Security Tradeoffs in Nest
Security Tradeoffs in Nest
in NEST
1
Administrative
2
Subcontractors and Collaborators
• Subcontractors
– University of Michigan
– Arizona State University
• Collaborators
– University of Virginia
– BBN
– UC Berkeley
– SRI
3
PI Name
Affiliation Security Tradeoffs in NEST
University of Massachusetts; University of Michigan; Arizona State University
Problem and Challenge New Ideas
System
Constraints
Security
Requirements
Application
Needs
• Adapting security level of each task to
application requirements and system
constraints.
Middlewar
Impact Schedule
Ensures appropriate levels of • Q4FY03
• Encryption mechanisms
security for application needs. • Incorporating fault-tolerance
Integrates security with • Intrusion detection
• Secured wireless protocol
performance, reliability, power • Q2FY04 - Security Broker
requirements and constraints. • Q2FY04 - IV Manager
Enables dynamic adjustments as • Q3FY04 - Software prototype
• Q4FY04 - Experimentation & validation
needs and resource availability
change.
4
Problem Description/Objective
5
Key Project Directions
6
Presentation Outline
7
Presentation Outline
8
Lightweight Security Protocol (LiSP)
Motivation:
• Periodic key updates are necessary
• Frequent key exchange, retransmissions (due to unreliable media)
and acknowledgements consume significant power
Solution:
• Provide lightweight key update (to maximize sensor lifetime) by
exploiting information redundancy in key sequences
Summary Results:
• Implicit authentication for new keys, easy recovery of keys, no
retransmissions
• Resource consumption relatively low: less than 3 hash
computations even when more than 40% of the temporary keys are
compromised or lost.
9
Fault Detection
Motivation:
• Faults compromise security: may be maliciously injected by an
attacker to probe the system and extract the secret key
• Faults should be detected to avoid transmission of erroneous
messages
Solution:
• Check-bit prediction developed for RC5, AES
• Detect faults to block output of erroneous results
Summary Results:
• All single bit failures detected
• Most of the multiple faults detected with the 4-bit parity and
Residue-15 codes – percentage undetected faults less than 1%
10
Transmission Scheme Tradeoffs
Motivation:
• Radio communication is very energy-intensive
Annulus Am • If multi-hop forwarding is used, nodes close to
the base station can rapidly deplete their
... batteries; reaching directly to BS requires high
BS transmission power
• The network lifetime limited by the nodes with
maximum power consumption
...
Solution:
Capable of direct
transmission
Need forwarding
to reach BS
• Move hotspot from innermost annulus
• Probabilistic traffic balancing
– Forward packets with probability f ( k )
– Transmit packets directly (high power) to the
BS with probability
d (k ) 1 f (k )
Summary:
• Approach prolongs sensor network lifetime
(power saving depends on size of network,
maximum range, density)
11
Presentation Outline
12
Security Broker
Motivation:
• Different applications require different security
services
• Different environments (external/internal)
require different levels of security provision
• Resource-limited devices cannot afford to
overprovision
• No one-size-fits-all solution exists
13
Approach
messag
active message
• Runtime service composition
e
– aspects of security
packet
concerns (e.g., integrity, Radio Packet
confidentiality, replay
Service Library
attacks)
Security Broker
– levels of security provision
(e.g., encryption Cipher Library
algorithm, # rounds, block byte Radio byte
size)
– react adaptively
(external/internal RFM
bit
requirements)
14
Packet Format – Security Encoding
Mandatory fields
for all services
Security Composition ID
(SCID) “X1” and “X2”, is used to
– “C” = Confidentiality represent the strength of the
– “I” = Integrity cipher used.
– “S” = Semantic security
with implicit counter
– “R” = Replay protection
– “0000”, then no security
service is provided
15
Energy Comparison
Systems Packet sizes Energy consumption
CISR=0000 14 bytes 229,600 nJ
CISR=1000 14 bytes 242,380 nJ (31.4%)
16
Embedded IV Manager
17
How does it work?
18
At the Sender
H M EK1,IV(M)
EK2(H | EK1,IV)
IV EK2(H | EK1,IV)IV
Encrypt with K3
C=EK3 (EK2(H | EK1,IV)IV)
H EK1,IV(M) C
19
At the Receiver
H EK1,IV(M) C
Header Ciphertext Checksum
H EK1,IV(M) EK3 (EK2(H | EK1)IV)
20
Results and Benefits
8.E+10
Energy Consumption (nJ) .
7.E+10
6.E+10
Explicit IV
5.E+10 Window size = 2
Window size = 4
4.E+10 Window size = 8
Window size = 16
3.E+10
2.E+10
1.E+10
0.E+00
200 400 600 800 1000 1200 1400 1600 1800 2000 2200 2400 2600 2800 3000 3200
1/BER
21
Demonstration
22
Phase I
23
24
Phase I
25
Presentation Outline
26
Project Status
27
Goals and Success Criteria
• Goals
– Ensure appropriate security levels and prolong
sensor network lifetime
– Integrate security with performance, power, and
reliability
• Success criteria
– Software prototype (security services) integrated
and demonstrated with one application
– Security capabilities for various attack scenarios
and power saving demonstrated
28
Selected Recent Publications
Taejoon Park and Kang G. Shin, ``LiSP: A Lightweight Security Protocol for
wireless sensor networks,'' ACM Transactions on Embedded Computer Systems (in press)
29
Project Plans
31
Overall Project Schedule
32
Technology Transfer
33
Program Issues
34
Thank you!
35
36
How does it work?
37
TK Management Steps at Sensors
buffer
• Receive a TK (way ahead
of its use)
• Verify authenticity
38
Impact of TK Loss
39
Summary of LiSP
40
Transmission Cost/Tradeoffs
– Multi-hop forwarding
• Total transmission energy declines (due to exponentially
lower power cost for shorter transmissions)
• Channel congestion decreases (due to shorter range)
• But, nodes in the inner annuli consume battery fast!
41
Devised Transmission Schemes
43
Multiple Fault Coverage
• Summary: The 4-bit parity and Residue-15 codes achieve the highest
coverage of multiple faulty bits – percentage undetected faults less than
1% in most cases
44
45