optimal batch rekeying for secure group communications in wireless networks authors: jin-hee cho,...

56
Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika Gujarati and Sindhu Motupalli

Upload: grace-hopkins

Post on 20-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Optimal Batch Rekeying for Secure Group Communications in

Wireless NetworksAuthors: Jin-Hee Cho, Ing-ray Chen,

Mohamed Eltoweissy

Presented by Niharika Gujarati

and Sindhu Motupalli

Page 2: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Agenda

• Introduction and previous work

• System model and assumptions

• Threshold-based periodic batch rekeying

• Performance model

• Numerical results and analysis

• Conclusion

Page 3: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

1.Group Communication

• Applications inherently based on group communication.

• Wireless networks– Network functionality– Assure confidentiality, authenticity and

intergrity

User = End-user / network node.

Page 4: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Symmetric key

• Group key shared by members.

• Group key dist by key server.

• Dedicated key server or existing server employed

• Multiple key servers can co-exist in clustered network.

• Group key used to encrypt and decrypt messages only by group members.

Page 5: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Forward secrecy - Group key management property that ensures that an intruder that knows a contiguous subset of old group keys cannot identify subsequent group keys.

• Backward secrecy - Group key management property that ensures that an intruder that knows a subset of group keys cannot discover previous group keys

Page 6: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Individual Rekeying

• Performs a rekey operation for every join or leave.

• Not scalable because of significant communication overhead.

• Synchronization difficult to maintain.

• To Remedy – periodic batch rekeying

Page 7: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Periodic Batch Rekeying

• Joins and leaves aggregated.

• Rekeying done only periodically.

• Thus communication overhead is reduced when compared to individual rekeying.

• Improves efficiency and reduces out-of sync problem.

• Consequence – forward and backward secrecy not strictly satisfied.

Page 8: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Contributions of paper.

• Develops new threshold-based batch rekeying schemes.

• Finding an optimal rekey interval to reduce communication costs while maintaining intergrity.

• SPN model to measure performance metrics.

Page 9: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

2.System Model and Assumption

Page 10: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• KS maintains a key tree based on LKH (logical key hierarchy) protocol.

Page 11: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Each node – cryptographic sym key

• KS connects each member with one tree node

• Each node knows all keys from leaf to root node

Page 12: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• No other nodes’ keys are known

• This key set is called key path

• Root node key plays as group key

• Example : key path of M2 is K5 , K2 and K1.

Page 13: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• When member joins, KS sends all the keys in keypath

• Msg length – k(2log2 (N) -1)

• When member leaves, KS updates all the keys in the key path

• Msg length – 2klog2 (N)

• k – length of key

• N - number of members

• Therefore each updates’ msg length is logarithimic in no of group members.

Page 14: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Assume periodic batch rekeying is used• User cannot join without authorisation, ie;

no Untrusted Joins.• Leaves can be Trusted or Untrusted.• Trusted leave - User voluntarily leaves the

group.• Untrusted leave – User is evicted from the

group.• if rekeying doesn’t take place immediately

after an untrusted leave it will result in a period of security vulnerability.

Page 15: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Probability of trustworthiness.

Pt = number of trusted leave oprns

total number of trusted and untrusted leaves

Data is periodically collected by the KS

Page 16: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

3.Threshold-based periodic batch rekeying

• Based on notion of thresholds that govern the max number of leave and join requests to be accumulated beyond which rekeying is done

• Rekeying scheme using only one threshold k3

• Rekeying schemes using two thresholds k1 and k2

Page 17: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• This scheme identifies the set of states in which rekeying is performed thus implicitly determining time between two rekeying oprns.

• State machine with 3 component state representation ( a , b , c)

a number of trusted join requests.

b number of trusted leave requests.

c number of untrusted leave requests.

Page 18: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Threshold based rekeying

ULT

Untrusted Leave Threshold Based

TAUDT

Trusted and Untrusted Double Threshold based

JALDT

Join and Leave Double Threshold based

Page 19: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

ULT

• One Threshold k3 that guards only untrusted leave

• K3 number of untrusted leave requests ( state variable “c”)

• Special case k3=1 , individual rekeying is used.

• Used as a baseline to compare other two schemes.

Page 20: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

TAUDT

• Two thresholds k1 and k2.

• k1 number of trusted requests : a + b state variables

• k2 number of untrusted leave requests : c state variable

Page 21: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

JALDT

• Two thresholds k1 and k2.

• k1 number of trusted join requests : state variable a

• k2 number of trusted and untrusted leaves : b + c state variables.

Page 22: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Rekeying

• Only at the end of the batch interval T

Page 23: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Two application specific constraints are

• Probability of secrecy violation Pv

– Proportion of time with secrecy violation risk– Only forward secrecy

• Delay D– Latency per join or leave request (the same)– Joins and leaves are not distinguished as they

are aggregated.

• Optimal batch rekeying interval (T) – interval in which overhead is minimised while satisfying Pv and D

Page 24: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Simple optimization feature used to reduce communication overhead

• New join member can take the place of leave member in a key tree.

• Thus for each join-leave pairs, KS only generates new keys along the keypath and a new key to the new member.

Page 25: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

KS applies following procedure while rekeying.

• if a > b+c, then the server will process b+c join-leave request pairs before processing a – (b+c) join requests;

• if a = b+c, then the server will process b+c join-leave request pairs;

• if a < b+c, then the server will process a join-leave

Page 26: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Performance Model

Page 27: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

For ULT we derive analytical closed from solution

Average Batch Rekey interval

T =

= average inter-arrival ime of untrusted leave requests

Page 28: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Thus at end of each batch rekeying the state variables have the values…

Page 29: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• The communication overhead bits Cm is calc as

Page 30: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Scm is the communication overhead

• Tb is overhead for broadcast

• Thus Scm is calculated as the sum of this overhead and packet transmission time.

Scm = Tb + Cm / BW

Page 31: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Average communication overhead per join or leave

S = Scm

a + b + c

• Probability of secrecy violation is the propotion of time in which fwd secrecy has been violated

Pv = [ (k3-1) / k3 ] * T + Scm

(T + Scm)

Page 32: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Delay per join / leave

D = S + T/2

T/2 = average wait time for batch rekeying for an operation

S = average communication overhead per join/ leave

Calculated D is almost the same as resp time per operation

Page 33: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• For TAUDT and JALDT there are too many states to yield closed-form analytical expressions, hence the use of SPN model.

Page 34: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Places

tmp is a temporary place holder not corresponding to any state component just to hold newly arriving leave requests.

Page 35: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Transitions

Page 36: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Arcs

Page 37: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Firing Rule for any of the transactions in the model

– There are atleast m tokens in each of its input places connected by an input arc of multiplicity m

– The associate enabling function of that transaction

Page 38: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• when trusted join arrives-token in “a”

• Modelled by transition T1 with rate λ * Pt because there are no untrusted joins, only trusted ones.

Page 39: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Any leave – token in tmp• Modelled by T2 with rate µ• If leave trusted go to “b” with immediate

transition (T4) rate of Pt.• If untrusted go to “c” with immediate

transition rate (T5) of 1 – Pt.

Page 40: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• For both schemes rekeying is performed when rekeying condition is satisfied.

• Modelled by using an enabling function that has to be satisfied to fire the transition T3.

Page 41: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Enbling function for T3

TAUDT if mark(a) + mark(b) = k1

or if mark(c) = k2 then true

else false

JALDT if mark(a) = k1

or if mark(b) + mark(c) = k2 then true

else false

Page 42: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Enabling functions

Page 43: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika
Page 44: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• Average communication overhead

– R = Set of rekeying states – P(i) = The steady-state probability of the system

being in state i.• The Secrecy of Violation:

– V denotes the set of states in which mark(c)>0

– ri = 1

Page 45: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• To obtain T , convert all rekeying states to absorbing states.

• Assign a reward value of 1 to all states other than absorbing states.

• T is computed as expected cumulative reward until absorption.

Page 46: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Numerical results and analysis

Analyze numerical results obtained from applying mathematical models developed for ULT,TAUDT and JALDT.Following system parameters are used:number of members in the group (N) = 1024•length of each key (J) is 64 bits•Tb = 5 msec• bandwidth (BW) is 1 Mbps

Page 47: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

ULT Analysis • Baseline scheme which TAUDT and JALDT will be

compared against.• Assumed - λ: μ = 1: 0.5 and Pt = 0.9

•D is Delay•k3 increases D increases•Hence takes more time to accumulate “c” to reach the threshold

•Pv is Secrecy Voilation•k3 increases c increases•When k3 = 0 Pv = 0

Page 48: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

• The optimal batch rekey interval (T) is the interval at which the overhead is minimized while satisfying the two application-level constraintsT = 1 μ(1 − Pt ) × k3

At D= 5, Pv = .05 , k3 = 1T = 6.67 seconds

Page 49: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

TAUDT Analysis• Two thresholds – k1 number of trusted

requests (a+b)and k2 number of untrusted requests (c).

•K1 increases Pv increases since high threshold means more states voilated secrecy requirement.•As K2 increases, Pv increases too, until k2 reaches a threshold ( k2 > 2).

D increases as k1 increases and k2 increases.K2 not significant as k1 due to high Pt used.

Page 50: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

•As k1 increases, S decreases since aggregating join and leave events reduces rekeying overhead•S is insensitive to incresing k2 since “c” is very small

•optimal batch rekey interval

At D= 5, Pv = .05 (k1,k2) = (16,1)T = 8.83 seconds

Page 51: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

JALDT Analysis• two thresholds - k1 number of join requests (a) and k2 the number of leave requests (b+c)

•Pv and D increase when either k1 or k2 increases

Page 52: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

S decreases as both k1 and k2 increase because aggregating more join and leave events for a batch rekeying operation will amortize the cost per operation. optimal batch rekey interval

At D= 5, Pv = .05 (k1,k2) = (13,2)T = 3.96 seconds

Page 53: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Comparison

• Calculated Optimal batch rekey intervals :ULT 6.67 secondsTAUDT 8.83 secondsJALDT 3.96 seconds

• TAUDT has the highest optimal T

• JALDT shows the second highest optimal T, followed by ULT

Page 54: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

TAUDT is able to produce the minimum S and the maximum T, which makes it the most efficient scheme among all.

Page 55: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Conclusion

• By varying the Pv and (λ : µ), TAUDT is able to produce the minimum S and the maximum T.

• As Pt increases, minimum S decreases and T increases.

• As µ increases, minimum S increases and optimal T decreases

Page 56: Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika

Future Works

• Augment by taking reliability and availability considerations to the SPN model.

• Analyzing the effects of insider attacks and intrusion detection system design on the security and performance prosperities of group communications in wireless systems.

• Investing the issue of optimal batch rekeying for the case in which a group consists of multiple subgroups.