of a provide series that allow a variety of run process on one or more machine can to interact

  • 8/11/2019 Group 12, Security in Pervasive Computing

    10/22

    9

    with each other. Sooner or later this is technology provide ability that support moving to

    architecture distribution that related often usual to make support and simple complicate and

    distribution applications[10].

    Middleware is a software layer residing among and connecting different software

    component or applications. It provides connectivity, abstraction, interoperability and other

    service balancing and fault tolerance. Security became an important issue because most

    transaction and operations occur online and need to be protected from malicious and

    unintentional attacks and also from any possible risk of exposure. Well define access police,

    encryptions mechanism and authentication models can helps in providing security. Pervasive

    computing refers to the ubiquitous presence of computing in both mobile and embedded

    environments, with the ability to access and update information anyplace and anytime[11].

    Security Middleware Approach

    In this section we are a representative of the research directions for security

    middleware[12].

    a. TMAHP2P

    This is middleware providing security for ad-hoc p2p applications using a trust-based

    approach and WSFEP (wireless and secure file exchange protocol). It is used for securing

    digital content.

    b.SGSC

    Secure group communications service is a middleware service for mobile ad-hoc network,

    this middleware provides flexible secure group management and support the development

    and execution of distributed applications.

    c. SMMU

    A security management middleware designed for ubiquitous computing device. It allows the

    administrator to define the needed security police and provides management service to

    monitoring and controlling the interconnected device. This middleware is focus on

    providing trust management service and supporting real-time mobile applications scenarios.

    d.SSMAP

    Security-supportive middleware architecture designed to serve mainly heterogeneous

    pervasive device. It is provide with trust a manager that offers dynamic reconfigurations to

    fulfill security requirements of heterogeneous service providers and consumers.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    11/22

    10

    e. S-MARKS

    This is a secure middleware for portable device in a pervasive environment. It corporate

    security in the middleware design to address important issue such us device validation,

    discovering resources, malicious recommendations and privacy violatio

    Nowadays sensor and wireless communication technologies are rapidly evolving and

    conquering new applications area in the healthcare domain. Wireless medical sensor are

    becoming smaller and more powerful, allowing for ubiquitous usage of a wide range of

    medical applications, such as chronic disease management.[13]

    Figure (1) implementation of pervasive

    Health monitoring is one of the envisioned applications A security framework for

    pervasive MSNs and PANs must ensure basic security service. Privacy refers to the

    protection of the user identities and information from non-authorized parties. Confidentiality

    is required to protect the user medical information in the whole system, from the sensor

    nodes to back-end service. The MSN security layer allows each healthcare organization, e.g.

    a hospital, to manage the security in it is MSN security domain, it allows any pair of device

    or user in the same MSN to bootstrap a secure communication link and identify each other.

    The PAN security layer allows a user to manage the secure disclosure of her measures

    medical data when interacting with MSNs (e.g., clinicians in an MSN) and back-end

    services. The security management of this layer is centralized and it relies on a trusted

    device linked to and controlled by the patient.[14].

  • 8/11/2019 Group 12, Security in Pervasive Computing

    12/22

    11

    D.Security Attack in Wireless Sensor Network

    (Aditya Nur Cahyo 13/356789/PTK/9215)Wireless Sensor Network (WSN) is a wireless network infrastructure that uses sensors to

    monitor physical or environmental conditions, such as temperature, sound, vibration,

    electromagnetic waves, pressure, movement, and others. Each node in a wireless sensor

    network typically equipped with a radio tranciever or other wireless communication device, a

    small microcontroller, and an energy source, usually a battery. Wireless sensor networks is

    growing rapidly partly because of the low costs in development[15]. Using a wireless sensor

    network, we can make some good sensors for a variety of needs for military or civilian.

    wireless sensor network but also has limited resources, namely the absence of data storage

    and power. Weaknesses of these resources make it difficult to apply the existing security

    techniques such as traditional computer. Communication channels are not reliable and

    unattended operation makes more difficult the implementation of a security system. There

    are several cases of attacks designed to exploit the communication channel is not reliable and

    unattended operation in wireless sensor networks. [9]

    Network-based sensors such as wireless sensor networks have many susceptibility to

    some types of attacks. Attacks can be done in several ways, mostly in the form of denial of

    services attacks, but there are also a lot of other traffic analys eg, invasion of privacy,

    physical attack and others. Due to some limitations in computational and energy resources

    wireless sensor network then security against denial of services attacks in wireless sensor

    networks is practically impossible. However, attacks on wireless sensor network is not

    limited to denial of services, there are many other techniques that are also dangerous attacks

    include takeoffer nodes, attacks on the routing protocol, and an attack on the physical

    security of the node.

    1. Type of Denial of Services

    A standard attack on wireless sensor network nodes just for jamming or set of nodes.

    Jamming, in this case, only the transmission radio signals that interfere with radio

    frequencies used by sensor networks. The jamming network is divided into two forms:

    constant jamming, jamming and intermittent. Constant jamming is complete jamming the

  • 8/11/2019 Group 12, Security in Pervasive Computing

    13/22

    12

    entire network, no messages are capable of being sent or received. If jamming is only

    intermittent, then the node can exchange messages periodically, but not consistently. It also

    had a devastating impact on the sensor network as messages exchanged between nodes may

    be time sensitive[16].

    The attack can also be performed at the link layer. One possibility is that attacker may

    violate communications protocol, eg, ZigBee or IEEE 801.11b (Wi-Fi) protocol, and is

    constantly sending messages in an attempt to produce collisions. The collision would require

    the transmission of each packet collisions affected. Using this technique allows the attacker

    to drain the power supply to the sensor nodes by forcing too many retransmissions.

    At the routing layer, a node can take advantage of multihop networks to reject these

    messages. This can be done temporarily or constantly, consequently neighbors through the

    malicious node will not be able to exchange messages with the most tissue.

    The transport layer is also vulnerable to attack, as in the case of flooding. Flooding can be as

    simple as sending many connection requests to nodes are vulnerable. In this case, the

    resources should be allocated to handle connection request, the source node will eventually

    run out.

    2. The Sybil Attack

    Sybil attack is defined as "the unauthorized malicious software that takes multiple

    identities" [17]. Initially described as an attack capable of defeating distributed redundancy

    mechanism data storage systems in peer-to-peer[18]. Besides beating distributed data storage

    systems, is also effective against Sybil attacks routing algorithms, aggregation of data, voice,

    fair resource allocation and thwart detection behavior. Regardless of the target (voting,

    routing, aggregation), Sybil same algorithm function. all techniques involves using multiple

    identities. For example, in a sensor network voting scheme, Sybil attacks may use multiple

    identities to generate additional "voice." Similarly, the routing protocol to attack, Sybil attack

    will depend on the identity of malicious nodes take on multiple nodes, and so routing

    multiple paths through a single malicious node.

    3.Traffic Analys Attack

    Wireless sensor networks typically consist of many low-power sensor communicate with

    multiple base stations are relatively sturdy and strong. It is not unusual, therefore, for the data

    to be gathered by the individual nodes where it is finally forwarded to the base station. Often,

  • 8/11/2019 Group 12, Security in Pervasive Computing

    14/22

    13

    the enemy effectively making the network useless, the attacker can simply turn off the base

    station, ntuk make matters worse.

    A strike rate of just monitoring the node closest to the notion that to the base station tend

    to forward more packets than the more distant from the base station. An attacker only needs

    to monitor where nodes sending packets and follow those nodes that transmit packets. In time

    correlation attack, the enemy only generate and monitor events to whom the node sends its

    packets. To generate an attack, the enemy can produce physical events which will be

    monitored by a sensor in the area[19].

    4. Node Replication Attack

    Node replication attack is basically quite simple: an attacker trying to add a node to an

    existing sensor network to copy (replicate) the node ID from existing sensor nodes. A node is

    replicated in this fashion can be very disturbing performance of the sensor network: packets

    can be corrupted or even misrouted[20]. This can lead to disconnected network, one reading

    on the sensor, etc. If an attacker can gain physical access to the entire network he can copy a

    cryptographic key with the sensor and the last replication can also insert node replication to

    strategic points in the network. By incorporating replicated nodes on a specific network

    points, an attacker can easily manipulating certain segments of the network.

    5. Attack Againts Privacy

    Sensor network technology yielding a large increase in automatic data collection

    capabilities through efficient deployment of tiny sensor devices. While this technology offers

    many benefits to users, while this technology also has the potential to be abused. Concerns

    raised is the issue of privacy, for sensor networks provide enhanced capabilities of data

    collection either location data, identity and so on[21]. Enemies can use the data or the data

    may seem harmless to obtain sensitive information if they know how to correlate multiple

    sensor inputs.

    The main problem in the privacy that is not due to sensor networks enables the collection

    of information. The fact that, a lot of information from a sensor network may be collected

    through surveillance company website. On the contrary, sensor networks exacerbate privacy

    issues because they make a great the volume of information that is easily available via

    remote access. Therefore, the enemy does not need to be physically present to maintain

    control. They can gather information by anonymous. Remote access is also allows the

  • 8/11/2019 Group 12, Security in Pervasive Computing

    15/22

    14

    adversary to monitor multiple sites simultaneously[22]. Some of a more general attack on the

    privacy of the sensor are:

    a. Monitor and Eavesdropping

    Monitor and Eavesdropping is the most frequent attack in privacy. By monitoring the data,

    the enemy can easily find the content of the communication. When conveying traffic

    control information about the configuration of the sensor network, which contains

    potentially more detailed information than is accessible via the server location,

    eavesdropping can act effectively against privacy protection.

    b. Traffic Analysis

    Traffic analysis usually combines with monitoring and eavesdropping. Increasing the

    number of packets transmitted between certain nodes may give an indication that a

    particular sensor has been registered activity. Through the analysis on the traffic, several

    sensors with specific roles or activities can be effectively identified.

    c. Camouflage

    Adversary can insert nodes or hide nodes in a sensor network. After that, the node can be

    disguised as a normal node to attract packet, then deflect the packet.

    6. Physical Attack

    Sensor networks typically operate in outdoor environments. in such an environment, the

    small form factor of the sensor, coupled with the unattended and distributed nature of their

    deployment makes them particularly vulnerable to physical attacks, namely, the threat of

    destruction due to physical nodes[23]. Unlike many other attacks mentioned above, physical

    attacks permanently destroy the sensor, so the loss is irreversible. For example, the attacker

    can extract secret cryptography, tamper with associated circuitry, modify programming on

    the sensor, or replace it with malicious sensors under control of the attacker. If the adversary

    compromises a sensor node, then the code can be modified in a physical node[24].

  • 8/11/2019 Group 12, Security in Pervasive Computing

    16/22

    15

    E. Security Attack Prevention In Pervasive Computing

    (Fauziazzuhry R 13/356798/PTK/09217)

    Nowadays, pervasive computing has been important things to do computing everywhere.

    They spread over us, computing anything, and service the information context aware we need.

    But implementation of having pervasive computing, coupled with some issues. One of them is

    security issues, especially on security attack. So here discussed about how to prevent Security

    Attack.

    1.. Denial of Service (DOS)

    Fig 1. Denial of Service[25].

    Figure 1 illustrated Denial of Service Attack( DoS), occurrs in the network affects the entire

    network performance. Dropping attack is either Packet Dropping or Datagram Dropping .Both

    these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack

    which affects the entire functionality of transport layer. The DOS Attack can be prevent with :

    1.1Cluster Based Datagram Chunk Dropping Detection and Prevention Technique

    (CBDCDDPT), DoS Attack Prevention Methods.

    Fig2. The Normal Datagram[25]Fig 3. Buffer of Node n1[25]

  • 8/11/2019 Group 12, Security in Pervasive Computing

    17/22

    16

    Figure 2 shows the normal flow of Datagram chunks in the network with no intruder. At each

    node there is a buffer having the chunks contains chunk_no and chunk_data fields being

    transferred from node N1 to node N5 via N2 and N3. Figure 3 illustrated buffers at Node n1.

    Fig 4. The

    Occurence of

    Intruders detected

    by DatagramBuffers[25]

    Fig 5. Intrusion Detection using

    CBDCDDPT[25]

    Fig 6. Normal flow

    of Datagrams after

    Intrusion Detection

    and Preventionusing

    CBDCDDPT[25]

    Figure 4 shows flow of traffic under Datagram Chunk Dropping attack..Figure 5 shows that

    node N3 becomes intruder. Katal, et.al proposed Cluster Based Datagram Chunk Dropping

    Detection and Preventi on Technique(CBDCDDPT) in which cluster head compares the buffer

    which was sent by source node to the buffer maintained at all intermediate nodes. [25]Figure 6.

    shows a new routing path, formed after intrusion.

    CBDCDDPT detection process by omitting the intruder node (N3) and thus achieving

    normal flow of traffic in the network. Figure 5 shows the mismatch in sequence numbers

    assigned to the chunks created from datagram (chunk_no) because of the dropping of chunks

    being done by the intruder node N3. The chunk_data fields are also matched if chunk_no fields

    match. This is detected by cluster head because of the buffer which was sent by the source node

    initially before starting the datagram transmission along the path. CBDCDDPT is Cluster Based

    Intrusion Detection and Prevention Technique which is capable of working efficiently if an

    intermediate node becomes Datagram Chunk Dropping attacker. So the technique can preventDoS attack with dropping unknown datagram packet.

    2. Security in Embedded System (Physical Hardware Layer)

    The security not only focus on software, but also the defense of system hardware. Huang

    et.al, introduce a low-cost, high-performance hardware platform security of the embedded

    system, based on TPM (Trusted Platform Modules) and FPGA (Field Programmable Gates

  • 8/11/2019 Group 12, Security in Pervasive Computing

    18/22

    17

    Array) technology, called TFSES [26]. The main purpose of the system is protect the integrity

    and privacy of application from physical attacks.

    2.1 TFSES Security Blocks

    2.1.1 Securing the hardware ID.

    FPGA and flash are manufactured, with security by a unique ID by the factory. FPGAs ID

    is called Device DNA and flash is Factory ID [26]., TFSES systems key proposed by

    Huang,et.al generated with the unique ID which can keep the FPGA from being counterfeit.

    Combining the flash Factory ID to the key let the security become stronger. As figure 7 shows,

    the Device DNA and Factory flash ID at the beginning, and then encrypt them together through a

    special security algorithm. So the key from security algorithm generating not only can validate

    the FPGA authenticity but also make the hacker hard difficult to hack the core

    Figure 7. Generating Unique ID Combine Flash ID and Device DNA (FPGA ID) [26]

    2.2.2 Securing the memoriesThe purpose of securing Embedded System is not only on the Hardware ID, but also to protect

    and lockdown the memories[26]. Securing the memories is important to prevent the Embedded

    System being reverse engineering, cloning, and overbuilding by the Hardware Hackers.

    Lockdown function permanently locks selected memories into read-only ROM. Once the

    memory is locked down, it cannot be erased or modified. TFESE store the key, DES, SHA and

    other important bitstream code into this In-system flash which provides a robust, cost-effective

    solution. Figure 8 described the In-system flash.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    19/22

    18

    Figure 8. Security memories with In-system flash[26].

    3. Wormholes Attack Prevention in Mobile AdHoc Network (MANET).

    The detection of wormholes in ad hoc networks is difficult without using specialized

    hardwares. Choi, et.al, propose an algorithm to detect wormholes without any special hardwares.

    Choi, et.al proposed the methods by monitoring Neighbours Nodes and calculating the WormPrevention Timer[27].

    3.1 Neighbor Node Monitoring and Worm Prevention Timer (WPT)

    Neighbor Node Monitoring is used to detect neighbors node. The prevention system detect

    wormholes by using a special timer.[27]For using this timer, all the nodes do not require clock

    synchronization, except the source node. As soon as a node sends a RREQ packet, it must set the

    WPT and wait after sending the RREQ packet until it overhears its neighbors retransmission.

    Figure 17 shows an example of the secure neighbor monitoring. Node A sends a RREQ

    (Route Request) , which starts a wormhole prevention timer (WPT). When node B receives the

    RREQ. Once a malicious node overhears a RREQ, to know the identity what node that send

    RREQ, and what nodes that receives. So the data packet details must be included with the

    addressed and time when Request. The details decribed at Table 1.

    Figure 9. Example Neighbour Network Monitoring, (a) with legitimate nodes

    (b) monitoring wormholes nodes [27].

  • 8/11/2019 Group 12, Security in Pervasive Computing

    20/22

    19

    Table 1. Neighbour Nodes Table[27]

    In The Table 1, show if any node sends a RREQ, it records the RREQ sequence number and

    sending time of the RREQ. Then, on overhearing a RREQ from any node, it records the address

    of the neighbor node and the time when it receives the packet. If the node receives the RREQ

    after the timer count, called as WPT, it considers the neighbor node sending the RREQ as a node

    affected by wormhole nodes. The count value in its table will be increased by 1.

    The Worm Prevention Timer on relies on the nodes. If the nodes likes the sensor nodes, the

    WPT given by Equation 1, and then if the nodes are have mobility, the WPT given Equation 2

    [27].

    Where TR= Transmission Range (Packet Distance); Vp = propagation speed of packet (max

    speed of light 3.108m/s). Vn=Average velocity of nodes (for mobile nodes).

    So detecting the nodes are worms or not, just calculated the delay per hop, given by Equation 3

    [27].

    Where Ta= the time node broadcast RREQ (request) packet, Tb= time node receives RREP

    (replies) packet. Hop count must be calculated. For example one hope routes means the time

    route = WPT/2. The delay must be smallest or equal that WPT. If the time greater than WPT, it

    signed the Worms Node, so it can be dropped from the network easily.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    21/22

    20

    Referensi

    [1] L. Kagal, T. Finin, And A. Joshi, Trust-Based Security In Pervasive Computing

    Environments, Dec. 2001.[2] L.Z.Hua, J.Zhen, and L.Tao, Research on Pervasive Computing Security, Symp. Work.Ubiquitous Auton. Trust. Comput., 2010.

    [3] X.Chen, K.Makki, and K.Yen, Sensor Network Security: A Survey,IEEE Commun. Surv.

    Tutorials, vol. 11. No.2. Second Quarter, 2009.[4] J.Sahoo, S.Hohapatra, and R.Lath, Virtualization: A Survey On Concepts, Taxonomy And

    Associated Security Issues, Second Int. Conf. Comput. Netw. Technol., 2010.

    [5] O. O. Khalifa, M. R. Islam, S. Khan, and M. S. Shebani, Communications cryptography, in

    RF and Microwave Conference, 2004. RFM 2004. Proceedings, 2004, pp. 220223.[6] O. Hyncica, P. Kucera, P. Honzik, and P. Fiedler, Performance evaluation of symmetric

    cryptography in embedded systems, in 2011 IEEE 6th International Conference on

    Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011, vol. 1, pp.277282.

    [7] F. Ullah, M. Ahmad, M. Habib, and J. Muhammad, Analysis of security protocols for

    Wireless Sensor Networks, in 2011 3rd International Conference on Computer Research

    and Development (ICCRD), 2011, vol. 2, pp. 383387.[8] V. Casola, A. De Benedictis, A. Drago, and N. Mazzocca, Analysis and Comparison of

    Security Protocols in Wireless Sensor Networks, in 2011 30th IEEE Symposium on Reliable

    Distributed Systems Workshops (SRDSW), 2011, pp. 5256.[9] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS: Security protocols

    for sensor networks, Wirel. Networks, vol. 8, no. 5, pp. 521534, 2002.

    [10] A. Jameela, A. Alyaziyah, A. Fatmah, and M. Nader,, A Survey of Security Middleware

    for Pervasive and Ubiquitous Systems, Coll Inf Technol UAE Univ Al Ain UAE Pp 188193.

    [11] Shiva Chetan, J. Al-Muhtadi, R. Campbell, and M. D. Mickuna, Mobile Gaia: a

    middleware for ad-hoc pervasive computing, Consum. Commun. Netw. Conf. 2005 CCNC2005 Second IEEE 2005 Pp 223228.

    [12] Zhang, M, S. Zhu, B. Yang, and W. Zhang, Trust-based Distributed Authentication

    Middleware in Ubiquitous Mobile Environment,Proc 3rd Int Conf Nat Comput Pp 814-818August 2007.

    [13] U. Varshney, Pervasive Healtcare, Comput. Vol 36 No 12, pp. 138140, Dec. 2003.

    [14] K. I.-K. Wang, H. Park, Z. Salcic, and P. Ratnayaka,A system-level approach for

    designing context-aware distributed pervasive applications, vol. 7861 LNCS. 2013.[15] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor

    networks: A survey, Comput. Networks, vol. 38, no. 4, pp. 393422, 2002.

    [16] A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, Computer, vol.

    35, no. 10, pp. 5462, 2002.[17] J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil attack in sensor networks:

    Analysis & defenses, 2004, pp. 259268.

    [18] M. Sood and A. Vasudeva,Perspectives of Sybil attack in routing protocols of mobile adhoc network, vol. 131 LNEE. 2013.

  • 8/11/2019 Group 12, Security in Pervasive Computing

    22/22

    21

    [19] J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis attacks in

    wireless sensor networks, 2005, vol. 2005, pp. 113126.

    [20] B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in

    sensor networks, 2005, pp. 4963.

    [21] D. Anthony, D. Kotz, and T. Henderson, Privacy in location-aware computing

    environments,IEEE Pervasive Comput., vol. 6, no. 4, pp. 6472, 2007.[22] H. Chan and A. Perrig, Security and privacy in sensor networks, Computer, vol. 36, no.10, pp. 103105, 2003.

    [23] X. Wang, S. Chellappan, W. Gu, W. Yu, and D. Xuan, Search-based physical attacks in

    sensor networks, 2005, vol. 2005, pp. 489496.[24] X. Wang, W. Gu, K. Schosek, S. Chellappan, and D. Xuan, Sensor network

    configuration under physical attacks,Int. J. Ad Hoc Ubiquitous Comput., vol. 4, no. 34,

    pp. 174182, 2009.

    [25] A. Katal, M. Wazid, R. H. Goudar, and D. P. Singh, A cluster based detection andprevention mechanism against novel datagram chunk dropping attack in MANET

    multimedia transmission, 2013, pp. 479484.

    [26] H. Huang, C. Hu, and J. He, A security embedded system base on tcm and FPGA,2009, pp. 605609.

    [27] S. Choi, D.-Y. Kim, D.-H. Lee, and J.-I. Jung, WAP: Wormhole Attack Prevention

    algorithm in mobile ad hoc networks, 2008, pp. 343348.